Simple video format for mobile applications
NASA Astrophysics Data System (ADS)
Smith, John R.; Miao, Zhourong; Li, Chung-Sheng
2000-04-01
With the advent of pervasive computing, there is a growing demand for enabling multimedia applications on mobile devices. Large numbers of pervasive computing devices, such as personal digital assistants (PDAs), hand-held computer (HHC), smart phones, portable audio players, automotive computing devices, and wearable computers are gaining access to online information sources. However, the pervasive computing devices are often constrained along a number of dimensions, such as processing power, local storage, display size and depth, connectivity, and communication bandwidth, which makes it difficult to access rich image and video content. In this paper, we report on our initial efforts in designing a simple scalable video format with low-decoding and transcoding complexity for pervasive computing. The goal is to enable image and video access for mobile applications such as electronic catalog shopping, video conferencing, remote surveillance and video mail using pervasive computing devices.
Middleware Architecture for Ambient Intelligence in the Networked Home
NASA Astrophysics Data System (ADS)
Georgantas, Nikolaos; Issarny, Valerie; Mokhtar, Sonia Ben; Bromberg, Yerom-David; Bianco, Sebastien; Thomson, Graham; Raverdy, Pierre-Guillaume; Urbieta, Aitor; Cardoso, Roberto Speicys
With computing and communication capabilities now embedded in most physical objects of the surrounding environment and most users carrying wireless computing devices, the Ambient Intelligence (AmI) / pervasive computing vision [28] pioneered by Mark Weiser [32] is becoming a reality. Devices carried by nomadic users can seamlessly network with a variety of devices, both stationary and mobile, both nearby and remote, providing a wide range of functional capabilities, from base sensing and actuating to rich applications (e.g., smart spaces). This then allows the dynamic deployment of pervasive applications, which dynamically compose functional capabilities accessible in the pervasive network at the given time and place of an application request.
An Adaptive Sensor Mining Framework for Pervasive Computing Applications
NASA Astrophysics Data System (ADS)
Rashidi, Parisa; Cook, Diane J.
Analyzing sensor data in pervasive computing applications brings unique challenges to the KDD community. The challenge is heightened when the underlying data source is dynamic and the patterns change. We introduce a new adaptive mining framework that detects patterns in sensor data, and more importantly, adapts to the changes in the underlying model. In our framework, the frequent and periodic patterns of data are first discovered by the Frequent and Periodic Pattern Miner (FPPM) algorithm; and then any changes in the discovered patterns over the lifetime of the system are discovered by the Pattern Adaptation Miner (PAM) algorithm, in order to adapt to the changing environment. This framework also captures vital context information present in pervasive computing applications, such as the startup triggers and temporal information. In this paper, we present a description of our mining framework and validate the approach using data collected in the CASAS smart home testbed.
ERIC Educational Resources Information Center
Khemaja, Maha; Taamallah, Aroua
2016-01-01
Current advances in portable devices and wireless technologies had drastically impacted mobile and pervasive computing development and use. Nowadays, mobile and or pervasive applications, are increasingly being used to support users' everyday activities. These apps either distributed or standalone are characterized by the variability of the…
Towards a flexible middleware for context-aware pervasive and wearable systems.
Muro, Marco; Amoretti, Michele; Zanichelli, Francesco; Conte, Gianni
2012-11-01
Ambient intelligence and wearable computing call for innovative hardware and software technologies, including a highly capable, flexible and efficient middleware, allowing for the reuse of existing pervasive applications when developing new ones. In the considered application domain, middleware should also support self-management, interoperability among different platforms, efficient communications, and context awareness. In the on-going "everything is networked" scenario scalability appears as a very important issue, for which the peer-to-peer (P2P) paradigm emerges as an appealing solution for connecting software components in an overlay network, allowing for efficient and balanced data distribution mechanisms. In this paper, we illustrate how all these concepts can be placed into a theoretical tool, called networked autonomic machine (NAM), implemented into a NAM-based middleware, and evaluated against practical problems of pervasive computing.
From Operating-System Correctness to Pervasively Verified Applications
NASA Astrophysics Data System (ADS)
Daum, Matthias; Schirmer, Norbert W.; Schmidt, Mareike
Though program verification is known and has been used for decades, the verification of a complete computer system still remains a grand challenge. Part of this challenge is the interaction of application programs with the operating system, which is usually entrusted with retrieving input data from and transferring output data to peripheral devices. In this scenario, the correct operation of the applications inherently relies on operating-system correctness. Based on the formal correctness of our real-time operating system Olos, this paper describes an approach to pervasively verify applications running on top of the operating system.
Towards pervasive computing in health care - a literature review.
Orwat, Carsten; Graefe, Andreas; Faulwasser, Timm
2008-06-19
The evolving concepts of pervasive computing, ubiquitous computing and ambient intelligence are increasingly influencing health care and medicine. Summarizing published research, this literature review provides an overview of recent developments and implementations of pervasive computing systems in health care. It also highlights some of the experiences reported in deployment processes. There is no clear definition of pervasive computing in the current literature. Thus specific inclusion criteria for selecting articles about relevant systems were developed. Searches were conducted in four scientific databases alongside manual journal searches for the period of 2002 to 2006. Articles included present prototypes, case studies and pilot studies, clinical trials and systems that are already in routine use. The searches identified 69 articles describing 67 different systems. In a quantitative analysis, these systems were categorized into project status, health care settings, user groups, improvement aims, and systems features (i.e., component types, data gathering, data transmission, systems functions). The focus is on the types of systems implemented, their frequency of occurrence and their characteristics. Qualitative analyses were performed of deployment issues, such as organizational and personnel issues, privacy and security issues, and financial issues. This paper provides a comprehensive access to the literature of the emerging field by addressing specific topics of application settings, systems features, and deployment experiences. Both an overview and an analysis of the literature on a broad and heterogeneous range of systems are provided. Most systems are described in their prototype stages. Deployment issues, such as implications on organization or personnel, privacy concerns, or financial issues are mentioned rarely, though their solution is regarded as decisive in transferring promising systems to a stage of regular operation. There is a need for further research on the deployment of pervasive computing systems, including clinical studies, economic and social analyses, user studies, etc.
Personal pervasive environments: practice and experience.
Ballesteros, Francisco J; Guardiola, Gorka; Soriano, Enrique
2012-01-01
In this paper we present our experience designing and developing two different systems to enable personal pervasive computing environments, Plan B and the Octopus. These systems were fully implemented and have been used on a daily basis for years. Both are based on synthetic (virtual) file system interfaces and provide mechanisms to adapt to changes in the context and reconfigure the system to support pervasive applications. We also present the main differences between them, focusing on architectural and reconfiguration aspects. Finally, we analyze the pitfalls and successes of both systems and review the lessons we learned while designing, developing, and using them.
Personal Pervasive Environments: Practice and Experience
Ballesteros, Francisco J.; Guardiola, Gorka; Soriano, Enrique
2012-01-01
In this paper we present our experience designing and developing two different systems to enable personal pervasive computing environments, Plan B and the Octopus. These systems were fully implemented and have been used on a daily basis for years. Both are based on synthetic (virtual) file system interfaces and provide mechanisms to adapt to changes in the context and reconfigure the system to support pervasive applications. We also present the main differences between them, focusing on architectural and reconfiguration aspects. Finally, we analyze the pitfalls and successes of both systems and review the lessons we learned while designing, developing, and using them. PMID:22969340
Challenges in Securing the Interface Between the Cloud and Pervasive Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lagesse, Brent J
2011-01-01
Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources andmore » issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.« less
Human computer confluence applied in healthcare and rehabilitation.
Viaud-Delmon, Isabelle; Gaggioli, Andrea; Ferscha, Alois; Dunne, Stephen
2012-01-01
Human computer confluence (HCC) is an ambitious research program studying how the emerging symbiotic relation between humans and computing devices can enable radically new forms of sensing, perception, interaction, and understanding. It is an interdisciplinary field, bringing together researches from horizons as various as pervasive computing, bio-signals processing, neuroscience, electronics, robotics, virtual & augmented reality, and provides an amazing potential for applications in medicine and rehabilitation.
ERIC Educational Resources Information Center
Watson, William R.; Watson, Sunnie Lee
2007-01-01
The application of computers to education has a history dating back to the 1950s, well before the pervasive spread of personal computers (Reiser, 1987). With a mature history and varying approaches to utilizing computers for education, a veritable alphabet soup of terms and acronyms related to computers in education have found their way into the…
Towards pervasive computing in health care – A literature review
Orwat, Carsten; Graefe, Andreas; Faulwasser, Timm
2008-01-01
Background The evolving concepts of pervasive computing, ubiquitous computing and ambient intelligence are increasingly influencing health care and medicine. Summarizing published research, this literature review provides an overview of recent developments and implementations of pervasive computing systems in health care. It also highlights some of the experiences reported in deployment processes. Methods There is no clear definition of pervasive computing in the current literature. Thus specific inclusion criteria for selecting articles about relevant systems were developed. Searches were conducted in four scientific databases alongside manual journal searches for the period of 2002 to 2006. Articles included present prototypes, case studies and pilot studies, clinical trials and systems that are already in routine use. Results The searches identified 69 articles describing 67 different systems. In a quantitative analysis, these systems were categorized into project status, health care settings, user groups, improvement aims, and systems features (i.e., component types, data gathering, data transmission, systems functions). The focus is on the types of systems implemented, their frequency of occurrence and their characteristics. Qualitative analyses were performed of deployment issues, such as organizational and personnel issues, privacy and security issues, and financial issues. This paper provides a comprehensive access to the literature of the emerging field by addressing specific topics of application settings, systems features, and deployment experiences. Conclusion Both an overview and an analysis of the literature on a broad and heterogeneous range of systems are provided. Most systems are described in their prototype stages. Deployment issues, such as implications on organization or personnel, privacy concerns, or financial issues are mentioned rarely, though their solution is regarded as decisive in transferring promising systems to a stage of regular operation. There is a need for further research on the deployment of pervasive computing systems, including clinical studies, economic and social analyses, user studies, etc. PMID:18565221
Ubiquitous computing in sports: A review and analysis.
Baca, Arnold; Dabnichki, Peter; Heller, Mario; Kornfeind, Philipp
2009-10-01
Ubiquitous (pervasive) computing is a term for a synergetic use of sensing, communication and computing. Pervasive use of computing has seen a rapid increase in the current decade. This development has propagated in applied sport science and everyday life. The work presents a survey of recent developments in sport and leisure with emphasis on technology and computational techniques. A detailed analysis on new technological developments is performed. Sensors for position and motion detection, and such for equipment and physiological monitoring are discussed. Aspects of novel trends in communication technologies and data processing are outlined. Computational advancements have started a new trend - development of smart and intelligent systems for a wide range of applications - from model-based posture recognition to context awareness algorithms for nutrition monitoring. Examples particular to coaching and training are discussed. Selected tools for monitoring rules' compliance and automatic decision-making are outlined. Finally, applications in leisure and entertainment are presented, from systems supporting physical activity to systems providing motivation. It is concluded that the emphasis in future will shift from technologies to intelligent systems that allow for enhanced social interaction as efforts need to be made to improve user-friendliness and standardisation of measurement and transmission protocols.
Volcano Monitoring: A Case Study in Pervasive Computing
NASA Astrophysics Data System (ADS)
Peterson, Nina; Anusuya-Rangappa, Lohith; Shirazi, Behrooz A.; Song, Wenzhan; Huang, Renjie; Tran, Daniel; Chien, Steve; Lahusen, Rick
Recent advances in wireless sensor network technology have provided robust and reliable solutions for sophisticated pervasive computing applications such as inhospitable terrain environmental monitoring. We present a case study for developing a real-time pervasive computing system, called OASIS for optimized autonomous space in situ sensor-web, which combines ground assets (a sensor network) and space assets (NASA’s earth observing (EO-1) satellite) to monitor volcanic activities at Mount St. Helens. OASIS’s primary goals are: to integrate complementary space and in situ ground sensors into an interactive and autonomous sensorweb, to optimize power and communication resource management of the sensorweb and to provide mechanisms for seamless and scalable fusion of future space and in situ components. The OASIS in situ ground sensor network development addresses issues related to power management, bandwidth management, quality of service management, topology and routing management, and test-bed design. The space segment development consists of EO-1 architectural enhancements, feedback of EO-1 data into the in situ component, command and control integration, data ingestion and dissemination and field demonstrations.
ERIC Educational Resources Information Center
Reyes Alamo, Jose M.
2010-01-01
The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…
The impact of the pervasive information age on healthcare organizations.
Landry, Brett J L; Mahesh, Sathi; Hartman, Sandra J
2005-01-01
New information technologies place data on integrated information systems, and provide access via pervasive computing technologies. Pervasive computing puts computing power in the hands of all employees, available wherever it is needed. Integrated systems offer seamless data and process integration over diverse information systems. In this paper we look at the impact of these technologies on healthcare organizations in the future.
Web-Based Seamless Migration for Task-Oriented Mobile Distance Learning
ERIC Educational Resources Information Center
Zhang, Degan; Li, Yuan-chao; Zhang, Huaiyu; Zhang, Xinshang; Zeng, Guangping
2006-01-01
As a new kind of computing paradigm, pervasive computing will meet the requirements of human being that anybody maybe obtain services in anywhere and at anytime, task-oriented seamless migration is one of its applications. Apparently, the function of seamless mobility is suitable for mobile services, such as mobile Web-based learning. In this…
The Implications of Pervasive Computing on Network Design
NASA Astrophysics Data System (ADS)
Briscoe, R.
Mark Weiser's late-1980s vision of an age of calm technology with pervasive computing disappearing into the fabric of the world [1] has been tempered by an industry-driven vision with more of a feel of conspicuous consumption. In the modified version, everyone carries around consumer electronics to provide natural, seamless interactions both with other people and with the information world, particularly for eCommerce, but still through a pervasive computing fabric.
Using Multi-modal Sensing for Human Activity Modeling in the Real World
NASA Astrophysics Data System (ADS)
Harrison, Beverly L.; Consolvo, Sunny; Choudhury, Tanzeem
Traditionally smart environments have been understood to represent those (often physical) spaces where computation is embedded into the users' surrounding infrastructure, buildings, homes, and workplaces. Users of this "smartness" move in and out of these spaces. Ambient intelligence assumes that users are automatically and seamlessly provided with context-aware, adaptive information, applications and even sensing - though this remains a significant challenge even when limited to these specialized, instrumented locales. Since not all environments are "smart" the experience is not a pervasive one; rather, users move between these intelligent islands of computationally enhanced space while we still aspire to achieve a more ideal anytime, anywhere experience. Two key technological trends are helping to bridge the gap between these smart environments and make the associated experience more persistent and pervasive. Smaller and more computationally sophisticated mobile devices allow sensing, communication, and services to be more directly and continuously experienced by user. Improved infrastructure and the availability of uninterrupted data streams, for instance location-based data, enable new services and applications to persist across environments.
Pohjonen, Hanna; Ross, Peeter; Blickman, Johan G; Kamman, Richard
2007-01-01
Emerging technologies are transforming the workflows in healthcare enterprises. Computing grids and handheld mobile/wireless devices are providing clinicians with enterprise-wide access to all patient data and analysis tools on a pervasive basis. In this paper, emerging technologies are presented that provide computing grids and streaming-based access to image and data management functions, and system architectures that enable pervasive computing on a cost-effective basis. Finally, the implications of such technologies are investigated regarding the positive impacts on clinical workflows.
Building Efficient Wireless Infrastructures for Pervasive Computing Environments
ERIC Educational Resources Information Center
Sheng, Bo
2010-01-01
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…
A Secure Framework for Location Verification in Pervasive Computing
NASA Astrophysics Data System (ADS)
Liu, Dawei; Lee, Moon-Chuen; Wu, Dan
The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.
Pervasive healthcare as a scientific discipline.
Bardram, J E
2008-01-01
The OECD countries are facing a set of core challenges; an increasing elderly population; increasing number of chronic and lifestyle-related diseases; expanding scope of what medicine can do; and increasing lack of medical professionals. Pervasive healthcare asks how pervasive computing technology can be designed to meet these challenges. The objective of this paper is to discuss 'pervasive healthcare' as a research field and tries to establish how novel and distinct it is, compared to related work within biomedical engineering, medical informatics, and ubiquitous computing. The paper presents the research questions, approach, technologies, and methods of pervasive healthcare and discusses these in comparison to those of other related scientific disciplines. A set of central research themes are presented; monitoring and body sensor networks; pervasive assistive technologies; pervasive computing for hospitals; and preventive and persuasive technologies. Two projects illustrate the kind of research being done in pervasive healthcare. The first project is targeted at home-based monitoring of hypertension; the second project is designing context-aware technologies for hospitals. Both projects approach the healthcare challenges in a new way, apply a new type of research method, and come up with new kinds of technological solutions. 'Clinical proof-of-concept' is recommended as a new method for pervasive healthcare research; the method helps design and test pervasive healthcare technologies, and in ascertaining their clinical potential before large-scale clinical tests are needed. The paper concludes that pervasive healthcare as a research field and agenda is novel; it is addressing new emerging research questions, represents a novel approach, designs new types of technologies, and applies a new kind of research method.
Mobile healthcare information management utilizing Cloud Computing and Android OS.
Doukas, Charalampos; Pliakas, Thomas; Maglogiannis, Ilias
2010-01-01
Cloud Computing provides functionality for managing information data in a distributed, ubiquitous and pervasive manner supporting several platforms, systems and applications. This work presents the implementation of a mobile system that enables electronic healthcare data storage, update and retrieval using Cloud Computing. The mobile application is developed using Google's Android operating system and provides management of patient health records and medical images (supporting DICOM format and JPEG2000 coding). The developed system has been evaluated using the Amazon's S3 cloud service. This article summarizes the implementation details and presents initial results of the system in practice.
2005-07-01
policies in pervasive computing environments. In this context, the owner of information sources (e.g. user, sensor, application, or organization...work in decentralized trust management and semantic web technologies . Section 3 introduces an Information Disclosure Agent architecture for...Norman Sadeh July 2005 CMU-ISRI-05-113 School of Computer Science, Carnegie Mellon University 5000 Forbes Avenue, Pittsburgh, PA, 15213
Distributed Pervasive Worlds: The Case of Exergames
ERIC Educational Resources Information Center
Laine, Teemu H.; Sedano, Carolina Islas
2015-01-01
Pervasive worlds are computing environments where a virtual world converges with the physical world through context-aware technologies such as sensors. In pervasive worlds, technology is distributed among entities that may be distributed geographically. We explore the concept, possibilities, and challenges of distributed pervasive worlds in a case…
Studying the Elusive Experience in Pervasive Games
ERIC Educational Resources Information Center
Stenros, Jaakko; Waern, Annika; Montola, Markus
2012-01-01
Studying pervasive games is inherently difficult and different from studying computer or board games. This article builds upon the experiences of staging and studying several playful pervasive technology prototypes. It discusses the challenges and pitfalls of evaluating pervasive game prototypes and charts methods that have proven useful in…
Investigating the Randomness of Numbers
ERIC Educational Resources Information Center
Pendleton, Kenn L.
2009-01-01
The use of random numbers is pervasive in today's world. Random numbers have practical applications in such far-flung arenas as computer simulations, cryptography, gambling, the legal system, statistical sampling, and even the war on terrorism. Evaluating the randomness of extremely large samples is a complex, intricate process. However, the…
Students Develop Real-World Web and Pervasive Computing Systems.
ERIC Educational Resources Information Center
Tappert, Charles C.
In the academic year 2001-2002, Pace University (New York) Computer Science and Information Systems (CSIS) students developed real-world Web and pervasive computing systems for actual customers. This paper describes the general use of team projects in CSIS at Pace University, the real-world projects from this academic year, the benefits of…
Behavioral Reference Model for Pervasive Healthcare Systems.
Tahmasbi, Arezoo; Adabi, Sahar; Rezaee, Ali
2016-12-01
The emergence of mobile healthcare systems is an important outcome of application of pervasive computing concepts for medical care purposes. These systems provide the facilities and infrastructure required for automatic and ubiquitous sharing of medical information. Healthcare systems have a dynamic structure and configuration, therefore having an architecture is essential for future development of these systems. The need for increased response rate, problem limited storage, accelerated processing and etc. the tendency toward creating a new generation of healthcare system architecture highlight the need for further focus on cloud-based solutions for transfer data and data processing challenges. Integrity and reliability of healthcare systems are of critical importance, as even the slightest error may put the patients' lives in danger; therefore acquiring a behavioral model for these systems and developing the tools required to model their behaviors are of significant importance. The high-level designs may contain some flaws, therefor the system must be fully examined for different scenarios and conditions. This paper presents a software architecture for development of healthcare systems based on pervasive computing concepts, and then models the behavior of described system. A set of solutions are then proposed to improve the design's qualitative characteristics including, availability, interoperability and performance.
Addressing Security Challenges in Pervasive Computing Applications
2010-10-10
Personalized Privacy for Location - Based Services ", Transactions on Data Privacy, 2(1), 2009. 22. Indrakshi Ray, Indrajit Ray and Sudip Chakraborty, "An...Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Query m-Invariance: Pre- venting Query Disclosures in Continuous Location - Based Services ", Proceedings...location information is used to provide better services. Often such applications need continuous location - based services (LBS) where the mobile object must
ERIC Educational Resources Information Center
Schaffhauser, Dian
2010-01-01
Institutions already cater to the technology needs of students. According to the 2008 Campus Computing survey, 60 percent of colleges and universities offer pervasive or near-pervasive wireless; computers are as ubiquitous as water bottles; course management systems have become one-stop shops for class content; few classrooms lack projectors; and…
Pervasive Computing and Communication Technologies for U-Learning
ERIC Educational Resources Information Center
Park, Young C.
2014-01-01
The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…
Diabetes City: How Urban Game Design Strategies Can Help Diabetics
NASA Astrophysics Data System (ADS)
Knöll, Martin
Computer Games are about to leave their “electronic shells” and enter the city. So-called Serious Pervasive Games (SPGs) [1] allow for hybrid - simultaneously physical and virtual - experiences, applying technologies of ubiquitous computing, communication and “intelligent” interfaces. They begin to focus on non-entertaining purposes. The following article a) presents game design strategies as a missing link between pervasive computing, Ambient Intelligence and user’s everyday life. Therefore it spurs a discussion how Pervasive Healthcare focusing on the therapy and prevention of chronic diseases can benefit from urban game design strategies. b) Moreover the article presents the development and work in progress of “DiabetesCity“ - an educational game prototype for young diabetics.
ERIC Educational Resources Information Center
Anshari, Muhammad; Alas, Yabit; Guan, Lim Sei
2016-01-01
Utilizing online learning resources (OLR) from multi channels in learning activities promise extended benefits from traditional based learning-centred to a collaborative based learning-centred that emphasises pervasive learning anywhere and anytime. While compiling big data, cloud computing, and semantic web into OLR offer a broader spectrum of…
Mobility in hospital work: towards a pervasive computing hospital environment.
Morán, Elisa B; Tentori, Monica; González, Víctor M; Favela, Jesus; Martínez-Garcia, Ana I
2007-01-01
Handheld computers are increasingly being used by hospital workers. With the integration of wireless networks into hospital information systems, handheld computers can provide the basis for a pervasive computing hospital environment; to develop this designers need empirical information to understand how hospital workers interact with information while moving around. To characterise the medical phenomena we report the results of a workplace study conducted in a hospital. We found that individuals spend about half of their time at their base location, where most of their interactions occur. On average, our informants spent 23% of their time performing information management tasks, followed by coordination (17.08%), clinical case assessment (15.35%) and direct patient care (12.6%). We discuss how our results offer insights for the design of pervasive computing technology, and directions for further research and development in this field such as transferring information between heterogeneous devices and integration of the physical and digital domains.
'Designing Ambient Interactions - Pervasive Ergonomic Interfaces for Ageing Well' (DAI'10)
NASA Astrophysics Data System (ADS)
Geven, Arjan; Prost, Sebastian; Tscheligi, Manfred; Soldatos, John; Gonzalez, Mari Feli
The workshop will focus on novel computer based interaction mechanisms and interfaces, which boost natural interactivity and obviate the need for conventional tedious interfaces. Such interfaces are increasingly used in ambient intelligence environments and related applications, including application boosting elderly cognitive support, cognitive rehabilitation and Ambient Assisted Living (AAL). The aim of the workshop is to provide insights on the technological underpinnings of such interfaces, along with tools and techniques for their design and evaluation.
A Study of English Mobile Learning Applications at National Chengchi University
ERIC Educational Resources Information Center
Che, Pei-Chun; Lin, Han-Yi; Jang, Hung-Chin; Lien, Yao-Nan; Tsai, Tzu-Chieh
2009-01-01
The pervasive popularity of the Internet in the past decade has changed the way many students live and learn, in part, because modern technology has made it possible for learners to access Real-Time Multimedia information on the Internet, or research any topic of interest to them from virtually any computer anywhere in the world. Students can also…
Analysis of Pervasive Mobile Ad Hoc Routing Protocols
NASA Astrophysics Data System (ADS)
Qadri, Nadia N.; Liotta, Antonio
Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.
Preface to the special volume on the second Sandia Fracture Challenge
Kramer, Sharlotte Lorraine Bolyard; Boyce, Brad
2016-01-01
In this study, ductile failure of structural metals is a pervasive issue for applications such as automotive manufacturing, transportation infrastructures, munitions and armor, and energy generation. Experimental investigation of all relevant failure scenarios is intractable, requiring reliance on computation models. Our confidence in model predictions rests on unbiased assessments of the entire predictive capability, including the mathematical formulation, numerical implementation, calibration, and execution.
Dynamic Pervasive Storytelling in Long Lasting Learning Games
ERIC Educational Resources Information Center
Pløhn, Trygve; Louchart, Sandy; Aalberg, Trond
2015-01-01
Pervasive gaming is a reality-based gaming genre originating from alternative theatrical forms in which the performance becomes a part of the players' everyday life. In recent years much research has been done on pervasive gaming and its potential applications towards specific domains. Pervasive games have been effective with regards to…
Mobile Autonomous Sensing Unit (MASU): A Framework That Supports Distributed Pervasive Data Sensing
Medina, Esunly; Lopez, David; Meseguer, Roc; Ochoa, Sergio F.; Royo, Dolors; Santos, Rodrigo
2016-01-01
Pervasive data sensing is a major issue that transverses various research areas and application domains. It allows identifying people’s behaviour and patterns without overwhelming the monitored persons. Although there are many pervasive data sensing applications, they are typically focused on addressing specific problems in a single application domain, making them difficult to generalize or reuse. On the other hand, the platforms for supporting pervasive data sensing impose restrictions to the devices and operational environments that make them unsuitable for monitoring loosely-coupled or fully distributed work. In order to help address this challenge this paper present a framework that supports distributed pervasive data sensing in a generic way. Developers can use this framework to facilitate the implementations of their applications, thus reducing complexity and effort in such an activity. The framework was evaluated using simulations and also through an empirical test, and the obtained results indicate that it is useful to support such a sensing activity in loosely-coupled or fully distributed work scenarios. PMID:27409617
Multimodal and ubiquitous computing systems: supporting independent-living older users.
Perry, Mark; Dowdall, Alan; Lines, Lorna; Hone, Kate
2004-09-01
We document the rationale and design of a multimodal interface to a pervasive/ubiquitous computing system that supports independent living by older people in their own homes. The Millennium Home system involves fitting a resident's home with sensors--these sensors can be used to trigger sequences of interaction with the resident to warn them about dangerous events, or to check if they need external help. We draw lessons from the design process and conclude the paper with implications for the design of multimodal interfaces to ubiquitous systems developed for the elderly and in healthcare, as well as for more general ubiquitous computing applications.
Machine learning methods for classifying human physical activity from on-body accelerometers.
Mannini, Andrea; Sabatini, Angelo Maria
2010-01-01
The use of on-body wearable sensors is widespread in several academic and industrial domains. Of great interest are their applications in ambulatory monitoring and pervasive computing systems; here, some quantitative analysis of human motion and its automatic classification are the main computational tasks to be pursued. In this paper, we discuss how human physical activity can be classified using on-body accelerometers, with a major emphasis devoted to the computational algorithms employed for this purpose. In particular, we motivate our current interest for classifiers based on Hidden Markov Models (HMMs). An example is illustrated and discussed by analysing a dataset of accelerometer time series.
Cloud@Home: A New Enhanced Computing Paradigm
NASA Astrophysics Data System (ADS)
Distefano, Salvatore; Cunsolo, Vincenzo D.; Puliafito, Antonio; Scarpa, Marco
Cloud computing is a distributed computing paradigm that mixes aspects of Grid computing, ("… hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities" (Foster, 2002)) Internet Computing ("…a computing platform geographically distributed across the Internet" (Milenkovic et al., 2003)), Utility computing ("a collection of technologies and business practices that enables computing to be delivered seamlessly and reliably across multiple computers, ... available as needed and billed according to usage, much like water and electricity are today" (Ross & Westerman, 2004)) Autonomic computing ("computing systems that can manage themselves given high-level objectives from administrators" (Kephart & Chess, 2003)), Edge computing ("… provides a generic template facility for any type of application to spread its execution across a dedicated grid, balancing the load …" Davis, Parikh, & Weihl, 2004) and Green computing (a new frontier of Ethical computing1 starting from the assumption that in next future energy costs will be related to the environment pollution).
NASA Astrophysics Data System (ADS)
Nagel, David J.
2000-11-01
The coordinated exploitation of modern communication, micro- sensor and computer technologies makes it possible to give global reach to our senses. Web-cameras for vision, web- microphones for hearing and web-'noses' for smelling, plus the abilities to sense many factors we cannot ordinarily perceive, are either available or will be soon. Applications include (1) determination of weather and environmental conditions on dense grids or over large areas, (2) monitoring of energy usage in buildings, (3) sensing the condition of hardware in electrical power distribution and information systems, (4) improving process control and other manufacturing, (5) development of intelligent terrestrial, marine, aeronautical and space transportation systems, (6) managing the continuum of routine security monitoring, diverse crises and military actions, and (7) medicine, notably the monitoring of the physiology and living conditions of individuals. Some of the emerging capabilities, such as the ability to measure remotely the conditions inside of people in real time, raise interesting social concerns centered on privacy issues. Methods for sensor data fusion and designs for human-computer interfaces are both crucial for the full realization of the potential of pervasive sensing. Computer-generated virtual reality, augmented with real-time sensor data, should be an effective means for presenting information from distributed sensors.
A Service-oriented Approach towards Context-aware Mobile Learning Management Systems
2010-07-01
towards a pervasive university. Keywords-context-aware computing, service-oriented archi- tecture, mobile computing, elearning , learn management sys- tem I...usage of device- specific features provide support for various ubiquitous and pervasive eLearning scenarios [2][3]. By knowing where the user currently...data from the mobile device towards a context-aware mobile LMS. II. BASIC CONCEPTS For a better understanding of the presented eLearning sce- narios
Smart Classroom: Bringing Pervasive Computing into Distance Learning
NASA Astrophysics Data System (ADS)
Shi, Yuanchun; Qin, Weijun; Suo, Yue; Xiao, Xin
In recent years, distance learning has increasingly become one of themost important applications on the internet and is being discussed and studied by various universities, institutes and companies. The Web/Internet provides relatively easy ways to publish hyper-linked multimedia content for more audiences. Yet, we find that most of the courseware are simply shifted from textbook to HTML files. However, in ost cases the teacher's live instruction is very important for catching the attention and interest of the students. That's why Real-Time Interactive Virtual Classroom (RTIVC) always plays an indispensable role in distance learning, where teachers nd students located in different places can take part in the class synchronously through certain multimedia communication systems and obtain real-time and mediarich interactions using Pervasive Computing technologies [1]. The Classroom 2000 project [2] at GIT has been devoted to the automated capturing of the classroom experience. Likewise, the Smart Classroom project [3] at our institute is focused on Tele-education. Most currently deployed real-time Tele-education systems are desktop-based, in which the teacher's experience is totally different from teaching in a real classroom.
Wearable Notification via Dissemination Service in a Pervasive Computing Environment
2015-09-01
context, state, and environment in a manner that would be transparent to a Soldier’s common operations. 15. SUBJECT TERMS pervasive computing, Android ...of user context shifts, i.e., changes in the user’s position, history , workflow, or resource interests. If the PCE is described as a 2-component...convenient viewing on the Glass’s screen just above the line of sight. All of the software developed uses Google’s Android open-source software stack
Zao, John K.; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodríguez Méndez, Sergio José; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping
2014-01-01
EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system. PMID:24917804
Zao, John K; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodríguez Méndez, Sergio José; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping
2014-01-01
EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system.
Ciani, Oriana; Piccini, Luca; Parini, Sergio; Rullo, Alessia; Bagnoli, Franco; Marti, Patrizia; Andreoni, Giuseppe
2008-01-01
Pervasive computing research is introducing new perspectives in a wide range of applications, including healthcare domain. In this study we explore the possibility to realize a prototype of a system for unobtrusive recording and monitoring of multiple biological parameters on premature newborns hospitalized in the Neonatal Intensive Care Unit (NICU). It consists of three different units: a sensitized belt for Electrocardiogram (ECG) and chest dilatation monitoring, augmented with extrinsic transducers for temperature and respiratory activity measure, a device for signals pre-processing, sampling and transmission through Bluetooth(R) (BT) technology to a remote PC station and a software for data capture and post-processing. Preliminary results obtained by monitoring babies just discharged from the ward demonstrated the feasibility of the unobtrusive monitoring on this kind of subjects and open a new scenario for premature newborns monitoring and developmental cares practice in NICU.
Ethical Responsibility Key to Computer Security.
ERIC Educational Resources Information Center
Lynn, M. Stuart
1989-01-01
The pervasiveness of powerful computers and computer networks has raised the specter of new forms of abuse and of concomitant ethical issues. Blurred boundaries, hackers, the Computer Worm, ethical issues, and implications for academic institutions are discussed. (MLW)
A Pervasive Parallel Processing Framework for Data Visualization and Analysis at Extreme Scale
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ma, Kwan-Liu
Most of today’s visualization libraries and applications are based off of what is known today as the visualization pipeline. In the visualization pipeline model, algorithms are encapsulated as “filtering” components with inputs and outputs. These components can be combined by connecting the outputs of one filter to the inputs of another filter. The visualization pipeline model is popular because it provides a convenient abstraction that allows users to combine algorithms in powerful ways. Unfortunately, the visualization pipeline cannot run effectively on exascale computers. Experts agree that the exascale machine will comprise processors that contain many cores. Furthermore, physical limitations willmore » prevent data movement in and out of the chip (that is, between main memory and the processing cores) from keeping pace with improvements in overall compute performance. To use these processors to their fullest capability, it is essential to carefully consider memory access. This is where the visualization pipeline fails. Each filtering component in the visualization library is expected to take a data set in its entirety, perform some computation across all of the elements, and output the complete results. The process of iterating over all elements must be repeated in each filter, which is one of the worst possible ways to traverse memory when trying to maximize the number of executions per memory access. This project investigates a new type of visualization framework that exhibits a pervasive parallelism necessary to run on exascale machines. Our framework achieves this by defining algorithms in terms of functors, which are localized, stateless operations. Functors can be composited in much the same way as filters in the visualization pipeline. But, functors’ design allows them to be concurrently running on massive amounts of lightweight threads. Only with such fine-grained parallelism can we hope to fill the billions of threads we expect will be necessary for efficient computation on an exascale computer. This project concludes with a functional prototype containing pervasively parallel algorithms that perform demonstratively well on many-core processors. These algorithms are fundamental for performing data analysis and visualization at extreme scale.« less
ERIC Educational Resources Information Center
Hellweg, Susan A.; And Others
A survey of the Fortune 500 corporations was conducted to ascertain the pervasiveness and perceived impact of five electronic communication technologies (electronic mail, videotex, interactive computers, video teleconferencing, and word processing). Ninety-four corporations responded to a 53-item questionnaire and follow-up survey. Analysis of the…
Pervasive Knowledge, Social Networks, and Cloud Computing: E-Learning 2.0
ERIC Educational Resources Information Center
Anshari, Muhammad; Alas, Yabit; Guan, Lim Sei
2015-01-01
Embedding Web 2.0 in learning processes has extended learning from traditional based learning-centred to a collaborative based learning-centred institution that emphasises learning anywhere and anytime. While deploying Semantic Web into e-learning offers a broader spectrum of pervasive knowledge acquisition to enrich users' experience in learning.…
Pervasive Sensing: Addressing the Heterogeneity Problem
NASA Astrophysics Data System (ADS)
O'Grady, Michael J.; Murdoch, Olga; Kroon, Barnard; Lillis, David; Carr, Dominic; Collier, Rem W.; O'Hare, Gregory M. P.
2013-06-01
Pervasive sensing is characterized by heterogeneity across a number of dimensions. This raises significant problems for those designing, implementing and deploying sensor networks, irrespective of application domain. Such problems include for example, issues of data provenance and integrity, security, and privacy amongst others. Thus engineering a network that is fit-for-purpose represents a significant challenge. In this paper, the issue of heterogeneity is explored from the perspective of those who seek to harness a pervasive sensing element in their applications. A initial solution is proposed based on the middleware construct.
Egri-Nagy, Attila; Nehaniv, Chrystopher L
2008-01-01
Biochemical and genetic regulatory networks are often modeled by Petri nets. We study the algebraic structure of the computations carried out by Petri nets from the viewpoint of algebraic automata theory. Petri nets comprise a formalized graphical modeling language, often used to describe computation occurring within biochemical and genetic regulatory networks, but the semantics may be interpreted in different ways in the realm of automata. Therefore, there are several different ways to turn a Petri net into a state-transition automaton. Here, we systematically investigate different conversion methods and describe cases where they may yield radically different algebraic structures. We focus on the existence of group components of the corresponding transformation semigroups, as these reflect symmetries of the computation occurring within the biological system under study. Results are illustrated by applications to the Petri net modelling of intermediary metabolism. Petri nets with inhibition are shown to be computationally rich, regardless of the particular interpretation method. Along these lines we provide a mathematical argument suggesting a reason for the apparent all-pervasiveness of inhibitory connections in living systems.
Pervasive Computing Goes to School
ERIC Educational Resources Information Center
Plymale, William O.
2005-01-01
In 1991 Mark Weiser introduced the idea of ubiquitous computing: a world in which computers and associated technologies become invisible, and thus indistinguishable from everyday life. This invisible computing is accomplished by means of "embodied virtuality," the process of drawing computers into the physical world. Weiser proposed that…
From computers to ubiquitous computing by 2010: health care.
Aziz, Omer; Lo, Benny; Pansiot, Julien; Atallah, Louis; Yang, Guang-Zhong; Darzi, Ara
2008-10-28
Over the past decade, miniaturization and cost reduction in semiconductors have led to computers smaller in size than a pinhead with powerful processing abilities that are affordable enough to be disposable. Similar advances in wireless communication, sensor design and energy storage have meant that the concept of a truly pervasive 'wireless sensor network', used to monitor environments and objects within them, has become a reality. The need for a wireless sensor network designed specifically for human body monitoring has led to the development of wireless 'body sensor network' (BSN) platforms composed of tiny integrated microsensors with on-board processing and wireless data transfer capability. The ubiquitous computing abilities of BSNs offer the prospect of continuous monitoring of human health in any environment, be it home, hospital, outdoors or the workplace. This pervasive technology comes at a time when Western world health care costs have sharply risen, reflected by increasing expenditure on health care as a proportion of gross domestic product over the last 20 years. Drivers of this rise include an ageing post 'baby boom' population, higher incidence of chronic disease and the need for earlier diagnosis. This paper outlines the role of pervasive health care technologies in providing more efficient health care.
Critical branching neural networks.
Kello, Christopher T
2013-01-01
It is now well-established that intrinsic variations in human neural and behavioral activity tend to exhibit scaling laws in their fluctuations and distributions. The meaning of these scaling laws is an ongoing matter of debate between isolable causes versus pervasive causes. A spiking neural network model is presented that self-tunes to critical branching and, in doing so, simulates observed scaling laws as pervasive to neural and behavioral activity. These scaling laws are related to neural and cognitive functions, in that critical branching is shown to yield spiking activity with maximal memory and encoding capacities when analyzed using reservoir computing techniques. The model is also shown to account for findings of pervasive 1/f scaling in speech and cued response behaviors that are difficult to explain by isolable causes. Issues and questions raised by the model and its results are discussed from the perspectives of physics, neuroscience, computer and information sciences, and psychological and cognitive sciences.
A Conceptual Framework and Principles for Trusted Pervasive Health
Blobel, Bernd Gerhard; Seppälä, Antto Veikko; Sorvari, Hannu Olavi; Nykänen, Pirkko Anneli
2012-01-01
Background Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept—pervasive health—which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. Objective This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and polices which can make pervasive health trustworthy. Methods In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. Results In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that any stakeholder or system collecting or processing health data must support transparency and shall publish its trust and privacy attributes and even its domain specific policies. Conclusions The developed principles enable trustworthiness and guarantee privacy in pervasive health. The implementation of principles requires new infrastructural services such as trust verification and policy conflict resolution. After implementation, the accuracy and usability of principles should be analyzed. PMID:22481297
A conceptual framework and principles for trusted pervasive health.
Ruotsalainen, Pekka Sakari; Blobel, Bernd Gerhard; Seppälä, Antto Veikko; Sorvari, Hannu Olavi; Nykänen, Pirkko Anneli
2012-04-06
Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept-pervasive health-which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and policies which can make pervasive health trustworthy. In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that any stakeholder or system collecting or processing health data must support transparency and shall publish its trust and privacy attributes and even its domain specific policies. The developed principles enable trustworthiness and guarantee privacy in pervasive health. The implementation of principles requires new infrastructural services such as trust verification and policy conflict resolution. After implementation, the accuracy and usability of principles should be analyzed.
Introduction to This Special Issue on Context-Aware Computing.
ERIC Educational Resources Information Center
Moran, Thomas P.; Dourish, Paul
2001-01-01
Discusses pervasive, or ubiquitous, computing; explains the notion of context; and defines context-aware computing as the key to disperse and enmesh computation into our lives. Considers context awareness in human-computer interaction and describes the broad topic areas of the essays included in this special issue. (LRW)
Augmenting Trust Establishment in Dynamic Systems with Social Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lagesse, Brent J; Kumar, Mohan; Venkatesh, Svetha
2010-01-01
Social networking has recently flourished in popularity through the use of social websites. Pervasive computing resources have allowed people stay well-connected to each other through access to social networking resources. We take the position that utilizing information produced by relationships within social networks can assist in the establishment of trust for other pervasive computing applications. Furthermore, we describe how such a system can augment a sensor infrastructure used for event observation with information from mobile sensors (ie, mobile phones with cameras) controlled by potentially untrusted third parties. Pervasive computing systems are invisible systems, oriented around the user. As a result,more » many future pervasive systems are likely to include a social aspect to the system. The social communities that are developed in these systems can augment existing trust mechanisms with information about pre-trusted entities or entities to initially consider when beginning to establish trust. An example of such a system is the Collaborative Virtual Observation (CoVO) system fuses sensor information from disaparate sources in soft real-time to recreate a scene that provides observation of an event that has recently transpired. To accomplish this, CoVO must efficently access services whilst protecting the data from corruption from unknown remote nodes. CoVO combines dynamic service composition with virtual observation to utilize existing infrastructure with third party services available in the environment. Since these services are not under the control of the system, they may be unreliable or malicious. When an event of interest occurs, the given infrastructure (bus cameras, etc.) may not sufficiently cover the necessary information (be it in space, time, or sensor type). To enhance observation of the event, infrastructure is augmented with information from sensors in the environment that the infrastructure does not control. These sensors may be unreliable, uncooperative, or even malicious. Additionally, to execute queries in soft real-time, processing must be distributed to available systems in the environment. We propose to use information from social networks to satisfy these requirements. In this paper, we present our position that knowledge gained from social activities can be used to augment trust mechanisms in pervasive computing. The system uses social behavior of nodes to predict a subset that it wants to query for information. In this context, social behavior such as transit patterns and schedules (which can be used to determine if a queried node is likely to be reliable) or known relationships, such as a phone's address book, that can be used to determine networks of nodes that may also be able to assist in retrieving information. Neither implicit nor explicit relationships necessarily imply that the user trusts an entity, but rather will provide a starting place for establishing trust. The proposed framework utilizes social network information to assist in trust establishment when third-party sensors are used for sensing events.« less
ICT and the future of healthcare: Aspects of pervasive health monitoring.
Haluza, Daniela; Jungwirth, David
2018-01-01
Along with the digital revolution, information and communication technology applications are currently transforming the delivery of health and social care services. This paper investigates prevailing opinions toward future technology-based healthcare solutions among Austrian healthcare professionals. During a biphasic online Delphi survey, panelists rated expected outcomes of two future scenarios describing pervasive health monitoring applications. Experts perceived that the scenarios were highly innovative, but only moderately desirable, and that their implementation could especially improve patients' knowledge, quality of healthcare, and living standard. Contrarily, monetary aspects, technical prerequisites, and data security were identified as key obstacles. We further compared the impact of professional affiliation. Clearly, opinions toward pervasive healthcare differed between the interest groups, medical professionals, patient advocates, and administrative personnel. These data suggest closer collaborations between stakeholder groups to harmonize differences in expectations regarding pervasive health monitoring.
On the usage of ultrasound computational models for decision making under ambiguity
NASA Astrophysics Data System (ADS)
Dib, Gerges; Sexton, Samuel; Prowant, Matthew; Crawford, Susan; Diaz, Aaron
2018-04-01
Computer modeling and simulation is becoming pervasive within the non-destructive evaluation (NDE) industry as a convenient tool for designing and assessing inspection techniques. This raises a pressing need for developing quantitative techniques for demonstrating the validity and applicability of the computational models. Computational models provide deterministic results based on deterministic and well-defined input, or stochastic results based on inputs defined by probability distributions. However, computational models cannot account for the effects of personnel, procedures, and equipment, resulting in ambiguity about the efficacy of inspections based on guidance from computational models only. In addition, ambiguity arises when model inputs, such as the representation of realistic cracks, cannot be defined deterministically, probabilistically, or by intervals. In this work, Pacific Northwest National Laboratory demonstrates the ability of computational models to represent field measurements under known variabilities, and quantify the differences using maximum amplitude and power spectrum density metrics. Sensitivity studies are also conducted to quantify the effects of different input parameters on the simulation results.
Mihailidis, Alex; Carmichael, Brent; Boger, Jennifer
2004-09-01
This paper discusses the use of computer vision in pervasive healthcare systems, specifically in the design of a sensing agent for an intelligent environment that assists older adults with dementia during an activity of daily living. An overview of the techniques applied in this particular example is provided, along with results from preliminary trials completed using the new sensing agent. A discussion of the results obtained to date is presented, including technical and social issues that remain for the advancement and acceptance of this type of technology within pervasive healthcare.
The MADE Reference Information Model for Interoperable Pervasive Telemedicine Systems.
Fung, Nick L S; Jones, Valerie M; Hermens, Hermie J
2017-03-23
The main objective is to develop and validate a reference information model (RIM) to support semantic interoperability of pervasive telemedicine systems. The RIM is one component within a larger, computer-interpretable "MADE language" developed by the authors in the context of the MobiGuide project. To validate our RIM, we applied it to a clinical guideline for patients with gestational diabetes mellitus (GDM). The RIM is derived from a generic data flow model of disease management which comprises a network of four types of concurrent processes: Monitoring (M), Analysis (A), Decision (D) and Effectuation (E). This resulting MADE RIM, which was specified using the formal Vienna Development Method (VDM), includes six main, high-level data types representing measurements, observations, abstractions, action plans, action instructions and control instructions. The authors applied the MADE RIM to the complete GDM guideline and derived from it a domain information model (DIM) comprising 61 archetypes, specifically 1 measurement, 8 observation, 10 abstraction, 18 action plan, 3 action instruction and 21 control instruction archetypes. It was observed that there are six generic patterns for transforming different guideline elements into MADE archetypes, although a direct mapping does not exist in some cases. Most notable examples are notifications to the patient and/or clinician as well as decision conditions which pertain to specific stages in the therapy. The results provide evidence that the MADE RIM is suitable for modelling clinical data in the design of pervasive telemedicine systems. Together with the other components of the MADE language, the MADE RIM supports development of pervasive telemedicine systems that are interoperable and independent of particular clinical applications.
Applying Utility Functions to Adaptation Planning for Home Automation Applications
NASA Astrophysics Data System (ADS)
Bratskas, Pyrros; Paspallis, Nearchos; Kakousis, Konstantinos; Papadopoulos, George A.
A pervasive computing environment typically comprises multiple embedded devices that may interact together and with mobile users. These users are part of the environment, and they experience it through a variety of devices embedded in the environment. This perception involves technologies which may be heterogeneous, pervasive, and dynamic. Due to the highly dynamic properties of such environments, the software systems running on them have to face problems such as user mobility, service failures, or resource and goal changes which may happen in an unpredictable manner. To cope with these problems, such systems must be autonomous and self-managed. In this chapter we deal with a special kind of a ubiquitous environment, a smart home environment, and introduce a user-preference-based model for adaptation planning. The model, which dynamically forms a set of configuration plans for resources, reasons automatically and autonomously, based on utility functions, on which plan is likely to best achieve the user's goals with respect to resource availability and user needs.
Ni, Qin; Patterson, Timothy; Cleland, Ian; Nugent, Chris
2016-08-01
Activity recognition is an intrinsic component of many pervasive computing and ambient intelligent solutions. This has been facilitated by an explosion of technological developments in the area of wireless sensor network, wearable and mobile computing. Yet, delivering robust activity recognition, which could be deployed at scale in a real world environment, still remains an active research challenge. Much of the existing literature to date has focused on applying machine learning techniques to pre-segmented data collected in controlled laboratory environments. Whilst this approach can provide valuable ground truth information from which to build recognition models, these techniques often do not function well when implemented in near real time applications. This paper presents the application of a multivariate online change detection algorithm to dynamically detect the starting position of windows for the purposes of activity recognition. Copyright © 2016 Elsevier Inc. All rights reserved.
Kuroda, Hiroaki; Yoshida, Tatsuya; Sakao, Yukinori
2017-12-01
We used the powered vascular staple (PVS) instead of the conventional staple technique [the utilization of the powered linier cutter (PLC)] or ligation for total 23 segmental or subsegmental bronchi with less than 10 mm in the bronchial luminal size on computed tomography (CT) in thoracoscopic segmentectomy. Our results suggested that the availability of the PVS represents a novel advance in the armamentarium and may have a possibility of being pervasive widely however, more observative periods and further sample accumulation are needed.
Vehicle Lightweighting: Challenges and Opportunities with Aluminum
NASA Astrophysics Data System (ADS)
Sachdev, Anil K.; Mishra, Raja K.; Mahato, Anirban; Alpas, Ahmet
Rising energy costs, consumer preferences and regulations drive requirements for fuel economy, performance, comfort, safety and cost of future automobiles. These conflicting situations offer challenges for vehicle lightweighting, for which aluminum applications are key. This paper describes product design needs and materials and process development opportunities driven by theoretical, experimental and modeling tools in the area of sheet and castings. Computational tools and novel experimental techniques used in their development are described. The paper concludes with challenges that lie ahead for pervasive use of aluminum and the necessary fundamental R&D that is still needed.
Forecasting Occurrences of Activities.
Minor, Bryan; Cook, Diane J
2017-07-01
While activity recognition has been shown to be valuable for pervasive computing applications, less work has focused on techniques for forecasting the future occurrence of activities. We present an activity forecasting method to predict the time that will elapse until a target activity occurs. This method generates an activity forecast using a regression tree classifier and offers an advantage over sequence prediction methods in that it can predict expected time until an activity occurs. We evaluate this algorithm on real-world smart home datasets and provide evidence that our proposed approach is most effective at predicting activity timings.
Optimized Materials From First Principles Simulations: Are We There Yet?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Galli, G; Gygi, F
2005-07-26
In the past thirty years, the use of scientific computing has become pervasive in all disciplines: collection and interpretation of most experimental data is carried out using computers, and physical models in computable form, with various degrees of complexity and sophistication, are utilized in all fields of science. However, full prediction of physical and chemical phenomena based on the basic laws of Nature, using computer simulations, is a revolution still in the making, and it involves some formidable theoretical and computational challenges. We illustrate the progress and successes obtained in recent years in predicting fundamental properties of materials in condensedmore » phases and at the nanoscale, using ab-initio, quantum simulations. We also discuss open issues related to the validation of the approximate, first principles theories used in large scale simulations, and the resulting complex interplay between computation and experiment. Finally, we describe some applications, with focus on nanostructures and liquids, both at ambient and under extreme conditions.« less
Envisioning future cognitive telerehabilitation technologies: a co-design process with clinicians.
How, Tuck-Voon; Hwang, Amy S; Green, Robin E A; Mihailidis, Alex
2017-04-01
Purpose Cognitive telerehabilitation is the concept of delivering cognitive assessment, feedback, or therapeutic intervention at a distance through technology. With the increase of mobile devices, wearable sensors, and novel human-computer interfaces, new possibilities are emerging to expand the cognitive telerehabilitation paradigm. This research aims to: (1) explore design opportunities and considerations when applying emergent pervasive computing technologies to cognitive telerehabilitation and (2) develop a generative co-design process for use with rehabilitation clinicians. Methods We conducted a custom co-design process that used design cards, probes, and design sessions with traumatic brain injury (TBI) clinicians. All field notes and transcripts were analyzed qualitatively. Results Potential opportunities for TBI cognitive telerehabilitation exist in the areas of communication competency, executive functioning, emotional regulation, energy management, assessment, and skill training. Designers of TBI cognitive telerehabilitation technologies should consider how technologies are adapted to a patient's physical/cognitive/emotional state, their changing rehabilitation trajectory, and their surrounding life context (e.g. social considerations). Clinicians were receptive to our co-design approach. Conclusion Pervasive computing offers new opportunities for life-situated cognitive telerehabilitation. Convivial design methods, such as this co-design process, are a helpful way to explore new design opportunities and an important space for further methodological development. Implications for Rehabilitation Designers of rehabilitation technologies should consider how to extend current design methods in order to facilitate the creative contribution of rehabilitation stakeholders. This co-design approach enables a fuller participation from rehabilitation clinicians at the front-end of design. Pervasive computing has the potential to: extend the duration and intensity of cognitive telerehabilitation training (including the delivery of 'booster' sessions or maintenance therapies); provide assessment and treatment in the context of a traumatic brain injury (TBI) patient's everyday life (thereby enhancing generalization); and permit time-sensitive interventions. Long-term use of pervasive computing for TBI cognitive telerehabilitation should take into account a patient's changing recovery trajectory, their meaningful goals, and their journey from loss to redefinition.
Slovak High School Students' Attitudes toward Computers
ERIC Educational Resources Information Center
Kubiatko, Milan; Halakova, Zuzana; Nagyova, Sona; Nagy, Tibor
2011-01-01
The pervasive involvement of information and communication technologies and computers in our daily lives influences changes of attitude toward computers. We focused on finding these ecological effects in the differences in computer attitudes as a function of gender and age. A questionnaire with 34 Likert-type items was used in our research. The…
Emerging Needs for Pervasive Passive Wireless Sensor Networks on Aerospace Vehicles
NASA Technical Reports Server (NTRS)
Wilson, William C.; Juarez, Peter D.
2014-01-01
NASA is investigating passive wireless sensor technology to reduce instrumentation mass and volume in ground testing, air flight, and space exploration applications. Vehicle health monitoring systems (VHMS) are desired on all aerospace programs to ensure the safety of the crew and the vehicles. Pervasive passive wireless sensor networks facilitate VHMS on aerospace vehicles. Future wireless sensor networks on board aerospace vehicles will be heterogeneous and will require active and passive network systems. Since much has been published on active wireless sensor networks, this work will focus on the need for passive wireless sensor networks on aerospace vehicles. Several passive wireless technologies such as microelectromechanical systems MEMS, SAW, backscatter, and chipless RFID techniques, have all shown potential to meet the pervasive sensing needs for aerospace VHMS applications. A SAW VHMS application will be presented. In addition, application areas including ground testing, hypersonic aircraft and spacecraft will be explored along with some of the harsh environments found in aerospace applications.
The internet of things and the development of network technology in China
NASA Astrophysics Data System (ADS)
Wang, Ruxin; Zhao, Jianzhen; Ma, Hangtong
2018-04-01
The English name of the Internet of Things the Internet of Things, referred to as: the IOT. Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.
Ethics Regulation in Social Computing Research: Examining the Role of Institutional Review Boards.
Vitak, Jessica; Proferes, Nicholas; Shilton, Katie; Ashktorab, Zahra
2017-12-01
The parallel rise of pervasive data collection platforms and computational methods for collecting, analyzing, and drawing inferences from large quantities of user data has advanced social computing research, investigating digital traces to understand mediated behaviors of individuals, groups, and societies. At the same time, methods employed to access these data have raised questions about ethical research practices. This article provides insights into U.S. institutional review boards' (IRBs) attitudes and practices regulating social computing research. Through descriptive and inferential analysis of survey data from staff at 59 IRBs at research universities, we examine how IRBs evaluate the growing variety of studies using pervasive digital data. Findings unpack the difficulties IRB staff face evaluating increasingly technical research proposals while highlighting the belief in their ability to surmount these difficulties. They also indicate a lack of consensus among IRB staff about what should be reviewed and a willingness to work closely with researchers.
A Formalisation of Adaptable Pervasive Flows
NASA Astrophysics Data System (ADS)
Bucchiarone, Antonio; Lafuente, Alberto Lluch; Marconi, Annapaola; Pistore, Marco
Adaptable Pervasive Flows is a novel workflow-based paradigm for the design and execution of pervasive applications, where dynamic workflows situated in the real world are able to modify their execution in order to adapt to changes in their environment. In this paper, we study a formalisation of such flows by means of a formal flow language. More precisely, we define APFoL (Adaptable Pervasive Flow Language) and formalise its textual notation by encoding it in Blite, a formalisation of WS-BPEL. The encoding in Blite equips the language with a formal semantics and enables the use of automated verification techniques. We illustrate the approach with an example of a Warehouse Case Study.
The Experimental Mathematician: The Pleasure of Discovery and the Role of Proof
ERIC Educational Resources Information Center
Borwein, Jonathan M.
2005-01-01
The emergence of powerful mathematical computing environments, the growing availability of correspondingly powerful (multi-processor) computers and the pervasive presence of the Internet allow for mathematicians, students and teachers, to proceed heuristically and "quasi-inductively." We may increasingly use symbolic and numeric computation,…
ERIC Educational Resources Information Center
Buche, Mari W.; Davis, Larry R.; Vician, Chelley
2007-01-01
Computers are pervasive in business and education, and it would be easy to assume that all individuals embrace technology. However, evidence shows that roughly 30 to 40 percent of individuals experience some level of computer anxiety. Many academic programs involve computing-intensive courses, but the actual effects of this exposure on computer…
Context-aware access control for pervasive access to process-based healthcare systems.
Koufi, Vassiliki; Vassilacopoulos, George
2008-01-01
Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.
Explicit Content Caching at Mobile Edge Networks with Cross-Layer Sensing
Chen, Lingyu; Su, Youxing; Luo, Wenbin; Hong, Xuemin; Shi, Jianghong
2018-01-01
The deployment density and computational power of small base stations (BSs) are expected to increase significantly in the next generation mobile communication networks. These BSs form the mobile edge network, which is a pervasive and distributed infrastructure that can empower a variety of edge/fog computing applications. This paper proposes a novel edge-computing application called explicit caching, which stores selective contents at BSs and exposes such contents to local users for interactive browsing and download. We formulate the explicit caching problem as a joint content recommendation, caching, and delivery problem, which aims to maximize the expected user quality-of-experience (QoE) with varying degrees of cross-layer sensing capability. Optimal and effective heuristic algorithms are presented to solve the problem. The theoretical performance bounds of the explicit caching system are derived in simplified scenarios. The impacts of cache storage space, BS backhaul capacity, cross-layer information, and user mobility on the system performance are simulated and discussed in realistic scenarios. Results suggest that, compared with conventional implicit caching schemes, explicit caching can better exploit the mobile edge network infrastructure for personalized content dissemination. PMID:29565313
Explicit Content Caching at Mobile Edge Networks with Cross-Layer Sensing.
Chen, Lingyu; Su, Youxing; Luo, Wenbin; Hong, Xuemin; Shi, Jianghong
2018-03-22
The deployment density and computational power of small base stations (BSs) are expected to increase significantly in the next generation mobile communication networks. These BSs form the mobile edge network, which is a pervasive and distributed infrastructure that can empower a variety of edge/fog computing applications. This paper proposes a novel edge-computing application called explicit caching, which stores selective contents at BSs and exposes such contents to local users for interactive browsing and download. We formulate the explicit caching problem as a joint content recommendation, caching, and delivery problem, which aims to maximize the expected user quality-of-experience (QoE) with varying degrees of cross-layer sensing capability. Optimal and effective heuristic algorithms are presented to solve the problem. The theoretical performance bounds of the explicit caching system are derived in simplified scenarios. The impacts of cache storage space, BS backhaul capacity, cross-layer information, and user mobility on the system performance are simulated and discussed in realistic scenarios. Results suggest that, compared with conventional implicit caching schemes, explicit caching can better exploit the mobile edge network infrastructure for personalized content dissemination.
Gender Differences: An Examination of Computer-Mediated Communication.
ERIC Educational Resources Information Center
Gregory, Mona Y.
Computer-mediated communication (CMC) is a pervasive means of communicating in work place, education, and home settings. Males currently occupy approximately 69% of all jobs in the computer industry and only 10% of upper-level positions are occupied by females. Stereotypical perceptions and gendered occupations contribute to the lack of females in…
ERIC Educational Resources Information Center
Johnson, James Nathaniel
2013-01-01
Ubiquitous computing is a near reality in both the private and public arena. Business and personal spaces are seeing a proliferation of mobile computing devices and pervasive computing technologies. This phenomenon is creating a unique set of challenges for organizational IT professionals, specifically in the numerous spillover effects of having…
Internet of things for an age-friendly healthcare.
Konstantinidis, Evdokimos I; Bamparopoulos, Giorgos; Billis, Antonis; Bamidis, Panagiotis D
2015-01-01
In healthcare applications a large cohort of recent implementations utilises IoT-oriented infrastructures (XMPP) as well as smart mobile devices as communication gateways. IoT characteristi Communication/Connectivity, Pervasive Computing and Ambient Intelligence, are all highly related to Active and Healthy Aging environments. This paper presents a new idea, that of IoT enabled devices which are directly connected to the IoT (a glucose meter is used as an example herein), complying with the XMPP messaging protocol and the incorporation of a recently released Controller Application Communication (CAC) framework for distributed, cross-platform communication. A web based exergaming platform and a disease management tool, provide the vehicles for the demonstration of the feasibility and the successful implementation and integration of the aforementioned infrastructure.
Is Your Mission Ready for the Information Age?
ERIC Educational Resources Information Center
Oblinger, Diana G.
1999-01-01
Urges institutions of higher education to evaluate their mission statements in light of current trends, especially the pervasive influence of information technology. Raises evaluative questions concerning information technology and distance learning, student services, the campus library, research computing, administrative computing, and public…
Context-awareness in ubiquitous computing and the mobile devices
NASA Astrophysics Data System (ADS)
Akçit, Nuhcan; Tomur, Emrah; Karslıoǧlu, Mahmut Onur
2015-06-01
Mobile device use has vastly increased in the last few years. Many people use many mobile devices in their daily lives. Context-aware computing is the main feature of pervasive and ubiquitous computing. Context awareness is also an important topic that becomes more available with ubiquitous computing. As the sensors increase, the data collected via mobile device sensors and sensor networks do not have much value because of the difficulty in analysis and understanding the data. Context-aware computing helps us store contextual information and use or search it by mobile devices when we want to see or analyze it. Contextual data can be made more meaningful by context-aware processing. There are different types of data and context information that must be considered. By combining spatial and contextual data, we obtain more meaningful data based on the entities. Contextual data is any information that can be used to characterize the situation of the entity. The entity is a person, place, or object considered relevant to the interaction between the user and an application, including the users and the applications. Using contextual data and good integration to mobile devices adds great value to this data, and combining these with our other data sets will allow us to obtain more useful information and analysis.
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.
Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne
2017-05-01
Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things
Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne
2017-01-01
Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons. PMID:28468313
A Pervasive Parallel Processing Framework for Data Visualization and Analysis at Extreme Scale
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moreland, Kenneth; Geveci, Berk
2014-11-01
The evolution of the computing world from teraflop to petaflop has been relatively effortless, with several of the existing programming models scaling effectively to the petascale. The migration to exascale, however, poses considerable challenges. All industry trends infer that the exascale machine will be built using processors containing hundreds to thousands of cores per chip. It can be inferred that efficient concurrency on exascale machines requires a massive amount of concurrent threads, each performing many operations on a localized piece of data. Currently, visualization libraries and applications are based off what is known as the visualization pipeline. In the pipelinemore » model, algorithms are encapsulated as filters with inputs and outputs. These filters are connected by setting the output of one component to the input of another. Parallelism in the visualization pipeline is achieved by replicating the pipeline for each processing thread. This works well for today’s distributed memory parallel computers but cannot be sustained when operating on processors with thousands of cores. Our project investigates a new visualization framework designed to exhibit the pervasive parallelism necessary for extreme scale machines. Our framework achieves this by defining algorithms in terms of worklets, which are localized stateless operations. Worklets are atomic operations that execute when invoked unlike filters, which execute when a pipeline request occurs. The worklet design allows execution on a massive amount of lightweight threads with minimal overhead. Only with such fine-grained parallelism can we hope to fill the billions of threads we expect will be necessary for efficient computation on an exascale machine.« less
Pervasive Learning Games: Explorations of Hybrid Educational Gamescapes
ERIC Educational Resources Information Center
Thomas, Siobhan
2006-01-01
Pervasive gaming has tremendous potential as a learning tool and represents an interesting development in the field of video games and education. The literature surrounding video games and education is vast: For more than 20 years, educationalists have been discussing the potential that exists for the application of video games to learning.…
Danaher, Brian G; Brendryen, Håvar; Seeley, John R; Tyler, Milagra S; Woolley, Tim
2015-03-01
mHealth interventions that deliver content via mobile phones represent a burgeoning area of health behavior change. The current paper examines two themes that can inform the underlying design of mHealth interventions: (1) mobile device functionality, which represents the technological toolbox available to intervention developers; and (2) the pervasive information architecture of mHealth interventions, which determines how intervention content can be delivered concurrently using mobile phones, personal computers, and other devices. We posit that developers of mHealth interventions will be better able to achieve the promise of this burgeoning arena by leveraging the toolbox and functionality of mobile devices in order to engage participants and encourage meaningful behavior change within the context of a carefully designed pervasive information architecture.
Investigation of Teachers' Attitudes towards Computer Use in Primary Education in Kurdistan
ERIC Educational Resources Information Center
Balisane, Hewa
2015-01-01
Technological advances have pervasively changed our behaviours, beliefs and approaches in working, socialising and entertaining. Educators, including those in primary education, have acknowledged the positive effects of computer use in the classroom in various ways. With regard to pedagogical consideration, primary school teachers have adopted…
Above-Campus Services: Shaping the Promise of Cloud Computing for Higher Education
ERIC Educational Resources Information Center
Wheeler, Brad; Waggener, Shelton
2009-01-01
The concept of today's cloud computing may date back to 1961, when John McCarthy, retired Stanford professor and Turing Award winner, delivered a speech at MIT's Centennial. In that speech, he predicted that in the future, computing would become a "public utility." Yet for colleges and universities, the recent growth of pervasive, very high speed…
Margolin, L. G.; Hunter, A.
2017-10-18
Here, we consider the dependence of velocity probability distribution functions on the finite size of a thermodynamic system. We are motivated by applications to computational fluid dynamics, hence discrete thermodynamics. We then begin by describing a coarsening process that represents geometric renormalization. Then, based only on the requirements of conservation, we demonstrate that the pervasive assumption of local thermodynamic equilibrium is not form invariant. We develop a perturbative correction that restores form invariance to second-order in a small parameter associated with macroscopic gradients. Finally, we interpret the corrections in terms of unresolved kinetic energy and discuss the implications of ourmore » results both in theory and as applied to numerical simulation.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Margolin, L. G.; Hunter, A.
Here, we consider the dependence of velocity probability distribution functions on the finite size of a thermodynamic system. We are motivated by applications to computational fluid dynamics, hence discrete thermodynamics. We then begin by describing a coarsening process that represents geometric renormalization. Then, based only on the requirements of conservation, we demonstrate that the pervasive assumption of local thermodynamic equilibrium is not form invariant. We develop a perturbative correction that restores form invariance to second-order in a small parameter associated with macroscopic gradients. Finally, we interpret the corrections in terms of unresolved kinetic energy and discuss the implications of ourmore » results both in theory and as applied to numerical simulation.« less
Towards Pervasive Augmented Reality: Context-Awareness in Augmented Reality.
Grubert, Jens; Langlotz, Tobias; Zollmann, Stefanie; Regenbrecht, Holger
2017-06-01
Augmented Reality is a technique that enables users to interact with their physical environment through the overlay of digital information. While being researched for decades, more recently, Augmented Reality moved out of the research labs and into the field. While most of the applications are used sporadically and for one particular task only, current and future scenarios will provide a continuous and multi-purpose user experience. Therefore, in this paper, we present the concept of Pervasive Augmented Reality, aiming to provide such an experience by sensing the user's current context and adapting the AR system based on the changing requirements and constraints. We present a taxonomy for Pervasive Augmented Reality and context-aware Augmented Reality, which classifies context sources and context targets relevant for implementing such a context-aware, continuous Augmented Reality experience. We further summarize existing approaches that contribute towards Pervasive Augmented Reality. Based our taxonomy and survey, we identify challenges for future research directions in Pervasive Augmented Reality.
PCA method for automated detection of mispronounced words
NASA Astrophysics Data System (ADS)
Ge, Zhenhao; Sharma, Sudhendu R.; Smith, Mark J. T.
2011-06-01
This paper presents a method for detecting mispronunciations with the aim of improving Computer Assisted Language Learning (CALL) tools used by foreign language learners. The algorithm is based on Principle Component Analysis (PCA). It is hierarchical with each successive step refining the estimate to classify the test word as being either mispronounced or correct. Preprocessing before detection, like normalization and time-scale modification, is implemented to guarantee uniformity of the feature vectors input to the detection system. The performance using various features including spectrograms and Mel-Frequency Cepstral Coefficients (MFCCs) are compared and evaluated. Best results were obtained using MFCCs, achieving up to 99% accuracy in word verification and 93% in native/non-native classification. Compared with Hidden Markov Models (HMMs) which are used pervasively in recognition application, this particular approach is computational efficient and effective when training data is limited.
Application of automation and information systems to forensic genetic specimen processing.
Leclair, Benoît; Scholl, Tom
2005-03-01
During the last 10 years, the introduction of PCR-based DNA typing technologies in forensic applications has been highly successful. This technology has become pervasive throughout forensic laboratories and it continues to grow in prevalence. For many criminal cases, it provides the most probative evidence. Criminal genotype data banking and victim identification initiatives that follow mass-fatality incidents have benefited the most from the introduction of automation for sample processing and data analysis. Attributes of offender specimens including large numbers, high quality and identical collection and processing are ideal for the application of laboratory automation. The magnitude of kinship analysis required by mass-fatality incidents necessitates the application of computing solutions to automate the task. More recently, the development activities of many forensic laboratories are focused on leveraging experience from these two applications to casework sample processing. The trend toward increased prevalence of forensic genetic analysis will continue to drive additional innovations in high-throughput laboratory automation and information systems.
OpenHealth Platform for Interactive Contextualization of Population Health Open Data.
Almeida, Jonas S; Hajagos, Janos; Crnosija, Ivan; Kurc, Tahsin; Saltz, Mary; Saltz, Joel
The financial incentives for data science applications leading to improved health outcomes, such as DSRIP (bit.ly/dsrip), are well-aligned with the broad adoption of Open Data by State and Federal agencies. This creates entirely novel opportunities for analytical applications that make exclusive use of the pervasive Web Computing platform. The framework described here explores this new avenue to contextualize Health data in a manner that relies exclusively on the native JavaScript interpreter and data processing resources of the ubiquitous Web Browser. The OpenHealth platform is made publicly available, and is publicly hosted with version control and open source, at https://github.com/mathbiol/openHealth. The different data/analytics workflow architectures explored are accompanied with live applications ranging from DSRIP, such as Hospital Inpatient Prevention Quality Indicators at http://bit.ly/pqiSuffolk, to The Cancer Genome Atlas (TCGA) as illustrated by http://bit.ly/tcgascopeGBM.
1983-01-01
schizoaffective disorder and atypical psycho3, infantile autism , childhood onset pervasive developmental disorder, and atypical pervasive devvlopmental...classified, including schizophreniform disorder, brief reactive psychosis, schizoaffective disorder and atypical psychosis, infantile autism ...procedures if the applicant !S free of symptoms and postoperative complications. After splenectomy, vaccination against pneumococcus is recommended, Awms and
ERIC Educational Resources Information Center
Buzzetto-More, Nicole; Ukoha, Ojiabo; Rustagi, Narendra
2010-01-01
The under representation of women and minorities in undergraduate computer science and information systems programs is a pervasive and persistent problem in the United States. Needed is a better understanding of the background and psychosocial factors that attract, or repel, minority students from computing disciplines. An examination of these…
ERIC Educational Resources Information Center
Parker, Kevin R.; Srinivasan, Sankara Subramanian; Houghton, Robert F.; Kordzadeh, Nima; Bozan, Karoly; Ottaway, Thomas; Davey, Bill
2017-01-01
Curriculum development is particularly challenging in computing-related disciplines as the computing industry changes more quickly than most. As information technology degrees have become relatively pervasive, some institutions that offer information systems degrees have recognized a need to develop specialist studies in information systems. This…
Model Uncertainty and Robustness: A Computational Framework for Multimodel Analysis
ERIC Educational Resources Information Center
Young, Cristobal; Holsteen, Katherine
2017-01-01
Model uncertainty is pervasive in social science. A key question is how robust empirical results are to sensible changes in model specification. We present a new approach and applied statistical software for computational multimodel analysis. Our approach proceeds in two steps: First, we estimate the modeling distribution of estimates across all…
Law School Experience in Pervasive Electronic Communications.
ERIC Educational Resources Information Center
Shiels, Rosemary
1994-01-01
Installation of a schoolwide local area computer network at Chicago-Kent College of Law (Illinois) is described. Uses of electronic mail within a course on computer law are described. Additional social, administrative, and research uses of electronic mail are noted as are positive effects and emerging problems (e.g., burdens on recipients and…
A cloud computing based 12-lead ECG telemedicine service
2012-01-01
Background Due to the great variability of 12-lead ECG instruments and medical specialists’ interpretation skills, it remains a challenge to deliver rapid and accurate 12-lead ECG reports with senior cardiologists’ decision making support in emergency telecardiology. Methods We create a new cloud and pervasive computing based 12-lead Electrocardiography (ECG) service to realize ubiquitous 12-lead ECG tele-diagnosis. Results This developed service enables ECG to be transmitted and interpreted via mobile phones. That is, tele-consultation can take place while the patient is on the ambulance, between the onsite clinicians and the off-site senior cardiologists, or among hospitals. Most importantly, this developed service is convenient, efficient, and inexpensive. Conclusions This cloud computing based ECG tele-consultation service expands the traditional 12-lead ECG applications onto the collaboration of clinicians at different locations or among hospitals. In short, this service can greatly improve medical service quality and efficiency, especially for patients in rural areas. This service has been evaluated and proved to be useful by cardiologists in Taiwan. PMID:22838382
A cloud computing based 12-lead ECG telemedicine service.
Hsieh, Jui-Chien; Hsu, Meng-Wei
2012-07-28
Due to the great variability of 12-lead ECG instruments and medical specialists' interpretation skills, it remains a challenge to deliver rapid and accurate 12-lead ECG reports with senior cardiologists' decision making support in emergency telecardiology. We create a new cloud and pervasive computing based 12-lead Electrocardiography (ECG) service to realize ubiquitous 12-lead ECG tele-diagnosis. This developed service enables ECG to be transmitted and interpreted via mobile phones. That is, tele-consultation can take place while the patient is on the ambulance, between the onsite clinicians and the off-site senior cardiologists, or among hospitals. Most importantly, this developed service is convenient, efficient, and inexpensive. This cloud computing based ECG tele-consultation service expands the traditional 12-lead ECG applications onto the collaboration of clinicians at different locations or among hospitals. In short, this service can greatly improve medical service quality and efficiency, especially for patients in rural areas. This service has been evaluated and proved to be useful by cardiologists in Taiwan.
Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-based Services
NASA Astrophysics Data System (ADS)
Soppera, A.; Burbridge, T.
During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists and science fiction writers. Today this subject has become of interest to business, government, and society. Governmental authorities exercise their power through the networked environment. Credit card databases maintain our credit history and decide whether we are allowed to rent a house or obtain a loan. Mobile telephones can locate us in real time so that we do not miss calls. Within another 10 years, all sorts of devices will be connected through the network. Our fridge, our food, together with our health information, may all be networked for the purpose of maintaining diet and well-being. The Internet will move from being an infrastructure to connect computers, to being an infrastructure to connect everything [2, 3].
NASA Astrophysics Data System (ADS)
Manfredi, Sabato
2016-06-01
Large-scale dynamic systems are becoming highly pervasive in their occurrence with applications ranging from system biology, environment monitoring, sensor networks, and power systems. They are characterised by high dimensionality, complexity, and uncertainty in the node dynamic/interactions that require more and more computational demanding methods for their analysis and control design, as well as the network size and node system/interaction complexity increase. Therefore, it is a challenging problem to find scalable computational method for distributed control design of large-scale networks. In this paper, we investigate the robust distributed stabilisation problem of large-scale nonlinear multi-agent systems (briefly MASs) composed of non-identical (heterogeneous) linear dynamical systems coupled by uncertain nonlinear time-varying interconnections. By employing Lyapunov stability theory and linear matrix inequality (LMI) technique, new conditions are given for the distributed control design of large-scale MASs that can be easily solved by the toolbox of MATLAB. The stabilisability of each node dynamic is a sufficient assumption to design a global stabilising distributed control. The proposed approach improves some of the existing LMI-based results on MAS by both overcoming their computational limits and extending the applicative scenario to large-scale nonlinear heterogeneous MASs. Additionally, the proposed LMI conditions are further reduced in terms of computational requirement in the case of weakly heterogeneous MASs, which is a common scenario in real application where the network nodes and links are affected by parameter uncertainties. One of the main advantages of the proposed approach is to allow to move from a centralised towards a distributed computing architecture so that the expensive computation workload spent to solve LMIs may be shared among processors located at the networked nodes, thus increasing the scalability of the approach than the network size. Finally, a numerical example shows the applicability of the proposed method and its advantage in terms of computational complexity when compared with the existing approaches.
Converging, pervasive technologies: chronic and emerging issues and policy adequacy.
Seelman, Katherine D
2008-01-01
This article is a thought piece with the expansive goal of identifying policy facilitators and barriers to the development of usable and accessible advanced information and communications technology for people with disabilities across the age span at the research and development and marketing stages. The working hypothesis is as follows: The lack of participation in and representation of the interests of people with disabilities in the technology resource system is a barrier to availability of affordable consumer goods that enable independence and community integration. Converging, pervasive computing technology, especially in housing applications, is used as a case example, drawing especially from research and development conducted by the National Science Foundation Quality of Life Technology Engineering Research Center. A critical theory approach is used to identify problems and seek solutions to the apparent lack of balance between the demand and needs of disabled users and the supply and availability of usable, affordable consumer goods produced by the technology resource system in which allocation decisions are made. The approach uses policy analysis tools such as a technology assessment framework; the participation and environment components of the World Health Organization's International Classification of Functioning, Disability and Health; and participatory action research.
Enhancing battery efficiency for pervasive health-monitoring systems based on electronic textiles.
Zheng, Nenggan; Wu, Zhaohui; Lin, Man; Yang, Laurence Tianruo
2010-03-01
Electronic textiles are regarded as one of the most important computation platforms for future computer-assisted health-monitoring applications. In these novel systems, multiple batteries are used in order to prolong their operational lifetime, which is a significant metric for system usability. However, due to the nonlinear features of batteries, computing systems with multiple batteries cannot achieve the same battery efficiency as those powered by a monolithic battery of equal capacity. In this paper, we propose an algorithm aiming to maximize battery efficiency globally for the computer-assisted health-care systems with multiple batteries. Based on an accurate analytical battery model, the concept of weighted battery fatigue degree is introduced and the novel battery-scheduling algorithm called predicted weighted fatigue degree least first (PWFDLF) is developed. Besides, we also discuss our attempts during search PWFDLF: a weighted round-robin (WRR) and a greedy algorithm achieving highest local battery efficiency, which reduces to the sequential discharging policy. Evaluation results show that a considerable improvement in battery efficiency can be obtained by PWFDLF under various battery configurations and current profiles compared to conventional sequential and WRR discharging policies.
Wireless Adaptive Therapeutic TeleGaming in a Pervasive Computing Environment
NASA Astrophysics Data System (ADS)
Peters, James F.; Szturm, Tony; Borkowski, Maciej; Lockery, Dan; Ramanna, Sheela; Shay, Barbara
This chapter introduces a wireless, pervasive computing approach to adaptive therapeutic telegaming considered in the context of near set theory. Near set theory provides a formal basis for observation, comparison and classification of perceptual granules. A perceptual granule is defined by a collection of objects that are graspable by the senses or by the mind. In the proposed pervasive computing approach to telegaming, a handicapped person (e.g., stroke patient with limited hand, finger, arm function) plays a video game by interacting with familiar instrumented objects such as cups, cutlery, soccer balls, nozzles, screw top-lids, spoons, so that the technology that makes therapeutic exercise game-playing possible is largely invisible (Archives of Physical Medicine and Rehabilitation 89:2213-2217, 2008). The basic approach to adaptive learning (AL) in the proposed telegaming environment is ethology-inspired and is quite different from the traditional approach to reinforcement learning. In biologically-inspired learning, organisms learn to achieve some goal by durable modification of behaviours in response to signals from the environment resulting from specific experiences (Animal Behavior, 1995). The term adaptive is used here in an ethological sense, where learning by an organism results from modifying behaviour in response to perceived changes in the environment. To instill adaptivity in a video game, it is assumed that learning by a video game is episodic. During an episode, the behaviour of a player is measured indirectly by tracking the occurrence of gaming events such as a hit or a miss of a target (e.g., hitting a moving ball with a game paddle). An ethogram provides a record of behaviour feature values that provide a basis a functional registry for handicapped players for gaming adaptivity. An important practical application of adaptive gaming is therapeutic rehabilitation exercise carried out in parallel with playing action video games. Enjoyable and engaging interactive gaming will motivate patients to complete the rehabilitation process. Adaptivity is seen as a way to make action games more accessible to those who have physical and cognitive impairments. The telegaming system connects to the internet and implements a feed-and-forward mechanism that transmits gaming session tables after each gaming session to a remote registry accessible to therapists and researchers. The contribution of this chapter is the introduction of a framework for wireless telegaming useful in therapeutic rehabilitation.
Department of Defense Office of the Inspector General FY 2013 Audit Plan
2012-11-01
oversight procedures to review KPMG LLPs work; and if applicable disclose instances where KPMG LLP does not comply, in all material respects, with U.S...decisions. Pervasive material internal control weaknesses impact the accuracy, reliability and timeliness of budgetary and accounting data and...reported the same 13 material internal control weaknesses as in the previous year. These pervasive and longstanding financial management challenges
An integrative architecture for a sensor-supported trust management system.
Trček, Denis
2012-01-01
Trust plays a key role not only in e-worlds and emerging pervasive computing environments, but also already for millennia in human societies. Trust management solutions that have being around now for some fifteen years were primarily developed for the above mentioned cyber environments and they are typically focused on artificial agents, sensors, etc. However, this paper presents extensions of a new methodology together with architecture for trust management support that is focused on humans and human-like agents. With this methodology and architecture sensors play a crucial role. The architecture presents an already deployable tool for multi and interdisciplinary research in various areas where humans are involved. It provides new ways to obtain an insight into dynamics and evolution of such structures, not only in pervasive computing environments, but also in other important areas like management and decision making support.
2005-03-28
consequently users are torn between taking advantage of increasingly pervasive computing systems, and the price (in attention and skill) that they have to... advantage of the surrounding computing environments; and (c) that it is usable by non-experts. Second, from a software architect’s perspective, we...take full advantage of the computing systems accessible to them, much as they take advantage of the furniture in each physical space. In the example
Sixth SIAM conference on applied linear algebra: Final program and abstracts. Final technical report
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1997-12-31
Linear algebra plays a central role in mathematics and applications. The analysis and solution of problems from an amazingly wide variety of disciplines depend on the theory and computational techniques of linear algebra. In turn, the diversity of disciplines depending on linear algebra also serves to focus and shape its development. Some problems have special properties (numerical, structural) that can be exploited. Some are simply so large that conventional approaches are impractical. New computer architectures motivate new algorithms, and fresh ways to look at old ones. The pervasive nature of linear algebra in analyzing and solving problems means that peoplemore » from a wide spectrum--universities, industrial and government laboratories, financial institutions, and many others--share an interest in current developments in linear algebra. This conference aims to bring them together for their mutual benefit. Abstracts of papers presented are included.« less
Cyber-Security Issues in Healthcare Information Technology.
Langer, Steve G
2017-02-01
In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.
NASA Astrophysics Data System (ADS)
Bhasi, Priya; Nhlabatsi, Zanele P.; Sitha, Sanyasi
2017-12-01
Phosphorus mononitride (PN) shows some interesting chemistry due to its low dissociation energy (compared to N2) and small dipole moment (zero dipole moment for N2). In this work, a reaction between HSi (X2Γ) and PN (X1Σ+) has been studied using various computational methods. Analysis of the doublet surface of the HSi+PN reaction indicates that the reaction is exothermic in nature leading to the formation of various products. In view of the barrierless association of the reactants and exothermic nature for the product formation, it is suggested that species like HPNSi, cyclic-SiN(H)P (these two most stable isomers have phosphazo linkage) and HSiNP (third most stable isomer has phosphdiazo linkage) can possibly be detected in the interstellar medium. In view of the potential applications of phosphazo compounds in amide synthesis and pervasive nature of amide linkages in the nature, possible interstellar prebiotic applications can be advocated for these compounds.
Automatic Generation of Just-in-Time Online Assessments from Software Design Models
ERIC Educational Resources Information Center
Zualkernan, Imran A.; El-Naaj, Salim Abou; Papadopoulos, Maria; Al-Amoudi, Budoor K.; Matthews, Charles E.
2009-01-01
Computer software is pervasive in today's society. The rate at which new versions of computer software products are released is phenomenal when compared to the release rate of new products in traditional industries such as aircraft building. This rapid rate of change can partially explain why most certifications in the software industry are…
Application of infrared thermography in computer aided diagnosis
NASA Astrophysics Data System (ADS)
Faust, Oliver; Rajendra Acharya, U.; Ng, E. Y. K.; Hong, Tan Jen; Yu, Wenwei
2014-09-01
The invention of thermography, in the 1950s, posed a formidable problem to the research community: What is the relationship between disease and heat radiation captured with Infrared (IR) cameras? The research community responded with a continuous effort to find this crucial relationship. This effort was aided by advances in processing techniques, improved sensitivity and spatial resolution of thermal sensors. However, despite this progress fundamental issues with this imaging modality still remain. The main problem is that the link between disease and heat radiation is complex and in many cases even non-linear. Furthermore, the change in heat radiation as well as the change in radiation pattern, which indicate disease, is minute. On a technical level, this poses high requirements on image capturing and processing. On a more abstract level, these problems lead to inter-observer variability and on an even more abstract level they lead to a lack of trust in this imaging modality. In this review, we adopt the position that these problems can only be solved through a strict application of scientific principles and objective performance assessment. Computing machinery is inherently objective; this helps us to apply scientific principles in a transparent way and to assess the performance results. As a consequence, we aim to promote thermography based Computer-Aided Diagnosis (CAD) systems. Another benefit of CAD systems comes from the fact that the diagnostic accuracy is linked to the capability of the computing machinery and, in general, computers become ever more potent. We predict that a pervasive application of computers and networking technology in medicine will help us to overcome the shortcomings of any single imaging modality and this will pave the way for integrated health care systems which maximize the quality of patient care.
Conceptual Knowledge Acquisition in Biomedicine: A Methodological Review
Payne, Philip R.O.; Mendonça, Eneida A.; Johnson, Stephen B.; Starren, Justin B.
2007-01-01
The use of conceptual knowledge collections or structures within the biomedical domain is pervasive, spanning a variety of applications including controlled terminologies, semantic networks, ontologies, and database schemas. A number of theoretical constructs and practical methods or techniques support the development and evaluation of conceptual knowledge collections. This review will provide an overview of the current state of knowledge concerning conceptual knowledge acquisition, drawing from multiple contributing academic disciplines such as biomedicine, computer science, cognitive science, education, linguistics, semiotics, and psychology. In addition, multiple taxonomic approaches to the description and selection of conceptual knowledge acquisition and evaluation techniques will be proposed in order to partially address the apparent fragmentation of the current literature concerning this domain. PMID:17482521
Achieving TASAR Operational Readiness
NASA Technical Reports Server (NTRS)
Wing, David J.
2015-01-01
NASA has been developing and testing the Traffic Aware Strategic Aircrew Requests (TASAR) concept for aircraft operations featuring a NASA-developed cockpit automation tool, the Traffic Aware Planner (TAP), which computes traffic/hazard-compatible route changes to improve flight efficiency. The TAP technology is anticipated to save fuel and flight time and thereby provide immediate and pervasive benefits to the aircraft operator, as well as improving flight schedule compliance, passenger comfort, and pilot and controller workload. Previous work has indicated the potential for significant benefits for TASAR-equipped aircraft, and a flight trial of the TAP software application in the National Airspace System has demonstrated its technical viability. This paper reviews previous and ongoing activities to prepare TASAR for operational use.
NASA Astrophysics Data System (ADS)
Cui, Yank; Kobara, Kazukuni; Matsuura, Kanta; Imai, Hideki
As pervasive computing technologies develop fast, the privacy protection becomes a crucial issue and needs to be coped with very carefully. Typically, it is difficult to efficiently identify and manage plenty of the low-cost pervasive devices like Radio Frequency Identification Devices (RFID), without leaking any privacy information. In particular, the attacker may not only eavesdrop the communication in a passive way, but also mount an active attack to ask queries adaptively, which is obviously more dangerous. Towards settling this problem, in this paper, we propose two lightweight authentication protocols which are privacy-preserving against active attack, in an asymmetric way. That asymmetric style with privacy-oriented simplification succeeds to reduce the load of low-cost devices and drastically decrease the computation cost for the management of server. This is because that, unlike the usual management of the identities, our approach does not require any synchronization nor exhaustive search in the database, which enjoys great convenience in case of a large-scale system. The protocols are based on a fast asymmetric encryption with specialized simplification and only one cryptographic hash function, which consequently assigns an easy work to pervasive devices. Besides, our results do not require the strong assumption of the random oracle.
Smartphone as a personal, pervasive health informatics services platform: literature review.
Wac, K
2012-01-01
The article provides an overview of current trends in personal sensor, signal and imaging informatics, that are based on emerging mobile computing and communications technologies enclosed in a smartphone and enabling the provision of personal, pervasive health informatics services. The article reviews examples of these trends from the PubMed and Google scholar literature search engines, which, by no means claim to be complete, as the field is evolving and some recent advances may not be documented yet. There exist critical technological advances in the surveyed smartphone technologies, employed in provision and improvement of diagnosis, acute and chronic treatment and rehabilitation health services, as well as in education and training of healthcare practitioners. However, the most emerging trend relates to a routine application of these technologies in a prevention/wellness sector, helping its users in self-care to stay healthy. Smartphone-based personal health informatics services exist, but still have a long way to go to become an everyday, personalized healthcare-provisioning tool in the medical field and in a clinical practice. Key main challenge for their widespread adoption involve lack of user acceptance striving from variable credibility and reliability of applications and solutions as they a) lack evidence- based approach; b) have low levels of medical professional involvement in their design and content; c) are provided in an unreliable way, influencing negatively its usability; and, in some cases, d) being industry-driven, hence exposing bias in information provided, for example towards particular types of treatment or intervention procedures.
An Integrative Architecture for a Sensor-Supported Trust Management System
Trček, Denis
2012-01-01
Trust plays a key role not only in e-worlds and emerging pervasive computing environments, but also already for millennia in human societies. Trust management solutions that have being around now for some fifteen years were primarily developed for the above mentioned cyber environments and they are typically focused on artificial agents, sensors, etc. However, this paper presents extensions of a new methodology together with architecture for trust management support that is focused on humans and human-like agents. With this methodology and architecture sensors play a crucial role. The architecture presents an already deployable tool for multi and interdisciplinary research in various areas where humans are involved. It provides new ways to obtain an insight into dynamics and evolution of such structures, not only in pervasive computing environments, but also in other important areas like management and decision making support. PMID:23112628
Hansen, Thomas Riisgaard; Bardram, Jakob E
2007-01-01
Collaboration, coordination, and communication are crucial in maintaining an efficient and smooth flow of work in an operating ward. This coordination, however, often comes at a high price in terms of unsuccessfully trying to get hold of people, disturbing telephone calls, looking for people, and unnecessary stress. To accommodate this situation and to increase the quality of work in operating wards, we have designed a set of pervasive computer systems which supports what we call context-mediated communication and awareness. These systems use large interactive displays, video streaming from key locations, tracking systems, and mobile devices to support social awareness and different types of communication modalities relevant to the current context. In this paper we report qualitative data from a one-year deployment of the system in a local hospital. Overall, this study shows that 75% of the participants strongly agreed that these systems had made their work easier.
Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components.
Fragopoulos, Anastasios; Gialelis, John; Serpanos, Dimitrios
2009-01-01
Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers.
Distributed Accounting on the Grid
NASA Technical Reports Server (NTRS)
Thigpen, William; Hacker, Thomas J.; McGinnis, Laura F.; Athey, Brian D.
2001-01-01
By the late 1990s, the Internet was adequately equipped to move vast amounts of data between HPC (High Performance Computing) systems, and efforts were initiated to link together the national infrastructure of high performance computational and data storage resources together into a general computational utility 'grid', analogous to the national electrical power grid infrastructure. The purpose of the Computational grid is to provide dependable, consistent, pervasive, and inexpensive access to computational resources for the computing community in the form of a computing utility. This paper presents a fully distributed view of Grid usage accounting and a methodology for allocating Grid computational resources for use on a Grid computing system.
PAQ: Persistent Adaptive Query Middleware for Dynamic Environments
NASA Astrophysics Data System (ADS)
Rajamani, Vasanth; Julien, Christine; Payton, Jamie; Roman, Gruia-Catalin
Pervasive computing applications often entail continuous monitoring tasks, issuing persistent queries that return continuously updated views of the operational environment. We present PAQ, a middleware that supports applications' needs by approximating a persistent query as a sequence of one-time queries. PAQ introduces an integration strategy abstraction that allows composition of one-time query responses into streams representing sophisticated spatio-temporal phenomena of interest. A distinguishing feature of our middleware is the realization that the suitability of a persistent query's result is a function of the application's tolerance for accuracy weighed against the associated overhead costs. In PAQ, programmers can specify an inquiry strategy that dictates how information is gathered. Since network dynamics impact the suitability of a particular inquiry strategy, PAQ associates an introspection strategy with a persistent query, that evaluates the quality of the query's results. The result of introspection can trigger application-defined adaptation strategies that alter the nature of the query. PAQ's simple API makes developing adaptive querying systems easily realizable. We present the key abstractions, describe their implementations, and demonstrate the middleware's usefulness through application examples and evaluation.
Computing through Scientific Abstractions in SysBioPS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chin, George; Stephan, Eric G.; Gracio, Deborah K.
2004-10-13
Today, biologists and bioinformaticists have a tremendous amount of computational power at their disposal. With the availability of supercomputers, burgeoning scientific databases and digital libraries such as GenBank and PubMed, and pervasive computational environments such as the Grid, biologists have access to a wealth of computational capabilities and scientific data at hand. Yet, the rapid development of computational technologies has far exceeded the typical biologist’s ability to effectively apply the technology in their research. Computational sciences research and development efforts such as the Biology Workbench, BioSPICE (Biological Simulation Program for Intra-Cellular Evaluation), and BioCoRE (Biological Collaborative Research Environment) are importantmore » in connecting biologists and their scientific problems to computational infrastructures. On the Computational Cell Environment and Heuristic Entity-Relationship Building Environment projects at the Pacific Northwest National Laboratory, we are jointly developing a new breed of scientific problem solving environment called SysBioPSE that will allow biologists to access and apply computational resources in the scientific research context. In contrast to other computational science environments, SysBioPSE operates as an abstraction layer above a computational infrastructure. The goal of SysBioPSE is to allow biologists to apply computational resources in the context of the scientific problems they are addressing and the scientific perspectives from which they conduct their research. More specifically, SysBioPSE allows biologists to capture and represent scientific concepts and theories and experimental processes, and to link these views to scientific applications, data repositories, and computer systems.« less
Investigating an API for resilient exascale computing.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stearley, Jon R.; Tomkins, James; VanDyke, John P.
2013-05-01
Increased HPC capability comes with increased complexity, part counts, and fault occurrences. In- creasing the resilience of systems and applications to faults is a critical requirement facing the viability of exascale systems, as the overhead of traditional checkpoint/restart is projected to outweigh its bene ts due to fault rates outpacing I/O bandwidths. As faults occur and propagate throughout hardware and software layers, pervasive noti cation and handling mechanisms are necessary. This report describes an initial investigation of fault types and programming interfaces to mitigate them. Proof-of-concept APIs are presented for the frequent and important cases of memory errors and nodemore » failures, and a strategy proposed for lesystem failures. These involve changes to the operating system, runtime, I/O library, and application layers. While a single API for fault handling among hardware and OS and application system-wide remains elusive, the e ort increased our understanding of both the mountainous challenges and the promising trailheads. 3« less
A comment on the use of flushing time, residence time, and age as transport time scales
Monsen, N.E.; Cloern, J.E.; Lucas, L.V.; Monismith, Stephen G.
2002-01-01
Applications of transport time scales are pervasive in biological, hydrologic, and geochemical studies yet these times scales are not consistently defined and applied with rigor in the literature. We compare three transport time scales (flushing time, age, and residence time) commonly used to measure the retention of water or scalar quantities transported with water. We identify the underlying assumptions associated with each time scale, describe procedures for computing these time scales in idealized cases, and identify pitfalls when real-world systems deviate from these idealizations. We then apply the time scale definitions to a shallow 378 ha tidal lake to illustrate how deviations between real water bodies and the idealized examples can result from: (1) non-steady flow; (2) spatial variability in bathymetry, circulation, and transport time scales; and (3) tides that introduce complexities not accounted for in the idealized cases. These examples illustrate that no single transport time scale is valid for all time periods, locations, and constituents, and no one time scale describes all transport processes. We encourage aquatic scientists to rigorously define the transport time scale when it is applied, identify the underlying assumptions in the application of that concept, and ask if those assumptions are valid in the application of that approach for computing transport time scales in real systems.
ERIC Educational Resources Information Center
Martin, Amy
1991-01-01
Informs the reader of the pervasiveness of petrochemicals in everyday life. Discusses the petroleum-to-petrochemical transformation at the refinery and issues related to how petroleum products will be utilized for fuel or nonfuel needs such as lubricants, computers, and medicine in the future. (MDH)
Modeling Patterns of Activities using Activity Curves
Dawadi, Prafulla N.; Cook, Diane J.; Schmitter-Edgecombe, Maureen
2016-01-01
Pervasive computing offers an unprecedented opportunity to unobtrusively monitor behavior and use the large amount of collected data to perform analysis of activity-based behavioral patterns. In this paper, we introduce the notion of an activity curve, which represents an abstraction of an individual’s normal daily routine based on automatically-recognized activities. We propose methods to detect changes in behavioral routines by comparing activity curves and use these changes to analyze the possibility of changes in cognitive or physical health. We demonstrate our model and evaluate our change detection approach using a longitudinal smart home sensor dataset collected from 18 smart homes with older adult residents. Finally, we demonstrate how big data-based pervasive analytics such as activity curve-based change detection can be used to perform functional health assessment. Our evaluation indicates that correlations do exist between behavior and health changes and that these changes can be automatically detected using smart homes, machine learning, and big data-based pervasive analytics. PMID:27346990
Modeling Patterns of Activities using Activity Curves.
Dawadi, Prafulla N; Cook, Diane J; Schmitter-Edgecombe, Maureen
2016-06-01
Pervasive computing offers an unprecedented opportunity to unobtrusively monitor behavior and use the large amount of collected data to perform analysis of activity-based behavioral patterns. In this paper, we introduce the notion of an activity curve , which represents an abstraction of an individual's normal daily routine based on automatically-recognized activities. We propose methods to detect changes in behavioral routines by comparing activity curves and use these changes to analyze the possibility of changes in cognitive or physical health. We demonstrate our model and evaluate our change detection approach using a longitudinal smart home sensor dataset collected from 18 smart homes with older adult residents. Finally, we demonstrate how big data-based pervasive analytics such as activity curve-based change detection can be used to perform functional health assessment. Our evaluation indicates that correlations do exist between behavior and health changes and that these changes can be automatically detected using smart homes, machine learning, and big data-based pervasive analytics.
Portelli, Anthony J; Nasuto, Slawomir J
2017-01-01
For the advent of pervasive bio-potential monitoring, it will be necessary to utilize a combination of cheap, quick to apply, low-noise electrodes and compact electronics with wireless technologies. Once available, all electrical activity resulting from the processes of the human body could be actively and constantly monitored without the need for cumbersome application and maintenance. This could significantly improve the early diagnosis of a range of different conditions in high-risk individuals, opening the possibility for new treatments and interventions as conditions develop. This paper presents the design and implementation of compact, non-contact capacitive bio-potential electrodes utilising a low impedance current-to-voltage configuration and a bootstrapped voltage follower, demonstrating results applicable to research applications for capacitive electrocardiography and capacitive electromyography. The presented electrodes use few components, have a small surface area and are capable of acquiring a range of bio-potential signals.
Portelli, Anthony J.; Nasuto, Slawomir J.
2017-01-01
For the advent of pervasive bio-potential monitoring, it will be necessary to utilize a combination of cheap, quick to apply, low-noise electrodes and compact electronics with wireless technologies. Once available, all electrical activity resulting from the processes of the human body could be actively and constantly monitored without the need for cumbersome application and maintenance. This could significantly improve the early diagnosis of a range of different conditions in high-risk individuals, opening the possibility for new treatments and interventions as conditions develop. This paper presents the design and implementation of compact, non-contact capacitive bio-potential electrodes utilising a low impedance current-to-voltage configuration and a bootstrapped voltage follower, demonstrating results applicable to research applications for capacitive electrocardiography and capacitive electromyography. The presented electrodes use few components, have a small surface area and are capable of acquiring a range of bio-potential signals. PMID:28045439
Polytopol computing for multi-core and distributed systems
NASA Astrophysics Data System (ADS)
Spaanenburg, Henk; Spaanenburg, Lambert; Ranefors, Johan
2009-05-01
Multi-core computing provides new challenges to software engineering. The paper addresses such issues in the general setting of polytopol computing, that takes multi-core problems in such widely differing areas as ambient intelligence sensor networks and cloud computing into account. It argues that the essence lies in a suitable allocation of free moving tasks. Where hardware is ubiquitous and pervasive, the network is virtualized into a connection of software snippets judiciously injected to such hardware that a system function looks as one again. The concept of polytopol computing provides a further formalization in terms of the partitioning of labor between collector and sensor nodes. Collectors provide functions such as a knowledge integrator, awareness collector, situation displayer/reporter, communicator of clues and an inquiry-interface provider. Sensors provide functions such as anomaly detection (only communicating singularities, not continuous observation), they are generally powered or self-powered, amorphous (not on a grid) with generation-and-attrition, field re-programmable, and sensor plug-and-play-able. Together the collector and the sensor are part of the skeleton injector mechanism, added to every node, and give the network the ability to organize itself into some of many topologies. Finally we will discuss a number of applications and indicate how a multi-core architecture supports the security aspects of the skeleton injector.
A survey of body sensor networks.
Lai, Xiaochen; Liu, Quanli; Wei, Xin; Wang, Wei; Zhou, Guoqiao; Han, Guangyi
2013-04-24
The technology of sensor, pervasive computing, and intelligent information processing is widely used in Body Sensor Networks (BSNs), which are a branch of wireless sensor networks (WSNs). BSNs are playing an increasingly important role in the fields of medical treatment, social welfare and sports, and are changing the way humans use computers. Existing surveys have placed emphasis on the concept and architecture of BSNs, signal acquisition, context-aware sensing, and system technology, while this paper will focus on sensor, data fusion, and network communication. And we will introduce the research status of BSNs, the analysis of hotspots, and future development trends, the discussion of major challenges and technical problems facing currently. The typical research projects and practical application of BSNs are introduced as well. BSNs are progressing along the direction of multi-technology integration and intelligence. Although there are still many problems, the future of BSNs is fundamentally promising, profoundly changing the human-machine relationships and improving the quality of people's lives.
A Survey of Body Sensor Networks
Lai, Xiaochen; Liu, Quanli; Wei, Xin; Wang, Wei; Zhou, Guoqiao; Han, Guangyi
2013-01-01
The technology of sensor, pervasive computing, and intelligent information processing is widely used in Body Sensor Networks (BSNs), which are a branch of wireless sensor networks (WSNs). BSNs are playing an increasingly important role in the fields of medical treatment, social welfare and sports, and are changing the way humans use computers. Existing surveys have placed emphasis on the concept and architecture of BSNs, signal acquisition, context-aware sensing, and system technology, while this paper will focus on sensor, data fusion, and network communication. And we will introduce the research status of BSNs, the analysis of hotspots, and future development trends, the discussion of major challenges and technical problems facing currently. The typical research projects and practical application of BSNs are introduced as well. BSNs are progressing along the direction of multi-technology integration and intelligence. Although there are still many problems, the future of BSNs is fundamentally promising, profoundly changing the human-machine relationships and improving the quality of people's lives. PMID:23615581
Implementing Internet of Things in a military command and control environment
NASA Astrophysics Data System (ADS)
Raglin, Adrienne; Metu, Somiya; Russell, Stephen; Budulas, Peter
2017-05-01
While the term Internet of Things (IoT) has been coined relatively recently, it has deep roots in multiple other areas of research including cyber-physical systems, pervasive and ubiquitous computing, embedded systems, mobile ad-hoc networks, wireless sensor networks, cellular networks, wearable computing, cloud computing, big data analytics, and intelligent agents. As the Internet of Things, these technologies have created a landscape of diverse heterogeneous capabilities and protocols that will require adaptive controls to effect linkages and changes that are useful to end users. In the context of military applications, it will be necessary to integrate disparate IoT devices into a common platform that necessarily must interoperate with proprietary military protocols, data structures, and systems. In this environment, IoT devices and data will not be homogeneous and provenance-controlled (i.e. single vendor/source/supplier owned). This paper presents a discussion of the challenges of integrating varied IoT devices and related software in a military environment. A review of contemporary commercial IoT protocols is given and as a practical example, a middleware implementation is proffered that provides transparent interoperability through a proactive message dissemination system. The implementation is described as a framework through which military applications can integrate and utilize commercial IoT in conjunction with existing military sensor networks and command and control (C2) systems.
Computing technology in the 1980's. [computers
NASA Technical Reports Server (NTRS)
Stone, H. S.
1978-01-01
Advances in computing technology have been led by consistently improving semiconductor technology. The semiconductor industry has turned out ever faster, smaller, and less expensive devices since transistorized computers were first introduced 20 years ago. For the next decade, there appear to be new advances possible, with the rate of introduction of improved devices at least equal to the historic trends. The implication of these projections is that computers will enter new markets and will truly be pervasive in business, home, and factory as their cost diminishes and their computational power expands to new levels. The computer industry as we know it today will be greatly altered in the next decade, primarily because the raw computer system will give way to computer-based turn-key information and control systems.
Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N
2015-12-01
With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.
Video and computer games: effect on children and implications for health education.
Dorman, S M
1997-04-01
Video and computer-based games have assumed a prominent role in the culture of American children and adolescents. Given the pervasiveness of their influence, it is likely that these games may affect the health and well-being of children. This paper examines the health effects of these games on children, suggests criteria upon which parents and teachers may evaluate the games, and notes some implications for health educators.
2009-12-17
IEEE TDKE, 1996. 8( 1). 14. Garvey, T.D., The inference Problem for Computer Security. 1992, SRI International. 15. Chaum , D ., Blind Signatures for...Pervasive Computing Environments. IEEE Transactions on Vehicular Technology, 2006. 55(4). 17. Chaum , D ., Security without Identification: Transaction...Systems to make Big Brother Obsolete. Communications of the ACM 1985. 28(10). 18. Chaum , D ., Untraceable Electronic Mail, Return Addresses, and Digital
Scalable Prediction of Energy Consumption using Incremental Time Series Clustering
DOE Office of Scientific and Technical Information (OSTI.GOV)
Simmhan, Yogesh; Noor, Muhammad Usman
2013-10-09
Time series datasets are a canonical form of high velocity Big Data, and often generated by pervasive sensors, such as found in smart infrastructure. Performing predictive analytics on time series data can be computationally complex, and requires approximation techniques. In this paper, we motivate this problem using a real application from the smart grid domain. We propose an incremental clustering technique, along with a novel affinity score for determining cluster similarity, which help reduce the prediction error for cumulative time series within a cluster. We evaluate this technique, along with optimizations, using real datasets from smart meters, totaling ~700,000 datamore » points, and show the efficacy of our techniques in improving the prediction error of time series data within polynomial time.« less
Nonlinear Solver Approaches for the Diffusive Wave Approximation to the Shallow Water Equations
NASA Astrophysics Data System (ADS)
Collier, N.; Knepley, M.
2015-12-01
The diffusive wave approximation to the shallow water equations (DSW) is a doubly-degenerate, nonlinear, parabolic partial differential equation used to model overland flows. Despite its challenges, the DSW equation has been extensively used to model the overland flow component of various integrated surface/subsurface models. The equation's complications become increasingly problematic when ponding occurs, a feature which becomes pervasive when solving on large domains with realistic terrain. In this talk I discuss the various forms and regularizations of the DSW equation and highlight their effect on the solvability of the nonlinear system. In addition to this analysis, I present results of a numerical study which tests the applicability of a class of composable nonlinear algebraic solvers recently added to the Portable, Extensible, Toolkit for Scientific Computation (PETSc).
Mining Personal Data Using Smartphones and Wearable Devices: A Survey
Rehman, Muhammad Habib ur; Liew, Chee Sun; Wah, Teh Ying; Shuja, Junaid; Daghighi, Babak
2015-01-01
The staggering growth in smartphone and wearable device use has led to a massive scale generation of personal (user-specific) data. To explore, analyze, and extract useful information and knowledge from the deluge of personal data, one has to leverage these devices as the data-mining platforms in ubiquitous, pervasive, and big data environments. This study presents the personal ecosystem where all computational resources, communication facilities, storage and knowledge management systems are available in user proximity. An extensive review on recent literature has been conducted and a detailed taxonomy is presented. The performance evaluation metrics and their empirical evidences are sorted out in this paper. Finally, we have highlighted some future research directions and potentially emerging application areas for personal data mining using smartphones and wearable devices. PMID:25688592
Principled design for an integrated computational environment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Disessa, A.A.
Boxer is a computer language designed to be the base of an integrated computational environment providing a broad array of functionality -- from text editing to programming -- for naive and novice users. It stands in the line of Lisp inspired languages (Lisp, Logo, Scheme), but differs from these in achieving much of its understandability from pervasive use of a spatial metaphor reinforced through suitable graphics. This paper describes a set of learnability and understandability issues first and then uses them to motivate design decisions made concerning Boxer and the environment in which it is embedded.
Perspectives from the NSF-sponsored workshop on Grand Challenges in Nanomaterials
NASA Astrophysics Data System (ADS)
Hull, Robert
2004-03-01
At an NSF-sponsored workshop in June 2003, about seventy research leaders in the field of nanomaterials met to discuss, explore and identify future new directions and critical needs ("Grand Challenges") for the next decade and beyond. The key pervasive theme that was identified was the need to develop techniques for assembly of nanoscaled materials over multiple lengths scales, at the levels of efficiency, economy, and precision necessary to realize broad new classes of applications in such diverse technologies as electronics, computation, telecommunications, data storage, energy storage / transmission / generation, health care, transportation, civil infrastructure, military applications, national security, and the environment. Elements of this strategy include development of new self-assembly and lithographic techniques; biologically-mediated synthesis; three-dimensional atomic-scale measurement of structure, properties and chemistry; harnessing of the sub-atomic properties of materials such as electron spin and quantum interactions; new computational methods that span all relevant length- and time- scales; a fundamental understanding of acceptable / achievable "fault tolerance" at the nanoscale; and methods for real-time and distributed sensing of nanoscale assembly. A parallel theme was the need to provide education concerning the potential, applications, and benefits of nanomaterials to all components of society and all levels of the educational spectrum. This talk will summarize the conclusions and recommendations from this workshop, and illustrate the future potential of this field through presentation of selected break-through results provided by workshop participants.
Body area network--a key infrastructure element for patient-centered telemedicine.
Norgall, Thomas; Schmidt, Robert; von der Grün, Thomas
2004-01-01
The Body Area Network (BAN) extends the range of existing wireless network technologies by an ultra-low range, ultra-low power network solution optimised for long-term or continuous healthcare applications. It enables wireless radio communication between several miniaturised, intelligent Body Sensor (or actor) Units (BSU) and a single Body Central Unit (BCU) worn at the human body. A separate wireless transmission link from the BCU to a network access point--using different technology--provides for online access to BAN components via usual network infrastructure. The BAN network protocol maintains dynamic ad-hoc network configuration scenarios and co-existence of multiple networks.BAN is expected to become a basic infrastructure element for electronic health services: By integrating patient-attached sensors and mobile actor units, distributed information and data processing systems, the range of medical workflow can be extended to include applications like wireless multi-parameter patient monitoring and therapy support. Beyond clinical use and professional disease management environments, private personal health assistance scenarios (without financial reimbursement by health agencies / insurance companies) enable a wide range of applications and services in future pervasive computing and networking environments.
ROSA: Resource-Oriented Service Management Schemes for Web of Things in a Smart Home.
Liao, Chun-Feng; Chen, Peng-Yu
2017-09-21
A Pervasive-computing-enriched smart home environment, which contains many embedded and tiny intelligent devices and sensors coordinated by service management mechanisms, is capable of anticipating intentions of occupants and providing appropriate services accordingly. Although there are a wealth of research achievements in recent years, the degree of market acceptance is still low. The main reason is that most of the devices and services in such environments depend on particular platform or technology, making it hard to develop an application by composing the devices or services. Meanwhile, the concept of Web of Things (WoT) is becoming popular recently. Based on WoT, the developers can build applications based on popular web tools or technologies. Consequently, the objective of this paper is to propose a set of novel WoT-driven plug-and-play service management schemes for a smart home called Resource-Oriented Service Administration (ROSA). We have implemented an application prototype, and experiments are performed to show the effectiveness of the proposed approach. The results of this research can be a foundation for realizing the vision of "end user programmable smart environments".
Screen Media and Young Children: Who Benefits?
ERIC Educational Resources Information Center
Cardany, Audrey Berger
2010-01-01
Since the airing of "Sesame Street" in 1985, television produced for children has expanded to more television shows and educational media that includes videos, DVDs, and computer products. Viewing screen media is pervasive in the environments of young children, and companies are designing products for our youngest viewers--infants and toddlers.…
Interface Architecture for Testing in Foreign Language Education
ERIC Educational Resources Information Center
Laborda, Jesus Garcia
2009-01-01
The implications of new learning environments have been far-reaching and pervasive (Plass, 1998), at least in the field of interface design both in traditional computer and mobile devices (Fallahkhair, Pemberton, & Griffiths, 2007). Given the current status of efficient models, educators need the unproven unification of interfaces and working…
ERIC Educational Resources Information Center
Renaud, Christian; Wagoner, Bridgette
2011-01-01
The use of computer-based gaming in education is not a new phenomenon. Many educators nostalgically remember green Apple II monitors displaying the games Lemonade Stand and Oregon Trail in the early 1980s. Technology in schools has evolved considerably since then, and gaming has become pervasive within all demographic subgroups. Gaming within…
Collaborative Joins in a Pervasive Computing Environment
2003-07-28
the available resources of each device. For example, CQP allows a tourist to use her handheld device to ask for the closest cheapest laundromat that is...open, given her current location, time of the day and a price range. The protocol also allows the tourist to ask for the closest laundromat adjacent
The design of an m-Health monitoring system based on a cloud computing platform
NASA Astrophysics Data System (ADS)
Xu, Boyi; Xu, Lida; Cai, Hongming; Jiang, Lihong; Luo, Yang; Gu, Yizhi
2017-01-01
Compared to traditional medical services provided within hospitals, m-Health monitoring systems (MHMSs) face more challenges in personalised health data processing. To achieve personalised and high-quality health monitoring by means of new technologies, such as mobile network and cloud computing, in this paper, a framework of an m-Health monitoring system based on a cloud computing platform (Cloud-MHMS) is designed to implement pervasive health monitoring. Furthermore, the modules of the framework, which are Cloud Storage and Multiple Tenants Access Control Layer, Healthcare Data Annotation Layer, and Healthcare Data Analysis Layer, are discussed. In the data storage layer, a multiple tenant access method is designed to protect patient privacy. In the data annotation layer, linked open data are adopted to augment health data interoperability semantically. In the data analysis layer, the process mining algorithm and similarity calculating method are implemented to support personalised treatment plan selection. These three modules cooperate to implement the core functions in the process of health monitoring, which are data storage, data processing, and data analysis. Finally, we study the application of our architecture in the monitoring of antimicrobial drug usage to demonstrate the usability of our method in personal healthcare analysis.
1990-10-01
involving a heavy artillery barrage, the impact point output alone could consume upwards of 10,000 pages of computer paper. For this reason, AURA provides...but pervasive factor: the asset allocation model must be compatible with the mathematical behavior of the input data. Thus, for example, if assets are...described as expendable during repair or decontamination activities, it must have HOMELINKS which appear in the consuming repair SUBCHAINs
Engineering Amorphous Systems, Using Global-to-Local Compilation
NASA Astrophysics Data System (ADS)
Nagpal, Radhika
Emerging technologies are making it possible to assemble systems that incorporate myriad of information-processing units at almost no cost: smart materials, selfassembling structures, vast sensor networks, pervasive computing. How does one engineer robust and prespecified global behavior from the local interactions of immense numbers of unreliable parts? We discuss organizing principles and programming methodologies that have emerged from Amorphous Computing research, that allow us to compile a specification of global behavior into a robust program for local behavior.
An enhanced mobile-healthcare emergency system based on extended chaotic maps.
Lee, Cheng-Chi; Hsu, Che-Wei; Lai, Yan-Ming; Vasilakos, Athanasios
2013-10-01
Mobile Healthcare (m-Healthcare) systems, namely smartphone applications of pervasive computing that utilize wireless body sensor networks (BSNs), have recently been proposed to provide smartphone users with health monitoring services and received great attentions. An m-Healthcare system with flaws, however, may leak out the smartphone user's personal information and cause security, privacy preservation, or user anonymity problems. In 2012, Lu et al. proposed a secure and privacy-preserving opportunistic computing (SPOC) framework for mobile-Healthcare emergency. The brilliant SPOC framework can opportunistically gather resources on the smartphone such as computing power and energy to process the computing-intensive personal health information (PHI) in case of an m-Healthcare emergency with minimal privacy disclosure. To balance between the hazard of PHI privacy disclosure and the necessity of PHI processing and transmission in m-Healthcare emergency, in their SPOC framework, Lu et al. introduced an efficient user-centric privacy access control system which they built on the basis of an attribute-based access control mechanism and a new privacy-preserving scalar product computation (PPSPC) technique. However, we found out that Lu et al.'s protocol still has some secure flaws such as user anonymity and mutual authentication. To fix those problems and further enhance the computation efficiency of Lu et al.'s protocol, in this article, the authors will present an improved mobile-Healthcare emergency system based on extended chaotic maps. The new system is capable of not only providing flawless user anonymity and mutual authentication but also reducing the computation cost.
ERIC Educational Resources Information Center
Gannicott, Ken; Throsby, C. David
1992-01-01
Reviews recent research on educational quality and its application to South Pacific island economies. Demonstrates the pervasive nature of school quality problems in the region despite national variations. Influences on educational quality include teacher quality, learning material availability, initial instruction in mother tongues, management…
ERIC Educational Resources Information Center
Roman, Harry T.
2012-01-01
Nanotechnology is now making it possible to create radically new tiny machines and sensors on par with the size of dust motes. This technology is rapidly progressing and will make profound impacts on the nation's global competitiveness. It promises to be a most pervasive technological advance, comparable to what computers did for an individual's…
E-Learning Today: A Review of Research on Hypertext Comprehension
ERIC Educational Resources Information Center
Hinesley, Gail A.
2007-01-01
Use of hypertext is pervasive in education today--it is used for all online course delivery as well as many stand-alone delivery methods such as educational computer software and compact discs (CDs). This article will review Kintsch's Construction-Integration and Anderson's Adaptive Control of Thought-Rational (ACT-R) cognitive architectures and…
Institutional Expansion: The Case of Grid Computing
ERIC Educational Resources Information Center
Kertcher, Zack
2010-01-01
Evolutionary and revolutionary approaches have dominated the study of scientific, technological and institutional change. Yet, being focused on change within a single field, these approaches have been mute about a third, pervasive process. This process is found in a variety of cases that range from open source software to the Monte Carlo method to…
The Role of Technology in Teaching Languages for Specific Purposes Courses
ERIC Educational Resources Information Center
Arno-Macia, Elisabet
2012-01-01
Within the integration of technology into language education, special attention needs to be paid to languages for specific purposes (LSP), drawing on developments in computer-assisted language learning and applied linguistics, on the one hand, and on the pervasive use of technology in academic and professional communication, on the other. From a…
Pedagogic Transformation, Student-Directed Design and Computational Thinking
ERIC Educational Resources Information Center
Vallance, Michael; Towndrow, Phillip A.
2016-01-01
In a world where technology has become pervasive in our lives, the notion of IT integration in education practice is losing its significance. It is now more appropriate to discuss transforming pedagogy where technology is not considered a tool anymore but part of what we are. To advance this hypothesis, an enterprising, student-directed approach…
QR Codes in Higher Ed: Fad or Functional Tool?
ERIC Educational Resources Information Center
Gradel, Kathleen; Edson, Alden J.
2013-01-01
As higher education grapples with addressing the 21st century needs of learners, technology is a pervasive concern. Waters (2012) painted a picture of three historical "screens," namely the television screen, the computer monitor, and today's mobile device screen. As mobile devices become increasingly commonplace in the workplace and on the…
Wireless Sensor Node Data Gathering and Location Mapping
2012-03-01
adaptive two-phase approach to WiFi location sensing,” 4 th Int. Conf. on Pervasive Computing and Communications Workshops, Pisa, Italy, 2006, pp. 452...wrt.v24_micro_generic.bin, March 2010. [11] P. Asadoorian and L. Pesce, Linksys WRT54G Ultimate Hacking , Burlington, MA: Syngress, 2007, pp. 25. 32
ERIC Educational Resources Information Center
Briggs, Linda L.
2006-01-01
Wireless and mobile technologies are now everywhere, and 24/7 computing is as pervasive a term as the actual capability promises to be. Sometimes, in fact, the push toward mobile technologies can seem overwhelming. But every wireless project doesn't have to involve redesigning the network and investing in mega-dollars worth of hardware and…
Integrating Digital and STEM Practices
ERIC Educational Resources Information Center
White, Tobin; Martin, Lee
2012-01-01
As mobile devices become increasingly pervasive among youth, the gap between students with and without access to personal computers at home may soon be replaced by a new digital divide: between one set of informal ways of using those tools that are familiar, personally meaningful, and relevant to their out-of-school lives, and another set of uses…
Is Texting Ruining Intimacy? Exploring Perceptions among Sexuality Students in Higher Education
ERIC Educational Resources Information Center
McGee, Michael J.
2014-01-01
In the context of researchers' and educators' concerns about the pervasive use of technology to communicate with one another, this study explored whether the frequency of emerging adults' computer-mediated communication (CMC) is correlated with their perceptions of intimacy, relationship, and sexual satisfaction. The sample included 298 young…
Media Literacy: What, Why, and How?
ERIC Educational Resources Information Center
Grace, Donna J.
2005-01-01
Literacy has traditionally been associated with the printed word. But today, print literacy is not enough. Children and youth need to learn to "read" and interpret visual images as well. Film, television, videos, DVDs, computer games, and the Internet all hold a prominent and pervasive place in one's culture. Its presence in people's lives is only…
Optimal Software Strategies in the Presence of Network Externalities
ERIC Educational Resources Information Center
Liu, Yipeng
2009-01-01
Network externalities or alternatively termed network effects are pervasive in computer software markets. While software vendors consider pricing strategies, they must also take into account the impact of network externalities on their sales. My main interest in this research is to describe a firm's strategies and behaviors in the presence of…
Codifying a Next-Generation Education System: New York City iSchool
ERIC Educational Resources Information Center
Education Development Center, Inc, 2009
2009-01-01
The world outside schools is changing rapidly with the advances of technology and economic requirements for a 21st-century global citizenry. Today, technology has moved into one's everyday life and is becoming a pervasive part of how one works, learns, and plays. Similarly, networked communications and computer technology have transformed the…
Transformation in the pharmaceutical industry--a systematic review of the literature.
Shafiei, Nader; Ford, James L; Morecroft, Charles W; Lisboa, Paulo J; Taylor, Mark J; Mouzughi, Yusra
2013-01-01
The evolutionary development of pharmaceutical transformation was studied through systematic review of the literature. Fourteen triggers were identified that will affect the pharmaceutical business, regulatory science, and enabling technologies in future years. The relative importance ranking of the transformation triggers was computed based on their prevalence within the articles studied. The four main triggers with the strongest literature evidence were Fully Integrated Pharma Network, Personalized Medicine, Translational Research, and Pervasive Computing. The theoretical quality risks for each of the four main transformation triggers are examined, and the remaining ten triggers are described. The pharmaceutical industry is currently going through changes that affect the way it performs its research, manufacturing, and regulatory activities (this is termed pharmaceutical transformation). The impact of these changes on the approaches to quality risk management requires more understanding. In this paper, a comprehensive review of the academic, regulatory, and industry literature were used to identify 14 triggers that influence pharmaceutical transformation. The four main triggers, namely Fully Integrated Pharma Network, Personalized Medicine, Translational Research, and Pervasive Computing, were selected as the most important based on the strength of the evidence found during the literature review activity described in this paper. Theoretical quality risks for each of the four main transformation triggers are examined, and the remaining ten triggers are described.
Fault detection and isolation in motion monitoring system.
Kim, Duk-Jin; Suk, Myoung Hoon; Prabhakaran, B
2012-01-01
Pervasive computing becomes very active research field these days. A watch that can trace human movement to record motion boundary as well as to study of finding social life pattern by one's localized visiting area. Pervasive computing also helps patient monitoring. A daily monitoring system helps longitudinal study of patient monitoring such as Alzheimer's and Parkinson's or obesity monitoring. Due to the nature of monitoring sensor (on-body wireless sensor), however, signal noise or faulty sensors errors can be present at any time. Many research works have addressed these problems any with a large amount of sensor deployment. In this paper, we present the faulty sensor detection and isolation using only two on-body sensors. We have been investigating three different types of sensor errors: the SHORT error, the CONSTANT error, and the NOISY SENSOR error (see more details on section V). Our experimental results show that the success rate of isolating faulty signals are an average of over 91.5% on fault type 1, over 92% on fault type 2, and over 99% on fault type 3 with the fault prior of 30% sensor errors.
NASA Astrophysics Data System (ADS)
Parsons, Matthew
2015-04-01
Computational physics is a rich and vibrant field in its own right, but often not given the attention that it should receive in the typical undergraduate physics curriculum. It appears that the partisan theorist vs. experimentalist view is still pervasive in academia, or at least still portrayed to students, while in fact there is a continuous spectrum of opportunities in between these two extremes. As a case study, I'll give my perspective as a graduating physics student with examples of computational coursework at Drexel University and research opportunities that this experience has led to.
NASA Astrophysics Data System (ADS)
Mullen, Katharine M.
Human-technology integration is the replacement of human parts and extension of human capabilities with engineered devices and substrates. Its result is hybrid biological-artificial systems. We discuss here four categories of products furthering human-technology integration: wearable computers, pervasive computing environments, engineered tissues and organs, and prosthetics, and introduce examples of currently realized systems in each category. We then note that realization of a completely artificial sytem via the path of human-technology integration presents the prospect of empirical confirmation of an aware artificially embodied system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jha, Sumit Kumar; Pullum, Laura L; Ramanathan, Arvind
Embedded intelligent systems ranging from tiny im- plantable biomedical devices to large swarms of autonomous un- manned aerial systems are becoming pervasive in our daily lives. While we depend on the flawless functioning of such intelligent systems, and often take their behavioral correctness and safety for granted, it is notoriously difficult to generate test cases that expose subtle errors in the implementations of machine learning algorithms. Hence, the validation of intelligent systems is usually achieved by studying their behavior on representative data sets, using methods such as cross-validation and bootstrapping.In this paper, we present a new testing methodology for studyingmore » the correctness of intelligent systems. Our approach uses symbolic decision procedures coupled with statistical hypothesis testing to. We also use our algorithm to analyze the robustness of a human detection algorithm built using the OpenCV open-source computer vision library. We show that the human detection implementation can fail to detect humans in perturbed video frames even when the perturbations are so small that the corresponding frames look identical to the naked eye.« less
NASA Astrophysics Data System (ADS)
Watanabe, W. M.; Candido, A.; Amâncio, M. A.; De Oliveira, M.; Pardo, T. A. S.; Fortes, R. P. M.; Aluísio, S. M.
2010-12-01
This paper presents an approach for assisting low-literacy readers in accessing Web online information. The "Educational FACILITA" tool is a Web content adaptation tool that provides innovative features and follows more intuitive interaction models regarding accessibility concerns. Especially, we propose an interaction model and a Web application that explore the natural language processing tasks of lexical elaboration and named entity labeling for improving Web accessibility. We report on the results obtained from a pilot study on usability analysis carried out with low-literacy users. The preliminary results show that "Educational FACILITA" improves the comprehension of text elements, although the assistance mechanisms might also confuse users when word sense ambiguity is introduced, by gathering, for a complex word, a list of synonyms with multiple meanings. This fact evokes a future solution in which the correct sense for a complex word in a sentence is identified, solving this pervasive characteristic of natural languages. The pilot study also identified that experienced computer users find the tool to be more useful than novice computer users do.
STREAM2016: Streaming Requirements, Experience, Applications and Middleware Workshop
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fox, Geoffrey; Jha, Shantenu; Ramakrishnan, Lavanya
The Department of Energy (DOE) Office of Science (SC) facilities including accelerators, light sources and neutron sources and sensors that study, the environment, and the atmosphere, are producing streaming data that needs to be analyzed for next-generation scientific discoveries. There has been an explosion of new research and technologies for stream analytics arising from the academic and private sectors. However, there has been no corresponding effort in either documenting the critical research opportunities or building a community that can create and foster productive collaborations. The two-part workshop series, STREAM: Streaming Requirements, Experience, Applications and Middleware Workshop (STREAM2015 and STREAM2016), weremore » conducted to bring the community together and identify gaps and future efforts needed by both NSF and DOE. This report describes the discussions, outcomes and conclusions from STREAM2016: Streaming Requirements, Experience, Applications and Middleware Workshop, the second of these workshops held on March 22-23, 2016 in Tysons, VA. STREAM2016 focused on the Department of Energy (DOE) applications, computational and experimental facilities, as well software systems. Thus, the role of “streaming and steering” as a critical mode of connecting the experimental and computing facilities was pervasive through the workshop. Given the overlap in interests and challenges with industry, the workshop had significant presence from several innovative companies and major contributors. The requirements that drive the proposed research directions, identified in this report, show an important opportunity for building competitive research and development program around streaming data. These findings and recommendations are consistent with vision outlined in NRC Frontiers of Data and National Strategic Computing Initiative (NCSI) [1, 2]. The discussions from the workshop are captured as topic areas covered in this report's sections. The report discusses four research directions driven by current and future application requirements reflecting the areas identified as important by STREAM2016. These include (i) Algorithms, (ii) Programming Models, Languages and Runtime Systems (iii) Human-in-the-loop and Steering in Scientific Workflow and (iv) Facilities.« less
Pervasive assistive technology for people with dementia: a UCD case
Rønn-Andersen, Kristoffer V.H.; Bień, Paulina; Özkil, Ali Gürcan; Forchhammer, Birgitte Hysse; Maier, Anja M.
2016-01-01
Smart mobile and wearable technology offers exciting opportunities to support people with dementia (PwD). Its ubiquity and popularity could even benefit user adoption – a great challenge for assistive technology (AT) for PwD that calls for user-centred design (UCD) methods. This study describes a user-centred approach to developing and testing AT based on off-the-shelf pervasive technologies. A prototype is created by combining a smartphone, smartwatch and various applications to offer six support features. This is tested among five end-users (PwD) and their caregivers. Controlled usability testing was followed by field testing in a real-world context. Data is gathered from video recordings, interaction logs, system usability scale questionnaires, logbooks, application usage logs and interviews structured on the unified theory of acceptance and use of technology model. The data is analysed to evaluate usability, usefulness and user acceptance. Results show some promise for user adoption, but highlight challenges to be overcome, emphasising personalisation and familiarity as key considerations. The complete findings regarding usability issues, usefulness of support features and four identified adoption profiles are used to provide a set of recommendations for practitioners and further research. These contribute toward UCD practices for improved smart, pervasive AT for dementia. PMID:28008366
Almeida, Jonas S.; Iriabho, Egiebade E.; Gorrepati, Vijaya L.; Wilkinson, Sean R.; Grüneberg, Alexander; Robbins, David E.; Hackney, James R.
2012-01-01
Background: Image bioinformatics infrastructure typically relies on a combination of server-side high-performance computing and client desktop applications tailored for graphic rendering. On the server side, matrix manipulation environments are often used as the back-end where deployment of specialized analytical workflows takes place. However, neither the server-side nor the client-side desktop solution, by themselves or combined, is conducive to the emergence of open, collaborative, computational ecosystems for image analysis that are both self-sustained and user driven. Materials and Methods: ImageJS was developed as a browser-based webApp, untethered from a server-side backend, by making use of recent advances in the modern web browser such as a very efficient compiler, high-end graphical rendering capabilities, and I/O tailored for code migration. Results: Multiple versioned code hosting services were used to develop distinct ImageJS modules to illustrate its amenability to collaborative deployment without compromise of reproducibility or provenance. The illustrative examples include modules for image segmentation, feature extraction, and filtering. The deployment of image analysis by code migration is in sharp contrast with the more conventional, heavier, and less safe reliance on data transfer. Accordingly, code and data are loaded into the browser by exactly the same script tag loading mechanism, which offers a number of interesting applications that would be hard to attain with more conventional platforms, such as NIH's popular ImageJ application. Conclusions: The modern web browser was found to be advantageous for image bioinformatics in both the research and clinical environments. This conclusion reflects advantages in deployment scalability and analysis reproducibility, as well as the critical ability to deliver advanced computational statistical procedures machines where access to sensitive data is controlled, that is, without local “download and installation”. PMID:22934238
Almeida, Jonas S; Iriabho, Egiebade E; Gorrepati, Vijaya L; Wilkinson, Sean R; Grüneberg, Alexander; Robbins, David E; Hackney, James R
2012-01-01
Image bioinformatics infrastructure typically relies on a combination of server-side high-performance computing and client desktop applications tailored for graphic rendering. On the server side, matrix manipulation environments are often used as the back-end where deployment of specialized analytical workflows takes place. However, neither the server-side nor the client-side desktop solution, by themselves or combined, is conducive to the emergence of open, collaborative, computational ecosystems for image analysis that are both self-sustained and user driven. ImageJS was developed as a browser-based webApp, untethered from a server-side backend, by making use of recent advances in the modern web browser such as a very efficient compiler, high-end graphical rendering capabilities, and I/O tailored for code migration. Multiple versioned code hosting services were used to develop distinct ImageJS modules to illustrate its amenability to collaborative deployment without compromise of reproducibility or provenance. The illustrative examples include modules for image segmentation, feature extraction, and filtering. The deployment of image analysis by code migration is in sharp contrast with the more conventional, heavier, and less safe reliance on data transfer. Accordingly, code and data are loaded into the browser by exactly the same script tag loading mechanism, which offers a number of interesting applications that would be hard to attain with more conventional platforms, such as NIH's popular ImageJ application. The modern web browser was found to be advantageous for image bioinformatics in both the research and clinical environments. This conclusion reflects advantages in deployment scalability and analysis reproducibility, as well as the critical ability to deliver advanced computational statistical procedures machines where access to sensitive data is controlled, that is, without local "download and installation".
ERIC Educational Resources Information Center
Pan, Gary; Seow, Poh-Sun
2016-01-01
The pervasiveness of information technology (IT) in businesses has altered the nature and economies of accounting activities. In particular, the emergence of cloud computing, eXtensible Business Reporting Language, and business analytics in recent years have transformed the way companies report financial performance and make business decisions. As…
ROSA: Resource-Oriented Service Management Schemes for Web of Things in a Smart Home
Chen, Peng-Yu
2017-01-01
A Pervasive-computing-enriched smart home environment, which contains many embedded and tiny intelligent devices and sensors coordinated by service management mechanisms, is capable of anticipating intentions of occupants and providing appropriate services accordingly. Although there are a wealth of research achievements in recent years, the degree of market acceptance is still low. The main reason is that most of the devices and services in such environments depend on particular platform or technology, making it hard to develop an application by composing the devices or services. Meanwhile, the concept of Web of Things (WoT) is becoming popular recently. Based on WoT, the developers can build applications based on popular web tools or technologies. Consequently, the objective of this paper is to propose a set of novel WoT-driven plug-and-play service management schemes for a smart home called Resource-Oriented Service Administration (ROSA). We have implemented an application prototype, and experiments are performed to show the effectiveness of the proposed approach. The results of this research can be a foundation for realizing the vision of “end user programmable smart environments”. PMID:28934159
QMachine: commodity supercomputing in web browsers.
Wilkinson, Sean R; Almeida, Jonas S
2014-06-09
Ongoing advancements in cloud computing provide novel opportunities in scientific computing, especially for distributed workflows. Modern web browsers can now be used as high-performance workstations for querying, processing, and visualizing genomics' "Big Data" from sources like The Cancer Genome Atlas (TCGA) and the International Cancer Genome Consortium (ICGC) without local software installation or configuration. The design of QMachine (QM) was driven by the opportunity to use this pervasive computing model in the context of the Web of Linked Data in Biomedicine. QM is an open-sourced, publicly available web service that acts as a messaging system for posting tasks and retrieving results over HTTP. The illustrative application described here distributes the analyses of 20 Streptococcus pneumoniae genomes for shared suffixes. Because all analytical and data retrieval tasks are executed by volunteer machines, few server resources are required. Any modern web browser can submit those tasks and/or volunteer to execute them without installing any extra plugins or programs. A client library provides high-level distribution templates including MapReduce. This stark departure from the current reliance on expensive server hardware running "download and install" software has already gathered substantial community interest, as QM received more than 2.2 million API calls from 87 countries in 12 months. QM was found adequate to deliver the sort of scalable bioinformatics solutions that computation- and data-intensive workflows require. Paradoxically, the sandboxed execution of code by web browsers was also found to enable them, as compute nodes, to address critical privacy concerns that characterize biomedical environments.
A review on architectures and communications technologies for wearable health-monitoring systems.
Custodio, Víctor; Herrera, Francisco J; López, Gregorio; Moreno, José Ignacio
2012-10-16
Nowadays society is demanding more and more smart healthcare services that allow monitoring patient status in a non-invasive way, anywhere and anytime. Thus, healthcare applications are currently facing important challenges guided by the u-health (ubiquitous health) and p-health (pervasive health) paradigms. New emerging technologies can be combined with other widely deployed ones to develop such next-generation healthcare systems. The main objective of this paper is to review and provide more details on the work presented in "LOBIN: E-Textile and Wireless-Sensor-Network-Based Platform for Healthcare Monitoring in Future Hospital Environments", published in the IEEE Transactions on Information Technology in Biomedicine, as well as to extend and update the comparison with other similar systems. As a result, the paper discusses the main advantages and disadvantages of using different architectures and communications technologies to develop wearable systems for pervasive healthcare applications.
A Review on Architectures and Communications Technologies for Wearable Health-Monitoring Systems
Custodio, Víctor; Herrera, Francisco J.; López, Gregorio; Moreno, José Ignacio
2012-01-01
Nowadays society is demanding more and more smart healthcare services that allow monitoring patient status in a non-invasive way, anywhere and anytime. Thus, healthcare applications are currently facing important challenges guided by the u-health (ubiquitous health) and p-health (pervasive health) paradigms. New emerging technologies can be combined with other widely deployed ones to develop such next-generation healthcare systems. The main objective of this paper is to review and provide more details on the work presented in “LOBIN: E-Textile and Wireless-Sensor-Network-Based Platform for Healthcare Monitoring in Future Hospital Environments”, published in the IEEE Transactions on Information Technology in Biomedicine, as well as to extend and update the comparison with other similar systems. As a result, the paper discusses the main advantages and disadvantages of using different architectures and communications technologies to develop wearable systems for pervasive healthcare applications. PMID:23202028
Web Services--A Buzz Word with Potentials
János T. Füstös
2006-01-01
The simplest definition of a web service is an application that provides a web API. The web API exposes the functionality of the solution to other applications. The web API relies on other Internet-based technologies to manage communications. The resulting web services are pervasive, vendor-independent, language-neutral, and very low-cost. The main purpose of a web API...
Neuroeconomic approaches to mental disorders
Kishida, Kenneth T.; King-Casas, Brooks; Montague, P. Read
2010-01-01
The pervasiveness of decision-making in every area of human endeavor highlights the importance of understanding choice mechanisms and their detailed relationship to underlying neurobiological function. This review surveys the recent and productive application of game theoretic probes (economic games) to mental disorders. Such games typically possess concrete concepts of optimal play, thus providing quantitative ways to track when subjects’ choices match or deviate from optimal. This feature equips economic games with natural classes of control signals that should guide learning and choice in the agents that play them. These signals and their underlying physical correlates in the brain are now being used to generate objective biomarkers that may prove useful for exposing and understanding the neurogenetic basis of normal and pathological human cognition. Thus, game theoretic probes represent some of the first steps toward producing computationally principled, objective measures of cognitive function and dysfunction useful for the diagnosis, treatment and understanding of mental disorders. PMID:20797532
Big Data and Dementia: Charting the Route Ahead for Research, Ethics, and Policy
Ienca, Marcello; Vayena, Effy; Blasimme, Alessandro
2018-01-01
Emerging trends in pervasive computing and medical informatics are creating the possibility for large-scale collection, sharing, aggregation and analysis of unprecedented volumes of data, a phenomenon commonly known as big data. In this contribution, we review the existing scientific literature on big data approaches to dementia, as well as commercially available mobile-based applications in this domain. Our analysis suggests that big data approaches to dementia research and care hold promise for improving current preventive and predictive models, casting light on the etiology of the disease, enabling earlier diagnosis, optimizing resource allocation, and delivering more tailored treatments to patients with specific disease trajectories. Such promissory outlook, however, has not materialized yet, and raises a number of technical, scientific, ethical, and regulatory challenges. This paper provides an assessment of these challenges and charts the route ahead for research, ethics, and policy. PMID:29468161
Validating a Model for Welding Induced Residual Stress Using High-Energy X-ray Diffraction
NASA Astrophysics Data System (ADS)
Mach, J. C.; Budrow, C. J.; Pagan, D. C.; Ruff, J. P. C.; Park, J.-S.; Okasinski, J.; Beaudoin, A. J.; Miller, M. P.
2017-05-01
Integrated computational materials engineering (ICME) provides a pathway to advance performance in structures through the use of physically-based models to better understand how manufacturing processes influence product performance. As one particular challenge, consider that residual stresses induced in fabrication are pervasive and directly impact the life of structures. For ICME to be an effective strategy, it is essential that predictive capability be developed in conjunction with critical experiments. In the present work, simulation results from a multi-physics model for gas metal arc welding are evaluated through x-ray diffraction using synchrotron radiation. A test component was designed with intent to develop significant gradients in residual stress, be representative of real-world engineering application, yet remain tractable for finely spaced strain measurements with positioning equipment available at synchrotron facilities. The experimental validation lends confidence to model predictions, facilitating the explicit consideration of residual stress distribution in prediction of fatigue life.
Big Data and Dementia: Charting the Route Ahead for Research, Ethics, and Policy.
Ienca, Marcello; Vayena, Effy; Blasimme, Alessandro
2018-01-01
Emerging trends in pervasive computing and medical informatics are creating the possibility for large-scale collection, sharing, aggregation and analysis of unprecedented volumes of data, a phenomenon commonly known as big data. In this contribution, we review the existing scientific literature on big data approaches to dementia, as well as commercially available mobile-based applications in this domain. Our analysis suggests that big data approaches to dementia research and care hold promise for improving current preventive and predictive models, casting light on the etiology of the disease, enabling earlier diagnosis, optimizing resource allocation, and delivering more tailored treatments to patients with specific disease trajectories. Such promissory outlook, however, has not materialized yet, and raises a number of technical, scientific, ethical, and regulatory challenges. This paper provides an assessment of these challenges and charts the route ahead for research, ethics, and policy.
Smart Building: Decision Making Architecture for Thermal Energy Management.
Uribe, Oscar Hernández; Martin, Juan Pablo San; Garcia-Alegre, María C; Santos, Matilde; Guinea, Domingo
2015-10-30
Smart applications of the Internet of Things are improving the performance of buildings, reducing energy demand. Local and smart networks, soft computing methodologies, machine intelligence algorithms and pervasive sensors are some of the basics of energy optimization strategies developed for the benefit of environmental sustainability and user comfort. This work presents a distributed sensor-processor-communication decision-making architecture to improve the acquisition, storage and transfer of thermal energy in buildings. The developed system is implemented in a near Zero-Energy Building (nZEB) prototype equipped with a built-in thermal solar collector, where optical properties are analysed; a low enthalpy geothermal accumulation system, segmented in different temperature zones; and an envelope that includes a dynamic thermal barrier. An intelligent control of this dynamic thermal barrier is applied to reduce the thermal energy demand (heating and cooling) caused by daily and seasonal weather variations. Simulations and experimental results are presented to highlight the nZEB thermal energy reduction.
Ubiquitous health monitoring and real-time cardiac arrhythmias detection: a case study.
Li, Jian; Zhou, Haiying; Zuo, Decheng; Hou, Kun-Mean; De Vaulx, Christophe
2014-01-01
As the symptoms and signs of heart diseases that cause sudden cardiac death, cardiac arrhythmia has attracted great attention. Due to limitations in time and space, traditional approaches to cardiac arrhythmias detection fail to provide a real-time continuous monitoring and testing service applicable in different environmental conditions. Integrated with the latest technologies in ECG (electrocardiograph) analysis and medical care, the pervasive computing technology makes possible the ubiquitous cardiac care services, and thus brings about new technical challenges, especially in the formation of cardiac care architecture and realization of the real-time automatic ECG detection algorithm dedicated to care devices. In this paper, a ubiquitous cardiac care prototype system is presented with its architecture framework well elaborated. This prototype system has been tested and evaluated in all the clinical-/home-/outdoor-care modes with a satisfactory performance in providing real-time continuous cardiac arrhythmias monitoring service unlimitedly adaptable in time and space.
Examining the Criterion-Related Validity of the Pervasive Developmental Disorder Behavior Inventory
ERIC Educational Resources Information Center
McMorris, Carly A.; Perry, Adrienne
2015-01-01
The Pervasive Developmental Disorder Behavior Inventory is a questionnaire designed to aid in the diagnosis of pervasive developmental disorders or autism spectrum disorders. The Pervasive Developmental Disorder Behavior Inventory assesses adaptive and maladaptive behaviors associated with pervasive developmental disorders and provides an…
Instant provisioning of wavelength service using quasi-circuit optical burst switching
NASA Astrophysics Data System (ADS)
Xie, Hongyi; Li, Yanhe; Zheng, Xiaoping; Zhang, Hanyi
2006-09-01
Due to the recent outstanding advancement of optical networking technology, pervasive Grid computing will be a feasible option in the near future. As Grid infrastructure, optical networks must be able to handle different Grid traffic patterns with various traffic characteristics as well as different QoS requirements. With current optical switching technology, optical circuit switching is suitable for data-intensive Grid applications while optical burst switching is suitable to submit small Grid jobs. However, there would be high bandwidth short-lived traffic in some emerging Grid applications such as multimedia editing. This kind of traffic couldn't be well supported by both OCS and conventional OBS because of considerable path setup delay and bandwidth waste in OCS and inherent loss in OBS. Quasi-Circuit OBS (QCOBS) is proposed in this paper to address this challenge, providing one-way reserved, nearly lossless, instant provisioned wavelength service in OBS networks. Simulation results show that QCOBS achieves lossless transmission at low and moderate loads, and very low loss probability at high loads with proper guard time configuration.
Smart Web-Based Platform to Support Physical Rehabilitation.
Rybarczyk, Yves; Kleine Deters, Jan; Cointe, Clément; Esparza, Danilo
2018-04-26
The enhancement of ubiquitous and pervasive computing brings new perspectives in medical rehabilitation. In that sense, the present study proposes a smart, web-based platform to promote the reeducation of patients after hip replacement surgery. This project focuses on two fundamental aspects in the development of a suitable tele-rehabilitation application, which are: (i) being based on an affordable technology, and (ii) providing the patients with a real-time assessment of the correctness of their movements. A probabilistic approach based on the development and training of ten Hidden Markov Models (HMMs) is used to discriminate in real time the main faults in the execution of the therapeutic exercises. Two experiments are designed to evaluate the precision of the algorithm for classifying movements performed in the laboratory and clinical settings, respectively. A comparative analysis of the data shows that the models are as reliable as the physiotherapists to discriminate and identify the motion errors. The results are discussed in terms of the required setup for a successful application in the field and further implementations to improve the accuracy and usability of the system.
NASA Astrophysics Data System (ADS)
Zainudin, M. N. Shah; Sulaiman, Md Nasir; Mustapha, Norwati; Perumal, Thinagaran
2017-10-01
Prior knowledge in pervasive computing recently garnered a lot of attention due to its high demand in various application domains. Human activity recognition (HAR) considered as the applications that are widely explored by the expertise that provides valuable information to the human. Accelerometer sensor-based approach is utilized as devices to undergo the research in HAR since their small in size and this sensor already build-in in the various type of smartphones. However, the existence of high inter-class similarities among the class tends to degrade the recognition performance. Hence, this work presents the method for activity recognition using our proposed features from combinational of spectral analysis with statistical descriptors that able to tackle the issue of differentiating stationary and locomotion activities. The noise signal is filtered using Fourier Transform before it will be extracted using two different groups of features, spectral frequency analysis, and statistical descriptors. Extracted signal later will be classified using random forest ensemble classifier models. The recognition results show the good accuracy performance for stationary and locomotion activities based on USC HAD datasets.
Developing a New Wireless Sensor Network Platform and Its Application in Precision Agriculture
Aquino-Santos, Raúl; González-Potes, Apolinar; Edwards-Block, Arthur; Virgen-Ortiz, Raúl Alejandro
2011-01-01
Wireless sensor networks are gaining greater attention from the research community and industrial professionals because these small pieces of “smart dust” offer great advantages due to their small size, low power consumption, easy integration and support for “green” applications. Green applications are considered a hot topic in intelligent environments, ubiquitous and pervasive computing. This work evaluates a new wireless sensor network platform and its application in precision agriculture, including its embedded operating system and its routing algorithm. To validate the technological platform and the embedded operating system, two different routing strategies were compared: hierarchical and flat. Both of these routing algorithms were tested in a small-scale network applied to a watermelon field. However, we strongly believe that this technological platform can be also applied to precision agriculture because it incorporates a modified version of LORA-CBF, a wireless location-based routing algorithm that uses cluster-based flooding. Cluster-based flooding addresses the scalability concerns of wireless sensor networks, while the modified LORA-CBF routing algorithm includes a metric to monitor residual battery energy. Furthermore, results show that the modified version of LORA-CBF functions well with both the flat and hierarchical algorithms, although it functions better with the flat algorithm in a small-scale agricultural network. PMID:22346622
Developing a new wireless sensor network platform and its application in precision agriculture.
Aquino-Santos, Raúl; González-Potes, Apolinar; Edwards-Block, Arthur; Virgen-Ortiz, Raúl Alejandro
2011-01-01
Wireless sensor networks are gaining greater attention from the research community and industrial professionals because these small pieces of "smart dust" offer great advantages due to their small size, low power consumption, easy integration and support for "green" applications. Green applications are considered a hot topic in intelligent environments, ubiquitous and pervasive computing. This work evaluates a new wireless sensor network platform and its application in precision agriculture, including its embedded operating system and its routing algorithm. To validate the technological platform and the embedded operating system, two different routing strategies were compared: hierarchical and flat. Both of these routing algorithms were tested in a small-scale network applied to a watermelon field. However, we strongly believe that this technological platform can be also applied to precision agriculture because it incorporates a modified version of LORA-CBF, a wireless location-based routing algorithm that uses cluster-based flooding. Cluster-based flooding addresses the scalability concerns of wireless sensor networks, while the modified LORA-CBF routing algorithm includes a metric to monitor residual battery energy. Furthermore, results show that the modified version of LORA-CBF functions well with both the flat and hierarchical algorithms, although it functions better with the flat algorithm in a small-scale agricultural network.
24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Tests of pervasive poverty... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty is demonstrated by evidence that: (1...
24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Tests of pervasive poverty... ENTERPRISE COMMUNITIES: ROUND ONE DESIGNATIONS Area Requirements § 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the...
Pervasive transcription: detecting functional RNAs in bacteria.
Lybecker, Meghan; Bilusic, Ivana; Raghavan, Rahul
2014-01-01
Pervasive, or genome-wide, transcription has been reported in all domains of life. In bacteria, most pervasive transcription occurs antisense to protein-coding transcripts, although recently a new class of pervasive RNAs was identified that originates from within annotated genes. Initially considered to be non-functional transcriptional noise, pervasive transcription is increasingly being recognized as important in regulating gene expression. The function of pervasive transcription is an extensively debated question in the field of transcriptomics and regulatory RNA biology. Here, we highlight the most recent contributions addressing the purpose of pervasive transcription in bacteria and discuss their implications.
The Locus analytical framework for indoor localization and tracking applications
NASA Astrophysics Data System (ADS)
Segou, Olga E.; Thomopoulos, Stelios C. A.
2015-05-01
Obtaining location information can be of paramount importance in the context of pervasive and context-aware computing applications. Many systems have been proposed to date, e.g. GPS that has been proven to offer satisfying results in outdoor areas. The increased effect of large and small scale fading in indoor environments, however, makes localization a challenge. This is particularly reflected in the multitude of different systems that have been proposed in the context of indoor localization (e.g. RADAR, Cricket etc). The performance of such systems is often validated on vastly different test beds and conditions, making performance comparisons difficult and often irrelevant. The Locus analytical framework incorporates algorithms from multiple disciplines such as channel modeling, non-uniform random number generation, computational geometry, localization, tracking and probabilistic modeling etc. in order to provide: (a) fast and accurate signal propagation simulation, (b) fast experimentation with localization and tracking algorithms and (c) an in-depth analysis methodology for estimating the performance limits of any Received Signal Strength localization system. Simulation results for the well-known Fingerprinting and Trilateration algorithms are herein presented and validated with experimental data collected in real conditions using IEEE 802.15.4 ZigBee modules. The analysis shows that the Locus framework accurately predicts the underlying distribution of the localization error and produces further estimates of the system's performance limitations (in a best-case/worst-case scenario basis).
Trusted measurement model based on multitenant behaviors.
Ning, Zhen-Hu; Shen, Chang-Xiang; Zhao, Yong; Liang, Peng
2014-01-01
With a fast growing pervasive computing, especially cloud computing, the behaviour measurement is at the core and plays a vital role. A new behaviour measurement tailored for Multitenants in cloud computing is needed urgently to fundamentally establish trust relationship. Based on our previous research, we propose an improved trust relationship scheme which captures the world of cloud computing where multitenants share the same physical computing platform. Here, we first present the related work on multitenant behaviour; secondly, we give the scheme of behaviour measurement where decoupling of multitenants is taken into account; thirdly, we explicitly explain our decoupling algorithm for multitenants; fourthly, we introduce a new way of similarity calculation for deviation control, which fits the coupled multitenants under study well; lastly, we design the experiments to test our scheme.
Trusted Measurement Model Based on Multitenant Behaviors
Ning, Zhen-Hu; Shen, Chang-Xiang; Zhao, Yong; Liang, Peng
2014-01-01
With a fast growing pervasive computing, especially cloud computing, the behaviour measurement is at the core and plays a vital role. A new behaviour measurement tailored for Multitenants in cloud computing is needed urgently to fundamentally establish trust relationship. Based on our previous research, we propose an improved trust relationship scheme which captures the world of cloud computing where multitenants share the same physical computing platform. Here, we first present the related work on multitenant behaviour; secondly, we give the scheme of behaviour measurement where decoupling of multitenants is taken into account; thirdly, we explicitly explain our decoupling algorithm for multitenants; fourthly, we introduce a new way of similarity calculation for deviation control, which fits the coupled multitenants under study well; lastly, we design the experiments to test our scheme. PMID:24987731
Designing Robust and Resilient Tactical MANETs
2014-09-25
Bounds on the Throughput Efficiency of Greedy Maximal Scheduling in Wireless Networks , IEEE/ACM Transactions on Networking , (06 2011): 0. doi: N... Wireless Sensor Networks and Effects of Long Range Dependant Data, Special IWSM Issue of Sequential Analysis, (11 2012): 0. doi: A. D. Dominguez...Bushnell, R. Poovendran. A Convex Optimization Approach for Clone Detection in Wireless Sensor Networks , Pervasive and Mobile Computing, (01 2012
ERIC Educational Resources Information Center
Baralt, Melissa; Gurzynski-Weiss, Laura
2011-01-01
The construct of anxiety is often believed to be the affective factor with the greatest potential to pervasively affect the learning process (Horwitz, 2001), and recent research has demonstrated that anxiety can mediate whether learners are able to notice feedback and subsequently produce output (Sheen, 2008). In order to reduce the negative…
ERIC Educational Resources Information Center
Demers, Joseph A.; Sullivan, Amanda L.
2016-01-01
Most U.S. children and adults use computers and the Internet on a daily basis. The pervasiveness of electronic communication in a variety of contexts, including home and school, raises ethical and legal concerns for school psychologists and those in related fields of practice, because of the risks to privacy and confidentiality, boundaries,…
Schopf, Jennifer M.; Nitzberg, Bill
2002-01-01
The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A distributed infrastructure capable of sophisticated computational functions can bring many benefits to scientific work, but poses many challenges, both technical and socio-political. Technical challenges include having basic software tools, higher-level services, functioning and pervasive security, and standards, while socio-political issues include building a user community, adding incentives for sites to be part of a user-centric environment, and educating funding sources about the needs of this community. This paper details the areasmore » relating to Grid research that we feel still need to be addressed to fully leverage the advantages of the Grid.« less
An element search ant colony technique for solving virtual machine placement problem
NASA Astrophysics Data System (ADS)
Srija, J.; Rani John, Rose; Kanaga, Grace Mary, Dr.
2017-09-01
The data centres in the cloud environment play a key role in providing infrastructure for ubiquitous computing, pervasive computing, mobile computing etc. This computing technique tries to utilize the available resources in order to provide services. Hence maintaining the resource utilization without wastage of power consumption has become a challenging task for the researchers. In this paper we propose the direct guidance ant colony system for effective mapping of virtual machines to the physical machine with maximal resource utilization and minimal power consumption. The proposed algorithm has been compared with the existing ant colony approach which is involved in solving virtual machine placement problem and thus the proposed algorithm proves to provide better result than the existing technique.
NASA Technical Reports Server (NTRS)
Noor, Ahmed K. (Compiler)
2003-01-01
The document contains the proceedings of the training workshop on Emerging and Future Computing Paradigms and their impact on the Research, Training and Design Environments of the Aerospace Workforce. The workshop was held at NASA Langley Research Center, Hampton, Virginia, March 18 and 19, 2003. The workshop was jointly sponsored by Old Dominion University and NASA. Workshop attendees came from NASA, other government agencies, industry and universities. The objectives of the workshop were to a) provide broad overviews of the diverse activities related to new computing paradigms, including grid computing, pervasive computing, high-productivity computing, and the IBM-led autonomic computing; and b) identify future directions for research that have high potential for future aerospace workforce environments. The format of the workshop included twenty-one, half-hour overview-type presentations and three exhibits by vendors.
Exercise: Applications to Childhood ADHD
ERIC Educational Resources Information Center
Wigal, Sharon B.; Emmerson, Natasha; Gehricke, Jean-G.; Galassetti, Pietro
2013-01-01
ADHD is the most common neurobehavioral disorder of childhood, presenting with pervasive and impairing symptoms of inattention, hyperactivity, impulsivity, or a combination. The leading hypothesis of the underlying physiology of this disorder of inattention and/or hyperactivity-impulsivity is based on catecholamine dysfunction. Pharmacotherapy…
Nebeker, Camille; Harlow, John; Espinoza Giacinto, Rebeca; Orozco-Linares, Rubi; Bloss, Cinnamon S; Weibel, Nadir
2017-01-01
Vast quantities of personal health information and private identifiable information are being created through mobile apps, wearable sensors, and social networks. While new strategies and tools for obtaining health data have expanded researchers' abilities to design and test personalized and adaptive health interventions, the deployment of pervasive sensing and computational techniques to gather research data is raising ethical challenges for Institutional Review Boards (IRBs) charged with protecting research participants. To explore experiences with, and perceptions about, technology-enabled research, and identify solutions for promoting responsible conduct of this research we conducted focus groups with human research protection program and IRB affiliates. Our findings outline the need for increased collaboration across stakeholders in terms of: (1) shared and dynamic resources that improve awareness of technologies and decrease potential threats to participant privacy and data confidentiality, and (2) development of appropriate and dynamic standards through collaboration with stakeholders in the research ethics community.
Scheduling of network access for feedback-based embedded systems
NASA Astrophysics Data System (ADS)
Liberatore, Vincenzo
2002-07-01
nd communication capabilities. Examples range from smart dust embedded in building materials to networks of appliances in the home. Embedded devices will be deployed in unprecedented numbers, will enable pervasive distributed computing, and will radically change the way people interact with the surrounding environment [EGH00a]. The paper targets embedded systems and their real-time (RT) communication requirements. RT requirements arise from the
Key Trends That Will Shape Army Installations of Tomorrow
2013-01-01
community college facilities, and the new international airport.187 In Bucks County, KIPC occupies a portion of the former U.S. Steel–Fairless Works...190 Federation of Canadian Municipalities, “Solid Waste as a Resource: Guide for Sustainable Communities ,” 2004. 191 For more information ...overseas oil. Information technology trends, such as pervasive computing and online community trends, may have a complex role in sustainable
Artificial grammar learning meets formal language theory: an overview
Fitch, W. Tecumseh; Friederici, Angela D.
2012-01-01
Formal language theory (FLT), part of the broader mathematical theory of computation, provides a systematic terminology and set of conventions for describing rules and the structures they generate, along with a rich body of discoveries and theorems concerning generative rule systems. Despite its name, FLT is not limited to human language, but is equally applicable to computer programs, music, visual patterns, animal vocalizations, RNA structure and even dance. In the last decade, this theory has been profitably used to frame hypotheses and to design brain imaging and animal-learning experiments, mostly using the ‘artificial grammar-learning’ paradigm. We offer a brief, non-technical introduction to FLT and then a more detailed analysis of empirical research based on this theory. We suggest that progress has been hampered by a pervasive conflation of distinct issues, including hierarchy, dependency, complexity and recursion. We offer clarifications of several relevant hypotheses and the experimental designs necessary to test them. We finally review the recent brain imaging literature, using formal languages, identifying areas of convergence and outstanding debates. We conclude that FLT has much to offer scientists who are interested in rigorous empirical investigations of human cognition from a neuroscientific and comparative perspective. PMID:22688631
APPLICATION OF LAND-COVER DATA FOR ENVIRONMENTAL ASSESSMENTS
In many parts of the United States, urbanization is a pervasive dynamic that has many environmental consequences. Land-cover and related (e.g. Landsat) data are fundamental for studying urbanization itself and its environmental effects.
Well established models in economic...
Online Social Media in Crisis Events
ERIC Educational Resources Information Center
Palen, Leysia
2008-01-01
As social media--which includes blogs, social networking environments, person-to-person and broadcast messaging, and other Web 2.0 applications--becomes more pervasive, their use has significant implications for emergency management practice and policy. Information and communication technology (ICT) enables people--disaster survivors, curious…
Pervasive mobile healthcare systems for chronic disease monitoring.
Huzooree, Geshwaree; Kumar Khedo, Kavi; Joonas, Noorjehan
2017-05-01
Pervasive mobile healthcare system has the potential to improve healthcare and the quality of life of chronic disease patients through continuous monitoring. Recently, many articles related to pervasive mobile healthcare system focusing on health monitoring using wireless technologies have been published. The main aim of this review is to evaluate the state-of-the-art pervasive mobile healthcare systems to identify major technical requirements and design challenges associated with the realization of a pervasive mobile healthcare system. A systematic literature review was conducted over IEEE Xplore Digital Library to evaluate 20 pervasive mobile healthcare systems out of 683 articles from 2011 to 2016. The classification of the pervasive mobile healthcare systems and other important factors are discussed. Potential opportunities and challenges are pointed out for the further deployment of effective pervasive mobile healthcare systems. This article helps researchers in health informatics to have a holistic view toward understanding pervasive mobile healthcare systems and points out new technological trends and design challenges that researchers have to consider when designing such systems for better adoption, usability, and seamless integration.
Extracting Depth From Motion Parallax in Real-World and Synthetic Displays
NASA Technical Reports Server (NTRS)
Hecht, Heiko; Kaiser, Mary K.; Aiken, William; Null, Cynthia H. (Technical Monitor)
1994-01-01
In psychophysical studies on human sensitivity to visual motion parallax (MP), the use of computer displays is pervasive. However, a number of potential problems are associated with such displays: cue conflicts arise when observers accommodate to the screen surface, and observer head and body movements are often not reflected in the displays. We investigated observers' sensitivity to depth information in MP (slant, depth order, relative depth) using various real-world displays and their computer-generated analogs. Angle judgments of real-world stimuli were consistently superior to judgments that were based on computer-generated stimuli. Similar results were found for perceived depth order and relative depth. Perceptual competence of observers tends to be underestimated in research that is based on computer generated displays. Such findings cannot be generalized to more realistic viewing situations.
QMachine: commodity supercomputing in web browsers
2014-01-01
Background Ongoing advancements in cloud computing provide novel opportunities in scientific computing, especially for distributed workflows. Modern web browsers can now be used as high-performance workstations for querying, processing, and visualizing genomics’ “Big Data” from sources like The Cancer Genome Atlas (TCGA) and the International Cancer Genome Consortium (ICGC) without local software installation or configuration. The design of QMachine (QM) was driven by the opportunity to use this pervasive computing model in the context of the Web of Linked Data in Biomedicine. Results QM is an open-sourced, publicly available web service that acts as a messaging system for posting tasks and retrieving results over HTTP. The illustrative application described here distributes the analyses of 20 Streptococcus pneumoniae genomes for shared suffixes. Because all analytical and data retrieval tasks are executed by volunteer machines, few server resources are required. Any modern web browser can submit those tasks and/or volunteer to execute them without installing any extra plugins or programs. A client library provides high-level distribution templates including MapReduce. This stark departure from the current reliance on expensive server hardware running “download and install” software has already gathered substantial community interest, as QM received more than 2.2 million API calls from 87 countries in 12 months. Conclusions QM was found adequate to deliver the sort of scalable bioinformatics solutions that computation- and data-intensive workflows require. Paradoxically, the sandboxed execution of code by web browsers was also found to enable them, as compute nodes, to address critical privacy concerns that characterize biomedical environments. PMID:24913605
Pervasive Restart In MOOSE-based Applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Derek Gaston; Cody Permann; David Andrs
Multiphysics applications are inherently complicated. Solving for multiple, interacting physical phenomena involves the solution of multiple equations, and each equation has its own data dependencies. Feeding the correct data to these equations at exactly the right time requires extensive effort in software design. In an ideal world, multiphysics applications always run to completion and produce correct answers. Unfortunately, in reality, there can be many reasons why a simulation might fail: power outage, system failure, exceeding a runtime allotment on a supercomputer, failure of the solver to converge, etc. A failure after many hours spent computing can be a significant setbackmore » for a project. Therefore, the ability to “continue” a solve from the point of failure, rather than starting again from scratch, is an essential component of any high-quality simulation tool. This process of “continuation” is commonly termed “restart” in the computational community. While the concept of restarting an application sounds ideal, the aforementioned complexities and data dependencies present in multiphysics applications make its implementation decidedly non-trivial. A running multiphysics calculation accumulates an enormous amount of “state”: current time, solution history, material properties, status of mechanical contact, etc. This “state” data comes in many different forms, including scalar, tensor, vector, and arbitrary, application-specific data types. To be able to restart an application, you must be able to both store and retrieve this data, effectively recreating the state of the application before the failure. When utilizing the Multiphysics Object Oriented Simulation Environment (MOOSE) framework developed at Idaho National Laboratory, this state data is stored both internally within the framework itself (such as solution vectors and the current time) and within the applications that use the framework. In order to implement restart in MOOSE-based applications, the total state of the system (both within the framework and without) must be stored and retrieved. To this end, the MOOSE team has implemented a “pervasive” restart capability which allows any object within MOOSE (or within a MOOSE-based application) to be declared as “state” data, and handles the storage and retrieval of said data.« less
A Critique of the Research on Learning Styles.
ERIC Educational Resources Information Center
Curry, Lynn
1990-01-01
Learning styles advocates claim long-term improvements in four aspects of teaching and learning: curriculum design, instructional methods, assessment, and student guidance. The application of learning style theory encompasses three pervasive problems: confusion in definitions, weakness in measurement reliability and validity, and identification of…
Energy harvesting: small scale energy production from ambient sources
NASA Astrophysics Data System (ADS)
Yeatman, Eric M.
2009-03-01
Energy harvesting - the collection of otherwise unexploited energy in the local environment - is attracting increasing attention for the powering of electronic devices. While the power levels that can be reached are typically modest (microwatts to milliwatts), the key motivation is to avoid the need for battery replacement or recharging in portable or inaccessible devices. Wireless sensor networks are a particularly important application: the availability of essentially maintenance free sensor nodes, as enabled by energy harvesting, will greatly increase the feasibility of large scale networks, in the paradigm often known as pervasive sensing. Such pervasive sensing networks, used to monitor buildings, structures, outdoor environments or the human body, offer significant benefits for large scale energy efficiency, health and safety, and many other areas. Sources of energy for harvesting include light, temperature differences, and ambient motion, and a wide range of miniature energy harvesters based on these sources have been proposed or demonstrated. This paper reviews the principles and practice in miniature energy harvesters, and discusses trends, suitable applications, and possible future developments.
A Pervasive Social Networking Application: I-NFC enabled Florist Smart Advisor
NASA Astrophysics Data System (ADS)
Swee Wen, Khoo; Mahinderjit Singh, Manmeet
2016-11-01
Location based service is an information and entertainment service, accessible with mobile devices through the mobile network and utilizing the ability to make use of the geographical position of the mobile device. NFC location based service is using one of the modes of NFC such as peer-to-peer, reader/writer, and card emulation to obtain the information of the object and then get the location of the object. In this paper, the proposed solution is I- NFC-enabled Pervasive Social Networking apps for florists. It combines the NFC location based service with Online Social Network (OSN). In addition, a smart advisor in the system to provide output in making their own decision while purchasing products.The development of the system demonstrates that a designed commerce site is provided which enable a communication between NFC-enabled smartphone, NFC-enabled application and OSN. GPS functionalities also implemented to provide map and location of business services. Smart advisor also designed to provide information for users who do not have ideas what to purchase.
Pervasive healthcare: paving the way for a pervasive, user-centered and preventive healthcare model.
Arnrich, B; Mayora, O; Bardram, J; Tröster, G
2010-01-01
The aging of the population creates pressure on the healthcare systems in various ways. A massive increase of chronic disease conditions and age-related illness are predicted as the dominant forces driving the future health care. The objective of this paper is to present future research demands in pervasive healthcare with the goal to meet the healthcare challenges by paving the way for a pervasive, user-centered and preventive healthcare model. This paper presents recent methodological approaches and proposes future research topics in three areas: i) pervasive, continuous and reliable long-term monitoring systems; ii) prevention through pervasive technology as a key element to maintain lifelong wellness; and iii) design and evaluation methods for ubiquitous, patient-centric technologies. Pervasive technology has been identified as a strong asset for achieving the vision of user-centered preventive healthcare. In order to make this vision a reality, new strategies for design, development and evaluation of technology have to find a common denominator and consequently interoperate. Moreover, the potential of pervasive healthcare technologies offers new opportunities beyond traditional disease treatment and may play a major role in prevention, e.g. motivate healthy behavior and disease prevention throughout all stages of life. In this sense, open challenges in future research have to be addressed such as the variability of health indicators between individuals and the manner in which relevant health indicators are provided to the users in order to maximize their motivation to mitigate or prevent unhealthy behaviors. Additionally, collecting evidence that pervasive technology improves health is seen as one of the toughest challenges. Promising approaches are recently introduced, such as "clinical proof-of-concept" and balanced observational studies. The paper concludes that pervasive healthcare will enable a paradigm shift from the established centralized healthcare model to a pervasive, user-centered and preventive overall lifestyle health management. In order to provide these new opportunities everywhere, anytime and to anyone, future research in the fields of pervasive sensing, pervasive prevention and evaluation of pervasive technology is inevitably needed.
Socio-inspired ICT. Towards a socially grounded society-ICT symbiosis
NASA Astrophysics Data System (ADS)
Ferscha, A.; Farrahi, K.; van den Hoven, J.; Hales, D.; Nowak, A.; Lukowicz, P.; Helbing, D.
2012-11-01
Modern ICT (Information and Communication Technology) has developed a vision where the "computer" is no longer associated with the concept of a single device or a network of devices, but rather the entirety of situated services originating in a digital world, which are perceived through the physical world. It is observed that services with explicit user input and output are becoming to be replaced by a computing landscape sensing the physical world via a huge variety of sensors, and controlling it via a plethora of actuators. The nature and appearance of computing devices is changing to be hidden in the fabric of everyday life, invisibly networked, and omnipresent, with applications greatly being based on the notions of context and knowledge. Interaction with such globe spanning, modern ICT systems will presumably be more implicit, at the periphery of human attention, rather than explicit, i.e. at the focus of human attention.Socio-inspired ICT assumes that future, globe scale ICT systems should be viewed as social systems. Such a view challenges research to identify and formalize the principles of interaction and adaptation in social systems, so as to be able to ground future ICT systems on those principles. This position paper therefore is concerned with the intersection of social behaviour and modern ICT, creating or recreating social conventions and social contexts through the use of pervasive, globe-spanning, omnipresent and participative ICT.
7 CFR 25.102 - Pervasive poverty, unemployment and general distress.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 1 2010-01-01 2010-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be reasonably distributed throughout the entire nominated area...
Access Control to Information in Pervasive Computing Environments
2005-08-01
for foo’s public key. (Digital signatures are omitted.) indicate a set of location and time intervals. A service will return location information only...stands for foo’s public key. (Digital signatures are omitted.) it describes the resource to which access is granted. Currently, we allow only resources...information relationship. Alice’s location information is bun- dled in her personal information. (The digital signature is omitted.) We use extended
Survey on fall detection and fall prevention using wearable and external sensors.
Delahoz, Yueng Santiago; Labrador, Miguel Angel
2014-10-22
According to nihseniorhealth.gov (a website for older adults), falling represents a great threat as people get older, and providing mechanisms to detect and prevent falls is critical to improve people's lives. Over 1.6 million U.S. adults are treated for fall-related injuries in emergency rooms every year suffering fractures, loss of independence, and even death. It is clear then, that this problem must be addressed in a prompt manner, and the use of pervasive computing plays a key role to achieve this. Fall detection (FD) and fall prevention (FP) are research areas that have been active for over a decade, and they both strive for improving people's lives through the use of pervasive computing. This paper surveys the state of the art in FD and FP systems, including qualitative comparisons among various studies. It aims to serve as a point of reference for future research on the mentioned systems. A general description of FD and FP systems is provided, including the different types of sensors used in both approaches. Challenges and current solutions are presented and described in great detail. A 3-level taxonomy associated with the risk factors of a fall is proposed. Finally, cutting edge FD and FP systems are thoroughly reviewed and qualitatively compared, in terms of design issues and other parameters.
Schalk, Gerwin
2009-01-01
The theoretical groundwork of the 1930’s and 1940’s and the technical advance of computers in the following decades provided the basis for dramatic increases in human efficiency. While computers continue to evolve, and we can still expect increasing benefits from their use, the interface between humans and computers has begun to present a serious impediment to full realization of the potential payoff. This article is about the theoretical and practical possibility that direct communication between the brain and the computer can be used to overcome this impediment by improving or augmenting conventional forms of human communication. It is about the opportunity that the limitations of our body’s input and output capacities can be overcome using direct interaction with the brain, and it discusses the assumptions, possible limitations, and implications of a technology that I anticipate will be a major source of pervasive changes in the coming decades. PMID:18310804
Integrated wireless systems: The future has arrived (Keynote Address)
NASA Astrophysics Data System (ADS)
Rivoir, Roberto
2005-06-01
It is believed that we are just at the beginning with wireless, and that a new age is dawning for this breakthrough technology. Thanks to several years of industrial manufacturing in mass-market applications such as cellular phones, wireless technology has nowadays reached a level of maturity that, combined with other achievements arising from different fields, such as information technology, artificial intelligence, pervasive computing, science of new materials, and micro-electro-mechanical systems (MEMS), will enable the realization of a networked stream-flow of real-time information, that will accompany us in our daily life, in a total seamless, transparent fashion. As almost any application scenario will require the deployment of complex, miniaturized, almost "invisible" systems, operating with different wireless standards, hard technological challenges will have to be faced for designing and fabricating ultra-low-cost, reconfigurable, and multi-mode heterogeneous smart micro-devices. But ongoing, unending progresses on wireless technology keeps the promise of helping to solve important societal problems in the health-care, safety, security, industry, environment sectors, and in general opening the possibility for an improved quality of life at work, on travel, at home, practically "everywhere, anytime".
From Pressure to Path: Barometer-based Vehicle Tracking
Ho, Bo-Jhang; Martin, Paul; Swaminathan, Prashanth; Srivastava, Mani
2017-01-01
Pervasive mobile devices have enabled countless context-and location-based applications that facilitate navigation, life-logging, and more. As we build the next generation of smart cities, it is important to leverage the rich sensing modalities that these numerous devices have to offer. This work demonstrates how mobile devices can be used to accurately track driving patterns based solely on pressure data collected from the device’s barometer. Specifically, by correlating pressure time-series data against topographic elevation data and road maps for a given region, a centralized computer can estimate the likely paths through which individual users have driven, providing an exceptionally low-power method for measuring driving patterns of a given individual or for analyzing group behavior across multiple users. This work also brings to bear a more nefarious side effect of pressure-based path estimation: a mobile application can, without consent and without notifying the user, use pressure data to accurately detect an individual’s driving behavior, compromising both user privacy and security. We further analyze the ability to predict driving trajectories in terms of the variance in barometer pressure and geographical elevation, demonstrating cases in which more than 80% of paths can be accurately predicted. PMID:29503981
From Pressure to Path: Barometer-based Vehicle Tracking.
Ho, Bo-Jhang; Martin, Paul; Swaminathan, Prashanth; Srivastava, Mani
2015-11-01
Pervasive mobile devices have enabled countless context-and location-based applications that facilitate navigation, life-logging, and more. As we build the next generation of smart cities, it is important to leverage the rich sensing modalities that these numerous devices have to offer. This work demonstrates how mobile devices can be used to accurately track driving patterns based solely on pressure data collected from the device's barometer. Specifically, by correlating pressure time-series data against topographic elevation data and road maps for a given region, a centralized computer can estimate the likely paths through which individual users have driven, providing an exceptionally low-power method for measuring driving patterns of a given individual or for analyzing group behavior across multiple users. This work also brings to bear a more nefarious side effect of pressure-based path estimation: a mobile application can, without consent and without notifying the user, use pressure data to accurately detect an individual's driving behavior, compromising both user privacy and security. We further analyze the ability to predict driving trajectories in terms of the variance in barometer pressure and geographical elevation, demonstrating cases in which more than 80% of paths can be accurately predicted.
Solutions to pervasive environmental problems often are not amenable to a straightforward application of science-based actions. These problems encompass large-scale environmental policy questions where environmental concerns, economic constraints, and societal values conflict ca...
Efficient Information Access for Location-Based Services in Mobile Environments
ERIC Educational Resources Information Center
Lee, Chi Keung
2009-01-01
The demand for pervasive access of location-related information (e.g., local traffic, restaurant locations, navigation maps, weather conditions, pollution index, etc.) fosters a tremendous application base of "Location Based Services (LBSs)". Without loss of generality, we model location-related information as "spatial objects" and the accesses…
DOT National Transportation Integrated Search
2012-11-30
Noise from highway traffic can be pervasive in areas near roadways. How and to what extent noise travels is strongly influenced by geospatial features such as terrain and elevation. Thus geographic information systems (GIS), which enable users to mor...
The Chemistry of Perfume: A Laboratory Course for Nonscience Majors
ERIC Educational Resources Information Center
Logan, Jennifer L.; Rumbaugh, Craig E.
2012-01-01
"The Chemistry of Perfume" is a lab-only course for nonscience majors. Students learn fundamental concepts of chemistry through the context of fragrance, a pervasive aspect of daily life. The course consists of laboratories pertaining to five units: introduction, extraction, synthesis, characterization, and application. The introduction unit…
Cyberbullying among Adolescents: A General Strain Theory Perspective
ERIC Educational Resources Information Center
Paez, Gabriel R.
2018-01-01
Cyber bullying has become more pervasive as a result of advances in communication technology such as email, text messaging, chat rooms, and social media sites. Despite the growth in research on correlates associated with engagement in cyber bullying, few studies test the applicability of criminological theories to explain engagement in cyber…
The role of architecture and ontology for interoperability.
Blobel, Bernd; González, Carolina; Oemig, Frank; Lopéz, Diego; Nykänen, Pirkko; Ruotsalainen, Pekka
2010-01-01
Turning from organization-centric to process-controlled or even to personalized approaches, advanced healthcare settings have to meet special interoperability challenges. eHealth and pHealth solutions must assure interoperability between actors cooperating to achieve common business objectives. Hereby, the interoperability chain also includes individually tailored technical systems, but also sensors and actuators. For enabling corresponding pervasive computing and even autonomic computing, individualized systems have to be based on an architecture framework covering many domains, scientifically managed by specialized disciplines using their specific ontologies in a formalized way. Therefore, interoperability has to advance from a communication protocol to an architecture-centric approach mastering ontology coordination challenges.
Validating a Model for Welding Induced Residual Stress Using High-Energy X-ray Diffraction
Mach, J. C.; Budrow, C. J.; Pagan, D. C.; ...
2017-03-15
Integrated computational materials engineering (ICME) provides a pathway to advance performance in structures through the use of physically-based models to better understand how manufacturing processes influence product performance. As one particular challenge, consider that residual stresses induced in fabrication are pervasive and directly impact the life of structures. For ICME to be an effective strategy, it is essential that predictive capability be developed in conjunction with critical experiments. In the present paper, simulation results from a multi-physics model for gas metal arc welding are evaluated through x-ray diffraction using synchrotron radiation. A test component was designed with intent to developmore » significant gradients in residual stress, be representative of real-world engineering application, yet remain tractable for finely spaced strain measurements with positioning equipment available at synchrotron facilities. Finally, the experimental validation lends confidence to model predictions, facilitating the explicit consideration of residual stress distribution in prediction of fatigue life.« less
Validating a Model for Welding Induced Residual Stress Using High-Energy X-ray Diffraction
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mach, J. C.; Budrow, C. J.; Pagan, D. C.
Integrated computational materials engineering (ICME) provides a pathway to advance performance in structures through the use of physically-based models to better understand how manufacturing processes influence product performance. As one particular challenge, consider that residual stresses induced in fabrication are pervasive and directly impact the life of structures. For ICME to be an effective strategy, it is essential that predictive capability be developed in conjunction with critical experiments. In the present paper, simulation results from a multi-physics model for gas metal arc welding are evaluated through x-ray diffraction using synchrotron radiation. A test component was designed with intent to developmore » significant gradients in residual stress, be representative of real-world engineering application, yet remain tractable for finely spaced strain measurements with positioning equipment available at synchrotron facilities. Finally, the experimental validation lends confidence to model predictions, facilitating the explicit consideration of residual stress distribution in prediction of fatigue life.« less
User-centric incentive design for participatory mobile phone sensing
NASA Astrophysics Data System (ADS)
Gao, Wei; Lu, Haoyang
2014-05-01
Mobile phone sensing is a critical underpinning of pervasive mobile computing, and is one of the key factors for improving people's quality of life in modern society via collective utilization of the on-board sensing capabilities of people's smartphones. The increasing demands for sensing services and ambient awareness in mobile environments highlight the necessity of active participation of individual mobile users in sensing tasks. User incentives for such participation have been continuously offered from an application-centric perspective, i.e., as payments from the sensing server, to compensate users' sensing costs. These payments, however, are manipulated to maximize the benefits of the sensing server, ignoring the runtime flexibility and benefits of participating users. This paper presents a novel framework of user-centric incentive design, and develops a universal sensing platform which translates heterogenous sensing tasks to a generic sensing plan specifying the task-independent requirements of sensing performance. We use this sensing plan as input to reduce three categories of sensing costs, which together cover the possible sources hindering users' participation in sensing.
Smart Building: Decision Making Architecture for Thermal Energy Management
Hernández Uribe, Oscar; San Martin, Juan Pablo; Garcia-Alegre, María C.; Santos, Matilde; Guinea, Domingo
2015-01-01
Smart applications of the Internet of Things are improving the performance of buildings, reducing energy demand. Local and smart networks, soft computing methodologies, machine intelligence algorithms and pervasive sensors are some of the basics of energy optimization strategies developed for the benefit of environmental sustainability and user comfort. This work presents a distributed sensor-processor-communication decision-making architecture to improve the acquisition, storage and transfer of thermal energy in buildings. The developed system is implemented in a near Zero-Energy Building (nZEB) prototype equipped with a built-in thermal solar collector, where optical properties are analysed; a low enthalpy geothermal accumulation system, segmented in different temperature zones; and an envelope that includes a dynamic thermal barrier. An intelligent control of this dynamic thermal barrier is applied to reduce the thermal energy demand (heating and cooling) caused by daily and seasonal weather variations. Simulations and experimental results are presented to highlight the nZEB thermal energy reduction. PMID:26528978
Autoadaptivity and optimization in distributed ECG interpretation.
Augustyniak, Piotr
2010-03-01
This paper addresses principal issues of the ECG interpretation adaptivity in a distributed surveillance network. In the age of pervasive access to wireless digital communication, distributed biosignal interpretation networks may not only optimally solve difficult medical cases, but also adapt the data acquisition, interpretation, and transmission to the variable patient's status and availability of technical resources. The background of such adaptivity is the innovative use of results from the automatic ECG analysis to the seamless remote modification of the interpreting software. Since the medical relevance of issued diagnostic data depends on the patient's status, the interpretation adaptivity implies the flexibility of report content and frequency. Proposed solutions are based on the research on human experts behavior, procedures reliability, and usage statistics. Despite the limited scale of our prototype client-server application, the tests yielded very promising results: the transmission channel occupation was reduced by 2.6 to 5.6 times comparing to the rigid reporting mode and the improvement of the remotely computed diagnostic outcome was achieved in case of over 80% of software adaptation attempts.
Distributed behavior model orchestration in cognitive internet of things solution
NASA Astrophysics Data System (ADS)
Li, Chung-Sheng; Darema, Frederica; Chang, Victor
2018-04-01
The introduction of pervasive and ubiquitous instrumentation within Internet of Things (IoT) leads to unprecedented real-time visibility (instrumentation), optimization and fault-tolerance of the power grid, traffic, transportation, water, oil & gas, to give some examples. Interconnecting those distinct physical, people, and business worlds through ubiquitous instrumentation, even though still in its embryonic stage, has the potential to create intelligent IoT solutions that are much greener, more efficient, comfortable, and safer. An essential new direction to materialize this potential is to develop comprehensive models of such systems dynamically interacting with the instrumentation in a feed-back control loop. We describe here opportunities in applying cognitive computing on interconnected and instrumented worlds (Cognitive Internet of Things-CIoT) and call out the system-of-systems trend among distinct but interdependent worlds, and Dynamic Data-Driven Application System (DDDAS)-based methods for advanced understanding, analysis, and real-time decision support capabilities with the accuracy of full-scale models.
Podgórski, Daniel; Majchrzycka, Katarzyna; Dąbrowska, Anna; Gralewicz, Grzegorz; Okrasa, Małgorzata
2017-03-01
Recent developments in domains of ambient intelligence (AmI), Internet of Things, cyber-physical systems (CPS), ubiquitous/pervasive computing, etc., have led to numerous attempts to apply ICT solutions in the occupational safety and health (OSH) area. A literature review reveals a wide range of examples of smart materials, smart personal protective equipment and other AmI applications that have been developed to improve workers' safety and health. Because the use of these solutions modifies work methods, increases complexity of production processes and introduces high dynamism into thus created smart working environments (SWE), a new conceptual framework for dynamic OSH management in SWE is called for. A proposed framework is based on a new paradigm of OSH risk management consisting of real-time risk assessment and the capacity to monitor the risk level of each worker individually. A rationale for context-based reasoning in SWE and a respective model of the SWE-dedicated CPS are also proposed.
An Approach to Dynamic Service Management in Pervasive Computing Systems
2005-01-01
standard interface to them that is easily accessible by any user. This paper outlines the design of Centaurus , an infrastructure for presenting...based on Extensi- ble Markup Language (XML) for communication, giving the system a uniform and easily adaptable interface. Centaurus defines a...easy and automatic usage. This is the vision that guides our re- search on the Centaurus system. We define a SmartSpace as a dynamic environment that
Wireless local area network security.
Bergeron, Bryan P
2004-01-01
Wireless local area networks (WLANs) are increasingly popular in clinical settings because they facilitate the use of wireless PDAs, laptops, and other pervasive computing devices at the point of care. However, because of the relative immaturity of wireless network technology and evolving standards, WLANs, if improperly configured, can present significant security risks. Understanding the security limitations of the technology and available fixes can help minimize the risks of clinical data loss and maintain compliance with HIPAA guidelines.
Analysis in Motion Initiative – Human Machine Intelligence
DOE Office of Scientific and Technical Information (OSTI.GOV)
Blaha, Leslie
As computers and machines become more pervasive in our everyday lives, we are looking for ways for humans and machines to work more intelligently together. How can we help machines understand their users so the team can do smarter things together? The Analysis in Motion Initiative is advancing the science of human machine intelligence — creating human-machine teams that work better together to make correct, useful, and timely interpretations of data.
Parametric Study of Beta-Endpoint Energy in Direct Energy Converters
2007-01-01
Circuits for Ultra-high Efficiency Micro- power Generators using Nickel-63 Radioisotope . Technical Digest, ISSCC, February 2006, 418– 19. 8. Lal, A...Zakar, E.; Dubey, M.; Lal, A. MEMS Radioisotope - powered Piezoelectric Power Generator. IEEE MEMS 2006, Istanbul, Turkey, January 2006, 94–97. 16... Power : A Radioisotope - powered Piezoelectric Generator. IEEE Pervasive Computing Jan-Mar 2005, 4 (1), 53–61. Lee, C.; Guo, H.; Radhakrishnan, S.; Lal, A
Improving Mobile Infrastructure for Pervasive Personal Computing
2007-11-01
fulfillment of the requirements for the degree of Master of Science. Copyright c© 2007 Ajay Surie This research was supported by the National Science Foundation...NSF) under grant number CNS-0509004 and by the Army Research Office (ARO) through grant number DAAD19-02-1-0389 (“Perpetually Available and Secure...efforts my final project could not have been successful. Working with the members of my research group, Niraj Tolia, Benjamin Gilbert, Jan Harkes, Adam
Lyons, Bayard E; Austin, Daniel; Seelye, Adriana; Petersen, Johanna; Yeargers, Jonathan; Riley, Thomas; Sharma, Nicole; Mattek, Nora; Wild, Katherine; Dodge, Hiroko; Kaye, Jeffrey A
2015-01-01
Traditionally, assessment of functional and cognitive status of individuals with dementia occurs in brief clinic visits during which time clinicians extract a snapshot of recent changes in individuals' health. Conventionally, this is done using various clinical assessment tools applied at the point of care and relies on patients' and caregivers' ability to accurately recall daily activity and trends in personal health. These practices suffer from the infrequency and generally short durations of visits. Since 2004, researchers at the Oregon Center for Aging and Technology (ORCATECH) at the Oregon Health and Science University have been working on developing technologies to transform this model. ORCATECH researchers have developed a system of continuous in-home monitoring using pervasive computing technologies that make it possible to more accurately track activities and behaviors and measure relevant intra-individual changes. We have installed a system of strategically placed sensors in over 480 homes and have been collecting data for up to 8 years. Using this continuous in-home monitoring system, ORCATECH researchers have collected data on multiple behaviors such as gait and mobility, sleep and activity patterns, medication adherence, and computer use. Patterns of intra-individual variation detected in each of these areas are used to predict outcomes such as low mood, loneliness, and cognitive function. These methods have the potential to improve the quality of patient health data and in turn patient care especially related to cognitive decline. Furthermore, the continuous real-world nature of the data may improve the efficiency and ecological validity of clinical intervention studies.
Lyons, Bayard E.; Austin, Daniel; Seelye, Adriana; Petersen, Johanna; Yeargers, Jonathan; Riley, Thomas; Sharma, Nicole; Mattek, Nora; Wild, Katherine; Dodge, Hiroko; Kaye, Jeffrey A.
2015-01-01
Traditionally, assessment of functional and cognitive status of individuals with dementia occurs in brief clinic visits during which time clinicians extract a snapshot of recent changes in individuals’ health. Conventionally, this is done using various clinical assessment tools applied at the point of care and relies on patients’ and caregivers’ ability to accurately recall daily activity and trends in personal health. These practices suffer from the infrequency and generally short durations of visits. Since 2004, researchers at the Oregon Center for Aging and Technology (ORCATECH) at the Oregon Health and Science University have been working on developing technologies to transform this model. ORCATECH researchers have developed a system of continuous in-home monitoring using pervasive computing technologies that make it possible to more accurately track activities and behaviors and measure relevant intra-individual changes. We have installed a system of strategically placed sensors in over 480 homes and have been collecting data for up to 8 years. Using this continuous in-home monitoring system, ORCATECH researchers have collected data on multiple behaviors such as gait and mobility, sleep and activity patterns, medication adherence, and computer use. Patterns of intra-individual variation detected in each of these areas are used to predict outcomes such as low mood, loneliness, and cognitive function. These methods have the potential to improve the quality of patient health data and in turn patient care especially related to cognitive decline. Furthermore, the continuous real-world nature of the data may improve the efficiency and ecological validity of clinical intervention studies. PMID:26113819
Current state and future direction of computer systems at NASA Langley Research Center
NASA Technical Reports Server (NTRS)
Rogers, James L. (Editor); Tucker, Jerry H. (Editor)
1992-01-01
Computer systems have advanced at a rate unmatched by any other area of technology. As performance has dramatically increased there has been an equally dramatic reduction in cost. This constant cost performance improvement has precipitated the pervasiveness of computer systems into virtually all areas of technology. This improvement is due primarily to advances in microelectronics. Most people are now convinced that the new generation of supercomputers will be built using a large number (possibly thousands) of high performance microprocessors. Although the spectacular improvements in computer systems have come about because of these hardware advances, there has also been a steady improvement in software techniques. In an effort to understand how these hardware and software advances will effect research at NASA LaRC, the Computer Systems Technical Committee drafted this white paper to examine the current state and possible future directions of computer systems at the Center. This paper discusses selected important areas of computer systems including real-time systems, embedded systems, high performance computing, distributed computing networks, data acquisition systems, artificial intelligence, and visualization.
Pelletier, Jean-François; Rowe, Michael; François, Nathe; Bordeleau, Julie; Lupien, Sonia
2013-07-27
Despite the increasing pervasiveness of mobile computational technologies, knowledge about psychiatric patients' preferences regarding the design and utility of mobile applications is very poor. This paper reports on a pilot-study that involved 120 psychiatric patients in the development of a mobile application (app) that is being used for data entry into the Signature Project data bank at the Institut universitaire en santé mentale de Montréal (IUSMM), Canada. Participants were invited to comment on the 'look and feel' of the Signature App. Their input also extended the procedures for data collection. These suggestions may contribute to increased mental health literacy and empowerment of persons with mental illness receiving services at the IUSMM. Participants were recruited to fill out a questionnaire on a tablet computer while waiting at the Emergency Room (ER, n = 40), Psychotic Disorders outpatient clinic (n = 40) or Anxiety and Mood Disorders outpatient clinic (n = 40) of IUSMM. Nine patients from each of these sub-groups participated in a focus group to review the results and to discuss how the design and use of the Signature App could be improved to better meet the needs of patients. This study (n = 120) indicated that psychiatric patients are clearly capable of using a tablet computer to fill out questionnaires for quantitative data entry, and that they enjoyed this experience. Results from the focus groups (n = 27) highlight that the app could also be used by patients to communicate some personal and contextual qualitative information. This would support a holistic and person-centered approach, especially at the ER where people acutely need to describe their recent history and receive emotional support. This pilot-study has confirmed the necessity of involving patients not only in the testing of a new mobile application, but also as active contributors in the entire research and development process of a person-centered information and communication technology infrastructure. The input of participants was essential in designing the Signature Project computational procedure and making use of the app a positive and empowering experience. Participants also gave critical feedback remarks that went beyond the initial scope of the pilot-study, for example they suggested the addition of a client-clinician component.
Jakeman, Anthony J.; Jakeman, John Davis
2018-03-14
Uncertainty pervades the representation of systems in the water–environment–agriculture cross-sector. Successful methods to address uncertainties have largely focused on standard mathematical formulations of biophysical processes in a single sector, such as partial or ordinary differential equations. More attention to integrated models of such systems is warranted. Model components representing the different sectors of an integrated model can have less standard, and different, formulations to one another, as well as different levels of epistemic knowledge and data informativeness. Thus, uncertainty is not only pervasive but also crosses boundaries and propagates between system components. Uncertainty assessment (UA) cries out for more eclecticmore » treatment in these circumstances, some of it being more qualitative and empirical. Here in this paper, we discuss the various sources of uncertainty in such a cross-sectoral setting and ways to assess and manage them. We have outlined a fast-growing set of methodologies, particularly in the computational mathematics literature on uncertainty quantification (UQ), that seem highly pertinent for uncertainty assessment. There appears to be considerable scope for advancing UA by integrating relevant UQ techniques into cross-sectoral problem applications. Of course this will entail considerable collaboration between domain specialists who often take first ownership of the problem and computational methods experts.« less
NASA Astrophysics Data System (ADS)
Bui, Francis Minhthang; Hatzinakos, Dimitrios
2007-12-01
As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jakeman, Anthony J.; Jakeman, John Davis
Uncertainty pervades the representation of systems in the water–environment–agriculture cross-sector. Successful methods to address uncertainties have largely focused on standard mathematical formulations of biophysical processes in a single sector, such as partial or ordinary differential equations. More attention to integrated models of such systems is warranted. Model components representing the different sectors of an integrated model can have less standard, and different, formulations to one another, as well as different levels of epistemic knowledge and data informativeness. Thus, uncertainty is not only pervasive but also crosses boundaries and propagates between system components. Uncertainty assessment (UA) cries out for more eclecticmore » treatment in these circumstances, some of it being more qualitative and empirical. Here in this paper, we discuss the various sources of uncertainty in such a cross-sectoral setting and ways to assess and manage them. We have outlined a fast-growing set of methodologies, particularly in the computational mathematics literature on uncertainty quantification (UQ), that seem highly pertinent for uncertainty assessment. There appears to be considerable scope for advancing UA by integrating relevant UQ techniques into cross-sectoral problem applications. Of course this will entail considerable collaboration between domain specialists who often take first ownership of the problem and computational methods experts.« less
Nutrient (i.e. nitrogen) contamination of surface waters constitutes one of the most pervasive problems facing wastewater treatment works across the country. Nitrogen discharge to surface water occurs mostly in the form of ammonia which is identified as the most toxic nitrogen sp...
Comparison of Modern Methods for Analyzing Repeated Measures Data with Missing Values
ERIC Educational Resources Information Center
Vallejo, G.; Fernandez, M. P.; Livacic-Rojas, P. E.; Tuero-Herrero, E.
2011-01-01
Missing data are a pervasive problem in many psychological applications in the real world. In this article we study the impact of dropout on the operational characteristics of several approaches that can be easily implemented with commercially available software. These approaches include the covariance pattern model based on an unstructured…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-19
...). We noted that research has extensively documented the pervasiveness of vulnerable populations which.... For example, if the State law requires the administrator of a NF participating in its State Medicaid...) would not be applicable. For example, if a facility's air conditioning failed during a heat wave, the...
Invasion Science: A Horizon Scan of Emerging Challenges and Opportunities
Anthony Ricciardi; Tim M. Blackburn; James T. Carlton; Jaimie T.A. Dick; Philip E. Hulme; Josephine C. Iacarella; Jonathan M. Jeschke; Andrew M. Liebhold; Julie L. Lockwood; Hugh J. MacIsaac; Petr Pyšek; David M. Richardson; Gregory M. Ruiz; Daniel Simberloff; William J. Sutherland; David A. Wardle; David C. Aldridge
2017-01-01
We identified emerging scientific, technological, and sociopolitical issues likely to affect how biological invasions are studied and managed over the next two decades. Issues were ranked according to their probability of emergence, pervasiveness, potential impact, and novelty. Top-ranked issues include the application of genomic modification tools to control invasions...
Patient Autonomy Investigation under the Technology-Based Health Care System
ERIC Educational Resources Information Center
Yang, Yi
2012-01-01
With widespread advances in the diffusion and application of medical technologies, the phenomena of misuse and overuse have become pervasive. These phenomena not only increase the cost of health care systems and deplete the accessibility and availability of health care services, they also jeopardize patient autonomy. From a literature review on…
ERIC Educational Resources Information Center
Drugli, May Britt; Larsson, Bo; Clifford, Graham; Fossum, Sturla
2007-01-01
Differences between pervasive (home and day-care/school) versus non-pervasive (home only) conduct problems were examined in regard to various child, parent/family, and day-care/school characteristics in an outpatient clinic sample of 120 children aged 4-8 years. All children scored above the 90th percentile on the Eyberg Child Behavior Inventory…
Telehealth, Mobile Applications, and Wearable Devices are Expanding Cancer Care Beyond Walls.
Cannon, Carol
2018-05-01
To review telehealth solutions, mobile applications, and wearable devices that are currently impacting patients, caregivers, and providers who work in the oncology setting. A literature search was conducted using the terms (Telehealth, Mobile Health, mHealth, Wearable Devices) + (Oncology, Cancer Care). There are many current applications of telehealth and mobile health in the oncology setting. Nurses who care for patients with cancer should be aware of the pervasiveness and impact of telehealth and mobile health to this unique population. Copyright © 2018 Elsevier Inc. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crussell, Jonathan; Boote, Jeffrey W.; Fritz, David Jakob
Networked Information Technology systems play a key role supporting critical government, military, and private computer installations. Many of today's critical infrastructure systems have strong dependencies on secure information exchange among geographically dispersed facilities. As operations become increasingly dependent on the information exchange they also become targets for exploitation. The need to protect data and defend these systems from external attack has become increasingly vital while the nature of the threats has become sophisticated and pervasive making the challenges daunting. Enter Emulytics.
Survey on Fall Detection and Fall Prevention Using Wearable and External Sensors
Delahoz, Yueng Santiago; Labrador, Miguel Angel
2014-01-01
According to nihseniorhealth.gov (a website for older adults), falling represents a great threat as people get older, and providing mechanisms to detect and prevent falls is critical to improve people's lives. Over 1.6 million U.S. adults are treated for fall-related injuries in emergency rooms every year suffering fractures, loss of independence, and even death. It is clear then, that this problem must be addressed in a prompt manner, and the use of pervasive computing plays a key role to achieve this. Fall detection (FD) and fall prevention (FP) are research areas that have been active for over a decade, and they both strive for improving people's lives through the use of pervasive computing. This paper surveys the state of the art in FD and FP systems, including qualitative comparisons among various studies. It aims to serve as a point of reference for future research on the mentioned systems. A general description of FD and FP systems is provided, including the different types of sensors used in both approaches. Challenges and current solutions are presented and described in great detail. A 3-level taxonomy associated with the risk factors of a fall is proposed. Finally, cutting edge FD and FP systems are thoroughly reviewed and qualitatively compared, in terms of design issues and other parameters. PMID:25340452
In vitro dosimetry of agglomerates
NASA Astrophysics Data System (ADS)
Hirsch, V.; Kinnear, C.; Rodriguez-Lorenzo, L.; Monnier, C. A.; Rothen-Rutishauser, B.; Balog, S.; Petri-Fink, A.
2014-06-01
Agglomeration of nanoparticles in biological fluids is a pervasive phenomenon that leads to difficulty in the interpretation of results from in vitro exposure, primarily due to differing particokinetics of agglomerates to nanoparticles. Therefore, well-defined small agglomerates were designed that possessed different particokinetic profiles, and their cellular uptake was compared to a computational model of dosimetry. The approach used here paves the way for a better understanding of the impact of agglomeration on the nanoparticle-cell interaction.Agglomeration of nanoparticles in biological fluids is a pervasive phenomenon that leads to difficulty in the interpretation of results from in vitro exposure, primarily due to differing particokinetics of agglomerates to nanoparticles. Therefore, well-defined small agglomerates were designed that possessed different particokinetic profiles, and their cellular uptake was compared to a computational model of dosimetry. The approach used here paves the way for a better understanding of the impact of agglomeration on the nanoparticle-cell interaction. Electronic supplementary information (ESI) available: ITC data for tiopronin/Au-NP interactions, agglomeration kinetics at different pHs for tiopronin-coated Au-NPs, UV-Vis spectra in water, PBS and DMEM and temporal correlation functions for single Au-NPs and corresponding agglomerates, calculation of diffusion and sedimentation parameters, modelling of relative cell uptake based on the ISDD model and cytotoxicity of single Au-NPs and their agglomerates, and synthesis and cell uptake of large spherical Au-NPs. See DOI: 10.1039/c4nr00460d
Coseismic Damage Generation in Fault Zones by Successive High Strain Rate Loading Experiments
NASA Astrophysics Data System (ADS)
Aben, F. M.; Doan, M. L.; Renard, F.; Toussaint, R.; Reuschlé, T.; Gratier, J. P.
2014-12-01
Damage zones of active faults control both resistance to rupture and transport properties of the fault. Hence, knowing the rock damage's origin is important to constrain its properties. Here we study experimentally the damage generated by a succession of dynamic loadings, a process mimicking the stress history of a rock sample located next to an active fault. A propagating rupture generates high frequency stress perturbations next to its tip. This dynamic loading creates pervasive damage (pulverization), as multiple fractures initiate and grow simultaneously. Previous single loading experiments have shown a strain rate threshold for pulverization. Here, we focus on conditions below this threshold and the dynamic peak stress to constrain: 1) if there is dynamic fracturing at these conditions and 2) if successive loadings (cumulative seismic events) result in pervasive fracturing, effectively reducing the pulverization threshold to milder conditions. Monzonite samples were dynamically loaded (strain rate > 50 s-1) several times below the dynamic peak strength, using a Split Hopkinson Pressure Bar apparatus. Several quasi-static experiments were conducted as well (strain rate < 10-5-s). Samples loaded up to stresses above the quasi-static uniaxial compressive strength (qsUCS) systematically fragmented or pulverized after four successive loadings. We measured several damage proxies (P-wave velocity, porosity), that show a systematic increase in damage with each load. In addition, micro-computed tomography acquisition on several damage samples revealed the growth of a pervasive fracture network between ensuing loadings. Samples loaded dynamically below the qsUCS failed along one fracture after a variable amount of loadings and damage proxies do not show any a systematic trend. Our conclusions is that milder dynamic loading conditions, below the dynamic peak strength, result in pervasive dynamic fracturing. Also, successive loadings effectively lower the pulverization threshold of the rock. However, the peak loading stress must exceed the qsUCS of the rock, otherwise quasi-static fracturing occurs. Pulverized rocks found in the field are therefore witnesses of previous large earthquakes.
Pervasive access to MRI bias artifact suppression service on a grid.
Ardizzone, Edoardo; Gambino, Orazio; Genco, Alessandro; Pirrone, Roberto; Sorce, Salvatore
2009-01-01
Bias artifact corrupts MRIs in such a way that the image is afflicted by illumination variations. Some of the authors proposed the exponential entropy-driven homomorphic unsharp masking ( E(2)D-HUM) algorithm that corrects this artifact without any a priori hypothesis about the tissues or the MRI modality. Moreover, E(2)D-HUM does not care about the body part under examination and does not require any particular training task. People who want to use this algorithm, which is Matlab-based, have to set their own computers in order to execute it. Furthermore, they have to be Matlab-skilled to exploit all the features of the algorithm. In this paper, we propose to make such algorithm available as a service on a grid infrastructure, so that people can use it almost from everywhere, in a pervasive fashion, by means of a suitable user interface running on smartphones. The proposed solution allows physicians to use the E(2)D-HUM algorithm (or any other kind of algorithm, given that it is available as a service on the grid), being it remotely executed somewhere in the grid, and the results are sent back to the user's device. This way, physicians do not need to be aware of how to use Matlab to process their images. The pervasive service provision for medical image enhancement is presented, along with some experimental results obtained using smartphones connected to an existing Globus-based grid infrastructure.
2013-10-31
Autism Spectrum Disorder (ASD); Autism; Autistic Disorder; Asperger's Disorder; Asperger's; Pediatric Autism; Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS); Pervasive Child Development Disorder
An open and reconfigurable wireless sensor network for pervasive health monitoring.
Triantafyllidis, A; Koutkias, V; Chouvarda, I; Maglaveras, N
2008-01-01
Sensor networks constitute the backbone for the construction of personalized monitoring systems. Up to now, several sensor networks have been proposed for diverse pervasive healthcare applications, which are however characterized by a significant lack of open architectures, resulting in closed, non-interoperable and difficult to extend solutions. In this context, we propose an open and reconfigurable wireless sensor network (WSN) for pervasive health monitoring, with particular emphasis in its easy extension with additional sensors and functionality by incorporating embedded intelligence mechanisms. We consider a generic WSN architecture comprised of diverse sensor nodes (with communication and processing capabilities) and a mobile base unit (MBU) operating as the gateway between the sensors and the medical personnel, formulating this way a body area network (BAN). The primary focus of this work is on the intra-BAN data communication issues, adopting SensorML as the data representation mean, including the encoding of the monitoring patterns and the functionality of the sensor network. In our prototype implementation two sensor nodes are emulated; one for heart rate monitoring and the other for blood glucose observations, while the MBU corresponds to a personal digital assistant (PDA) device. Java 2 Micro Edition (J2ME) is used to implement both the sensor nodes and the MBU components. Intra-BAN wireless communication relies on the Blue-tooth protocol. Via an adaptive user interface in the MBU, health professionals may specify the monitoring parameters of the WSN and define the monitoring patterns of interest in terms of rules. This work constitutes an essential step towards the construction of open, extensible, inter-operable and intelligent WSNs for pervasive health monitoring.
USDA-ARS?s Scientific Manuscript database
The stable isotope ratios of hydrogen (H) and oxygen (O) are valuable tracers of the origin of biological materials and water sources. Application of these environmental tracers is largely based on the distinct and pervasive spatial patterns of precipitation isotopes, which are preserved in many hy...
Web 2.0 and Critical Information Literacy
ERIC Educational Resources Information Center
Dunaway, Michelle
2011-01-01
The impact of Web 2.0 upon culture, education, and knowledge is obfuscated by the pervasiveness of Web 2.0 applications and technologies. Web 2.0 is commonly conceptualized in terms of the tools that it makes possible, such as Facebook, Twitter, and Wikipedia. In the context of information literacy instruction, Web 2.0 is frequently conceptualized…
Blended Learning via Mobile Social Media & Implementation of "EDMODO" in Reading Classes
ERIC Educational Resources Information Center
Yagci, Tahsin
2015-01-01
Almost there is nowhere that we don't use permeated smart technology. Increasingly developing mobile and wireless innovations forced us to integrate them to all fields in our lives. The latest trend in education is now blended learning and applications of mobile learning in educational environments. Pervasive and augmented usage of social media…
ERIC Educational Resources Information Center
Barbee, Stephanie S.
2017-01-01
Wearable technology has made a positive impact in the consumer industry with its focus on adult fitness. Devices and applications are pervasive, inexpensive and are in high demand. Our nation struggles with obesity and health concerns related to poor fitness. However, the research on such technology has been more focused on adults. Therefore, the…
A Security Architecture Based on Trust Management for Pervasive Computing Systems
2005-01-01
SmartSpace framework, we extended the C2 [16] ar- chitecture, which in turn is based on the Centaurus [10] model. In Centaurus a Client can access...the services provided by the nearest Centaurus Service Manager (SM) via some short-range communi- cation. The SM acts as an active proxy by executing...The In the Centaurus project [10], the main design goal is the development of a framework for building portals to services using various types of
Using OWL in a Pervasive Computing Broker
2005-01-01
carries or wears (e.g., cell phones , PDAs and headphones), services that are provided by de- vices in a room (e.g., projector service, light controller...ence of the users’ devices and clothing. As Alice enters the room, these sensors inform the R210 broker that a cell phone belonging to her is present and...the broker adds this fact in its knowledge base. As she sits, the agent on Alice’s Bluetooth enabled cell phone discovers R210’s broker and engages
NEXUS - Resilient Intelligent Middleware
NASA Astrophysics Data System (ADS)
Kaveh, N.; Hercock, R. Ghanea
Service-oriented computing, a composition of distributed-object computing, component-based, and Web-based concepts, is becoming the widespread choice for developing dynamic heterogeneous software assets available as services across a network. One of the major strengths of service-oriented technologies is the high abstraction layer and large granularity level at which software assets are viewed compared to traditional object-oriented technologies. Collaboration through encapsulated and separately defined service interfaces creates a service-oriented environment, whereby multiple services can be linked together through their interfaces to compose a functional system. This approach enables better integration of legacy and non-legacy services, via wrapper interfaces, and allows for service composition at a more abstract level especially in cases such as vertical market stacks. The heterogeneous nature of service-oriented technologies and the granularity of their software components makes them a suitable computing model in the pervasive domain.
NASA Astrophysics Data System (ADS)
De Leon, Marlene M.; Estuar, Maria Regina E.; Lim, Hadrian Paulo; Victorino, John Noel C.; Co, Jerelyn; Saddi, Ivan Lester; Paelmo, Sharlene Mae; Dela Cruz, Bon Lemuel
2017-09-01
Environment and agriculture related applications have been gaining ground for the past several years and have been the context for researches in ubiquitous and pervasive computing. This study is a part of a bigger study that uses artificial intelligence in developing models to detect, monitor, and forecast the spread of Fusarium oxysporum cubense TR4 (FOC TR4) on Cavendish bananas cultivated in the Philippines. To implement an Intelligent Farming system, 1) wireless sensor nodes (WSNs) are deployed in Philippine banana plantations to collect soil parameter data that is considered to affect the health of Cavendish bananas, 2) a custom built smartphone application is used for collecting, storing, and transmitting soil data, plant images and plant status data to a cloud storage, and 3) a custom built web application is used to load and display results of physico-chemical analysis of soil, analysis of data models, and geographic locations of plants being monitored. This study discusses the issues, considerations, and solutions implemented in the development of an asynchronous communication channel to ensure that all data collected by WSNs and smartphone applications are transmitted with a high degree of accuracy and reliability. From a design standpoint: standard API documentation on usage of data type is required to avoid inconsistencies in parameter passing. From a technical standpoint, there is a need to include error-handling mechanisms especially for delays in transmission of data as well as generalize method of parsing thru multidimensional array of data. Strategies are presented in the paper.
Bishop, Joseph E.; Martinez, Mario J.; Newell, Pania
2016-11-08
Fracture and fragmentation are extremely nonlinear multiscale processes in which microscale damage mechanisms emerge at the macroscale as new fracture surfaces. Numerous numerical methods have been developed for simulating fracture initiation, propagation, and coalescence. In this paper, we present a computational approach for modeling pervasive fracture in quasi-brittle materials based on random close-packed Voronoi tessellations. Each Voronoi cell is formulated as a polyhedral finite element containing an arbitrary number of vertices and faces. Fracture surfaces are allowed to nucleate only at the intercell faces. Cohesive softening tractions are applied to new fracture surfaces in order to model the energy dissipatedmore » during fracture growth. The randomly seeded Voronoi cells provide a regularized discrete random network for representing fracture surfaces. The potential crack paths within the random network are viewed as instances of realizable crack paths within the continuum material. Mesh convergence of fracture simulations is viewed in a weak, or distributional, sense. The explicit facet representation of fractures within this approach is advantageous for modeling contact on new fracture surfaces and fluid flow within the evolving fracture network. Finally, applications of interest include fracture and fragmentation in quasi-brittle materials and geomechanical applications such as hydraulic fracturing, engineered geothermal systems, compressed-air energy storage, and carbon sequestration.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bishop, Joseph E.; Martinez, Mario J.; Newell, Pania
Fracture and fragmentation are extremely nonlinear multiscale processes in which microscale damage mechanisms emerge at the macroscale as new fracture surfaces. Numerous numerical methods have been developed for simulating fracture initiation, propagation, and coalescence. In this paper, we present a computational approach for modeling pervasive fracture in quasi-brittle materials based on random close-packed Voronoi tessellations. Each Voronoi cell is formulated as a polyhedral finite element containing an arbitrary number of vertices and faces. Fracture surfaces are allowed to nucleate only at the intercell faces. Cohesive softening tractions are applied to new fracture surfaces in order to model the energy dissipatedmore » during fracture growth. The randomly seeded Voronoi cells provide a regularized discrete random network for representing fracture surfaces. The potential crack paths within the random network are viewed as instances of realizable crack paths within the continuum material. Mesh convergence of fracture simulations is viewed in a weak, or distributional, sense. The explicit facet representation of fractures within this approach is advantageous for modeling contact on new fracture surfaces and fluid flow within the evolving fracture network. Finally, applications of interest include fracture and fragmentation in quasi-brittle materials and geomechanical applications such as hydraulic fracturing, engineered geothermal systems, compressed-air energy storage, and carbon sequestration.« less
New paradigms in telemedicine: ambient intelligence, wearable, pervasive and personalized.
Rubel, Paul; Fayn, Jocelyne; Simon-Chautemps, Lucas; Atoui, Hussein; Ohlsson, Mattias; Telisson, David; Adami, Stefano; Arod, Sébastien; Forlini, Marie Claire; Malossi, Cesare; Placide, Joël; Ziliani, Gian Luca; Assanelli, Deodato; Chevalier, Philippe
2004-01-01
After decades of development of information systems dedicated to health professionals, there is an increasing demand for personalized and non-hospital based care. An especially critical domain is cardiology: almost two third of cardiac deaths occur out of hospital, and victims do not survive long enough to benefit from in-hospital treatments. We need to reduce the time before treatment. But symptoms are often interpreted wrongly. The only immediate diagnostic tool to assess the possibility of a cardiac event is the electrocardiogram (ECG). Event and transtelephonic ECG recorders are used to improve decision making but require setting up new infrastructures. The European EPI-MEDICS project has developed an intelligent Personal ECG Monitor (PEM) for the early detection of cardiac events. The PEM embeds advanced decision making techniques, generates different alarm levels and forwards alarm messages to the relevant care providers by means of new generation wireless communication. It is cost saving, involving care provider only if necessary and requiring no specific infrastructure. This solution is a typical example of pervasive computing and ambient intelligence that demonstrates how personalized, wearable, ubiquitous devices could improve healthcare.
Minimizing the Pervasiveness of Women's Personal Experiences of Gender Discrimination
ERIC Educational Resources Information Center
Foster, Mindi D.; Jackson, Lydia C.; Hartmann, Ryan; Woulfe, Shannon
2004-01-01
Given the Rejection-Identification Model (Branscombe, Schmitt, & Harvey, 1999), which shows that perceiving discrimination to be pervasive is a negative experience, it was suggested that there would be conditions under which women would instead minimize the pervasiveness of discrimination. Study 1 (N= 91) showed that when women envisioned…
7 CFR 25.102 - Pervasive poverty, unemployment and general distress.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 1 2011-01-01 2011-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...
7 CFR 25.102 - Pervasive poverty, unemployment and general distress.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 1 2014-01-01 2014-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...
7 CFR 25.102 - Pervasive poverty, unemployment and general distress.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 1 2013-01-01 2013-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...
24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.
Code of Federal Regulations, 2012 CFR
2012-04-01
..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...
24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.
Code of Federal Regulations, 2014 CFR
2014-04-01
..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...
24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.
Code of Federal Regulations, 2011 CFR
2011-04-01
..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...
24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.
Code of Federal Regulations, 2013 CFR
2013-04-01
..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...
7 CFR 25.102 - Pervasive poverty, unemployment and general distress.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 1 2012-01-01 2012-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...
Neoliberalism in Historical Light: How Business Models Displaced Science Education Goals in Two Eras
ERIC Educational Resources Information Center
Hayes, Kathryn N.
2016-01-01
Although a growing body of work addresses the current role of neoliberalism in displacing democratic equality as a goal of public education, attempts to parse such impacts rarely draw from historical accounts. At least one tenet of neoliberalism--the application of business models to public institutions--was also pervasive at the turn of the 20th…
Students' Use of Mobile Technologies: Motivational Factors
ERIC Educational Resources Information Center
Baytiyeh, Hoda
2018-01-01
Mobile technologies are all-pervasive in the current digital generation, and college students rely on their mobile phones to communicate on a daily basis. In the midst of the myriad of applications available to download on the mobile, some tools have become more well-known and more often adopted than others. An example of such a tool is WhatsApp,…
Transient probabilities for queues with applications to hospital waiting list management.
Joy, Mark; Jones, Simon
2005-08-01
In this paper we study queuing systems within the NHS. Recently imposed government performance targets lead NHS executives to investigate and instigate alternative management strategies, thereby imposing structural changes on the queues. Under such circumstances, it is most unlikely that such systems are in equilibrium. It is crucial, in our opinion, to recognise this state of affairs in order to make a balanced assessment of the role of queue management in the modern NHS. From a mathematical perspective it should be emphasised that measures of the state of a queue based upon the assumption of statistical equilibrium (a pervasive methodology in the study of queues) are simply wrong in the above scenario. To base strategic decisions around such ideas is therefore highly questionable and it is one of the purposes of this paper to offer alternatives: we present some (recent) research whose results generate performance measures and measures of risk, for example, of waiting-times growing unacceptably large; we emphasise that these results concern the transient behaviour of the queueing model-there is no asssumption of statistical equilibrium. We also demonstrate that our results are computationally tractable.
How hidden are hidden processes? A primer on crypticity and entropy convergence
NASA Astrophysics Data System (ADS)
Mahoney, John R.; Ellison, Christopher J.; James, Ryan G.; Crutchfield, James P.
2011-09-01
We investigate a stationary process's crypticity—a measure of the difference between its hidden state information and its observed information—using the causal states of computational mechanics. Here, we motivate crypticity and cryptic order as physically meaningful quantities that monitor how hidden a hidden process is. This is done by recasting previous results on the convergence of block entropy and block-state entropy in a geometric setting, one that is more intuitive and that leads to a number of new results. For example, we connect crypticity to how an observer synchronizes to a process. We show that the block-causal-state entropy is a convex function of block length. We give a complete analysis of spin chains. We present a classification scheme that surveys stationary processes in terms of their possible cryptic and Markov orders. We illustrate related entropy convergence behaviors using a new form of foliated information diagram. Finally, along the way, we provide a variety of interpretations of crypticity and cryptic order to establish their naturalness and pervasiveness. This is also a first step in developing applications in spatially extended and network dynamical systems.
Named Data Networking in Climate Research and HEP Applications
NASA Astrophysics Data System (ADS)
Shannigrahi, Susmit; Papadopoulos, Christos; Yeh, Edmund; Newman, Harvey; Jerzy Barczyk, Artur; Liu, Ran; Sim, Alex; Mughal, Azher; Monga, Inder; Vlimant, Jean-Roch; Wu, John
2015-12-01
The Computing Models of the LHC experiments continue to evolve from the simple hierarchical MONARC[2] model towards more agile models where data is exchanged among many Tier2 and Tier3 sites, relying on both large scale file transfers with strategic data placement, and an increased use of remote access to object collections with caching through CMS's AAA, ATLAS' FAX and ALICE's AliEn projects, for example. The challenges presented by expanding needs for CPU, storage and network capacity as well as rapid handling of large datasets of file and object collections have pointed the way towards future more agile pervasive models that make best use of highly distributed heterogeneous resources. In this paper, we explore the use of Named Data Networking (NDN), a new Internet architecture focusing on content rather than the location of the data collections. As NDN has shown considerable promise in another data intensive field, Climate Science, we discuss the similarities and differences between the Climate and HEP use cases, along with specific issues HEP faces and will face during LHC Run2 and beyond, which NDN could address.
Using Instructional Pervasive Game for School Children's Cultural Learning
ERIC Educational Resources Information Center
Chen, Cheng-Ping; Shih, Ju-Ling; Ma, Yi-Chun
2014-01-01
In the past ten years, mobile learning (m-learning) has created a new learning environment that enables learners, through active learning aids. Instructional pervasive gaming (IPG) seems to be an innovative way introduced to enhance m-learning. This study employed a theoretical IPG model to construct a cultural-based pervasive game. Individual and…
On Designing a Pervasive Mobile Learning Platform
ERIC Educational Resources Information Center
Laine, Teemu H.; Vinni, Mikko; Sedano, Carolina Islas; Joy, Mike
2010-01-01
This article presents the features, design and architecture of the Myst pervasive game platform that has been applied in creating pervasive mobile learning games in various contexts such as science festivals and museums in Finland. Based on our experiences with the development, we draw a set of design principles for creating successfully a…
Health-enabling technologies for pervasive health care: on services and ICT architecture paradigms.
Haux, Reinhold; Howe, Jurgen; Marschollek, Michael; Plischke, Maik; Wolf, Klaus-Hendrik
2008-06-01
Progress in information and communication technologies (ICT) is providing new opportunities for pervasive health care services in aging societies. To identify starting points of health-enabling technologies for pervasive health care. To describe typical services of and contemporary ICT architecture paradigms for pervasive health care. Summarizing outcomes of literature analyses and results from own research projects in this field. Basic functions for pervasive health care with respect to home care comprise emergency detection and alarm, disease management, as well as health status feedback and advice. These functions are complemented by optional (non-health care) functions. Four major paradigms for contemporary ICT architectures are person-centered ICT architectures, home-centered ICT architectures, telehealth service-centered ICT architectures and health care institution-centered ICT architectures. Health-enabling technologies may lead to both new ways of living and new ways of health care. Both ways are interwoven. This has to be considered for appropriate ICT architectures of sensor-enhanced health information systems. IMIA, the International Medical Informatics Association, may be an appropriate forum for interdisciplinary research exchange on health-enabling technologies for pervasive health care.
DOORS to the semantic web and grid with a PORTAL for biomedical computing.
Taswell, Carl
2008-03-01
The semantic web remains in the early stages of development. It has not yet achieved the goals envisioned by its founders as a pervasive web of distributed knowledge and intelligence. Success will be attained when a dynamic synergism can be created between people and a sufficient number of infrastructure systems and tools for the semantic web in analogy with those for the original web. The domain name system (DNS), web browsers, and the benefits of publishing web pages motivated many people to register domain names and publish web sites on the original web. An analogous resource label system, semantic search applications, and the benefits of collaborative semantic networks will motivate people to register resource labels and publish resource descriptions on the semantic web. The Domain Ontology Oriented Resource System (DOORS) and Problem Oriented Registry of Tags and Labels (PORTAL) are proposed as infrastructure systems for resource metadata within a paradigm that can serve as a bridge between the original web and the semantic web. The Internet Registry Information Service (IRIS) registers [corrected] domain names while DNS publishes domain addresses with mapping of names to addresses for the original web. Analogously, PORTAL registers resource labels and tags while DOORS publishes resource locations and descriptions with mapping of labels to locations for the semantic web. BioPORT is proposed as a prototype PORTAL registry specific for the problem domain of biomedical computing.
A pervasive parallel framework for visualization: final report for FWP 10-014707
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moreland, Kenneth D.
2014-01-01
We are on the threshold of a transformative change in the basic architecture of highperformance computing. The use of accelerator processors, characterized by large core counts, shared but asymmetrical memory, and heavy thread loading, is quickly becoming the norm in high performance computing. These accelerators represent significant challenges in updating our existing base of software. An intrinsic problem with this transition is a fundamental programming shift from message passing processes to much more fine thread scheduling with memory sharing. Another problem is the lack of stability in accelerator implementation; processor and compiler technology is currently changing rapidly. This report documentsmore » the results of our three-year ASCR project to address these challenges. Our project includes the development of the Dax toolkit, which contains the beginnings of new algorithms for a new generation of computers and the underlying infrastructure to rapidly prototype and build further algorithms as necessary.« less
Framework model and principles for trusted information sharing in pervasive health.
Ruotsalainen, Pekka; Blobel, Bernd; Nykänen, Pirkko; Seppälä, Antto; Sorvari, Hannu
2011-01-01
Trustfulness (i.e. health and wellness information is processed ethically, and privacy is guaranteed) is one of the cornerstones for future Personal Health Systems, ubiquitous healthcare and pervasive health. Trust in today's healthcare is organizational, static and predefined. Pervasive health takes place in an open and untrusted information space where person's lifelong health and wellness information together with contextual data are dynamically collected and used by many stakeholders. This generates new threats that do not exist in today's eHealth systems. Our analysis shows that the way security and trust are implemented in today's healthcare cannot guarantee information autonomy and trustfulness in pervasive health. Based on a framework model of pervasive health and risks analysis of ubiquitous information space, we have formulated principles which enable trusted information sharing in pervasive health. Principles imply that the data subject should have the right to dynamically verify trust and to control the use of her health information, as well as the right to set situation based context-aware personal policies. Data collectors and processors have responsibilities including transparency of information processing, and openness of interests, policies and environmental features. Our principles create a base for successful management of privacy and information autonomy in pervasive health. They also imply that it is necessary to create new data models for personal health information and new architectures which support situation depending trust and privacy management.
The game mechanics of pervasive applications: visiting the uncanny
NASA Astrophysics Data System (ADS)
Gentès, Annie; Jutant, Camille
2012-03-01
"When I use a word", Humpty Dumpty said, in a rather scornful tone, "it means just what I choose it to mean - neither more nor less." "The question is", said Alice, "whether you can make words mean so many different things". "The question is", said Humpty Dumpty, "which is to be master - that's all". [Carroll 2007 (1865)] In pervasive games, a virtual layer with its own logic is added to the everyday, common meaning of objects, places, and people. The departure of the signifier ("things") from the signified (what they mean on the virtual level) is the semiotic process that allows for a double reading of the environment. Such a divorce has been explored in other cultural products (books, movies). It has been qualified as the "uncanny mode". This article analyzes how pervasive games use their own brand of uncanny. In particular, it shows how mobility becomes the way to uncover the hidden layers of the environment and serves as a tool to experience and eventually reduce or augment the uncanny. Finally, we can point to a typology of four main types of storytelling related to different types of mobility: games that use mimetic narrative strategies veering towards "realism"; games based on the "absurd"; "aloof" games that remain independent from places; games that present a specific play on this double reading of the world and develop the "Uncanny" as a genre.
ERIC Educational Resources Information Center
Montgomery, Janine M.; Duncan, C. Randy; Francis, Garnett C.
2007-01-01
The "Pervasive Developmental Disorder Screening Test-II (PDDST-II)--Early Childhood Screener for Autistic Spectrum Disorders" is a clinical screening tool for pervasive developmental disorders (PDD) or autism spectrum disorders (ASD) designed for use by nonspecialist clinicians. It was designed to differentiate children as young as 18 months who…
REVIEW: Widespread access to predictive models in the motor system: a short review
NASA Astrophysics Data System (ADS)
Davidson, Paul R.; Wolpert, Daniel M.
2005-09-01
Recent behavioural and computational studies suggest that access to internal predictive models of arm and object dynamics is widespread in the sensorimotor system. Several systems, including those responsible for oculomotor and skeletomotor control, perceptual processing, postural control and mental imagery, are able to access predictions of the motion of the arm. A capacity to make and use predictions of object dynamics is similarly widespread. Here, we review recent studies looking at the predictive capacity of the central nervous system which reveal pervasive access to forward models of the environment.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Oberkampf, William Louis; Tucker, W. Troy; Zhang, Jianzhong
This report summarizes methods to incorporate information (or lack of information) about inter-variable dependence into risk assessments that use Dempster-Shafer theory or probability bounds analysis to address epistemic and aleatory uncertainty. The report reviews techniques for simulating correlated variates for a given correlation measure and dependence model, computation of bounds on distribution functions under a specified dependence model, formulation of parametric and empirical dependence models, and bounding approaches that can be used when information about the intervariable dependence is incomplete. The report also reviews several of the most pervasive and dangerous myths among risk analysts about dependence in probabilistic models.
No Pervasive Computing Without Intelligent Systems
NASA Astrophysics Data System (ADS)
Thompson, S. G.; Azvine, B.
It is interesting to think about the technologies that have become part of our everyday lives and compare their invention and development with those that have fallen by the wayside. Examples of failed technologies such as electrical cars and satellite mobile telephones are not uncommon, but more interestingly numerous other technologies such as instant messaging, text messaging, and b2c eCommerce have moved through the cycle of initial rejection, adoptionby a new user community, and adaptation to its needs, despite the early scepticism of many users and commentators.
Intrinsic neuromodulation: altering neuronal circuits from within.
Katz, P S; Frost, W N
1996-02-01
There are two sources of neuromodulation for neuronal circuits: extrinsic inputs and intrinsic components of the circuits themselves. Extrinsic neuromodulation is known to be pervasive in nervous systems, but intrinsic neuromodulation is less recognized, despite the fact that it has now been demonstrated in sensory and neuromuscular circuits and in central pattern generators. By its nature, intrinsic neuromodulation produces local changes in neuronal computation, whereas extrinsic neuromodulation can cause global changes, often affecting many circuits simultaneously. Studies in a number of systems are defining the different properties of these two forms of neuromodulation.
Acceptable Use Policies in a Web 2.0 & Mobile Era: A Guide for School Districts
ERIC Educational Resources Information Center
Consortium for School Networking (NJ1), 2011
2011-01-01
Web 2.0 applications and mobile Internet devices have added new issues to the safety/access situation for schools. The purpose of this guide is to assist school districts in developing, rethinking, or revising Internet policies as a consequence of the emergence of Web 2.0, and the growing pervasiveness of smart phone use. The Consortium for School…
Reducing Homeland Insecurities: Ending Abuse of the Asylum and Credible Fear Program
2015-03-01
Operations FDNS Fraud Detection and National Security FEMA Federal Emergency Management Agency FY Fiscal Year GAO Government Accounting...file applications. A 2002 Government Accounting Office (GAO) study on benefit fraud found that fraud was pervasive and routinely used in furtherance... Government Accountability Office, 2002), http://www.gao.gov/assets/240/233515.pdf. 7 Mark Motivans, Immigration Offenders in the Federal Justice
ERIC Educational Resources Information Center
Schmitz, Birgit; Klemke, Roland; Specht, Marcus
2013-01-01
Mobile and in particular pervasive games are a strong component of future scenarios for teaching and learning. Based on results from a previous review of practical papers, this work explores the educational potential of pervasive games for learning by analysing underlying game mechanisms. In order to determine and classify cognitive and affective…
Pervasive Transcription of a Herpesvirus Genome Generates Functionally Important RNAs
Canny, Susan P.; Reese, Tiffany A.; Johnson, L. Steven; Zhang, Xin; Kambal, Amal; Duan, Erning; Liu, Catherine Y.; Virgin, Herbert W.
2014-01-01
ABSTRACT Pervasive transcription is observed in a wide range of organisms, including humans, mice, and viruses, but the functional significance of the resulting transcripts remains uncertain. Current genetic approaches are often limited by their emphasis on protein-coding open reading frames (ORFs). We previously identified extensive pervasive transcription from the murine gammaherpesvirus 68 (MHV68) genome outside known ORFs and antisense to known genes (termed expressed genomic regions [EGRs]). Similar antisense transcripts have been identified in many other herpesviruses, including Kaposi’s sarcoma-associated herpesvirus and human and murine cytomegalovirus. Despite their prevalence, whether these RNAs have any functional importance in the viral life cycle is unknown, and one interpretation is that these are merely “noise” generated by functionally unimportant transcriptional events. To determine whether pervasive transcription of a herpesvirus genome generates RNA molecules that are functionally important, we used a strand-specific functional approach to target transcripts from thirteen EGRs in MHV68. We found that targeting transcripts from six EGRs reduced viral protein expression, proving that pervasive transcription can generate functionally important RNAs. We characterized transcripts emanating from EGRs 26 and 27 in detail using several methods, including RNA sequencing, and identified several novel polyadenylated transcripts that were enriched in the nuclei of infected cells. These data provide the first evidence of the functional importance of regions of pervasive transcription emanating from MHV68 EGRs. Therefore, studies utilizing mutation of a herpesvirus genome must account for possible effects on RNAs generated by pervasive transcription. PMID:24618256
Pervasive influence of idiosyncratic associative biases during facial emotion recognition.
El Zein, Marwa; Wyart, Valentin; Grèzes, Julie
2018-06-11
Facial morphology has been shown to influence perceptual judgments of emotion in a way that is shared across human observers. Here we demonstrate that these shared associations between facial morphology and emotion coexist with strong variations unique to each human observer. Interestingly, a large part of these idiosyncratic associations does not vary on short time scales, emerging from stable inter-individual differences in the way facial morphological features influence emotion recognition. Computational modelling of decision-making and neural recordings of electrical brain activity revealed that both shared and idiosyncratic face-emotion associations operate through a common biasing mechanism rather than an increased sensitivity to face-associated emotions. Together, these findings emphasize the underestimated influence of idiosyncrasies on core social judgments and identify their neuro-computational signatures.
Pervasive Learning--Using Games to Tear down the Classroom Walls
ERIC Educational Resources Information Center
Pløhn, Trygve
2014-01-01
Pervasive gaming is a new and emerging gaming genre where the physical and social aspects of the real world are integrated into the game and blends into the player's everyday life. Given the nature of pervasive games, it may be possible to use that type of game as a tool to support learning in a university course by providing a gameplay where the…
Transformation in the pharmaceutical industry--a systematic analysis of operational evidence.
Shafiei, Nader; Ford, James L; Morecroft, Charles W; Lisboa, Paulo J; Taylor, Mark J; Mouzughi, Yusra
2013-01-01
Through systematic collection and trending of pharmaceutical data, operational evidence to verify existence of 14 factors affecting the ongoing pharmaceutical transformation has been compiled. These 14 factors are termed transformation triggers. The theoretical evidence in support of these triggers is carried forward from a systematic review of the literature that was conducted previously. Trends in operational evidence and the associated theoretical evidence were compared to identify areas of similarity and contrast. Areas of strong correlation between theoretical evidence and operational evidence included four transformation triggers: a fully integrated pharma network, personalized medicine, translational research, and pervasive computing. Key areas of contrast included three transformation triggers-namely, healthcare management focus, adaptive trials, and regulatory enforcement-for which the operational evidence was stronger than the theoretical evidence. The intent of this paper is to provide proof to demonstrate if there is any operational evidence that supports the 14 transformation triggers previously identified during the theoretical part of this research. The theoretical evidence for these triggers was carried forward to this paper for study from an operational perspective. The practical evidence established in this paper was compared with the corresponding theoretical evidence to identify areas of similarity and difference. This resulted in four triggers that had strong relationship between operational and theoretical evidence; they are a fully integrated pharma network, personalized medicine, translational research, and pervasive computing. The areas of difference included three transformation triggers for which the operational evidence was stronger than the theoretical evidence. These were healthcare management focus, adaptive trials, and regulatory enforcement.
Muhire, Brejnev Muhizi; Golden, Michael; Murrell, Ben; Lefeuvre, Pierre; Lett, Jean-Michel; Gray, Alistair; Poon, Art Y F; Ngandu, Nobubelo Kwanele; Semegni, Yves; Tanov, Emil Pavlov; Monjane, Adérito Luis; Harkins, Gordon William; Varsani, Arvind; Shepherd, Dionne Natalie; Martin, Darren Patrick
2014-02-01
Single-stranded DNA (ssDNA) viruses have genomes that are potentially capable of forming complex secondary structures through Watson-Crick base pairing between their constituent nucleotides. A few of the structural elements formed by such base pairings are, in fact, known to have important functions during the replication of many ssDNA viruses. Unknown, however, are (i) whether numerous additional ssDNA virus genomic structural elements predicted to exist by computational DNA folding methods actually exist and (ii) whether those structures that do exist have any biological relevance. We therefore computationally inferred lists of the most evolutionarily conserved structures within a diverse selection of animal- and plant-infecting ssDNA viruses drawn from the families Circoviridae, Anelloviridae, Parvoviridae, Nanoviridae, and Geminiviridae and analyzed these for evidence of natural selection favoring the maintenance of these structures. While we find evidence that is consistent with purifying selection being stronger at nucleotide sites that are predicted to be base paired than at sites predicted to be unpaired, we also find strong associations between sites that are predicted to pair with one another and site pairs that are apparently coevolving in a complementary fashion. Collectively, these results indicate that natural selection actively preserves much of the pervasive secondary structure that is evident within eukaryote-infecting ssDNA virus genomes and, therefore, that much of this structure is biologically functional. Lastly, we provide examples of various highly conserved but completely uncharacterized structural elements that likely have important functions within some of the ssDNA virus genomes analyzed here.
Muhire, Brejnev Muhizi; Golden, Michael; Murrell, Ben; Lefeuvre, Pierre; Lett, Jean-Michel; Gray, Alistair; Poon, Art Y. F.; Ngandu, Nobubelo Kwanele; Semegni, Yves; Tanov, Emil Pavlov; Monjane, Adérito Luis; Harkins, Gordon William; Varsani, Arvind; Shepherd, Dionne Natalie
2014-01-01
Single-stranded DNA (ssDNA) viruses have genomes that are potentially capable of forming complex secondary structures through Watson-Crick base pairing between their constituent nucleotides. A few of the structural elements formed by such base pairings are, in fact, known to have important functions during the replication of many ssDNA viruses. Unknown, however, are (i) whether numerous additional ssDNA virus genomic structural elements predicted to exist by computational DNA folding methods actually exist and (ii) whether those structures that do exist have any biological relevance. We therefore computationally inferred lists of the most evolutionarily conserved structures within a diverse selection of animal- and plant-infecting ssDNA viruses drawn from the families Circoviridae, Anelloviridae, Parvoviridae, Nanoviridae, and Geminiviridae and analyzed these for evidence of natural selection favoring the maintenance of these structures. While we find evidence that is consistent with purifying selection being stronger at nucleotide sites that are predicted to be base paired than at sites predicted to be unpaired, we also find strong associations between sites that are predicted to pair with one another and site pairs that are apparently coevolving in a complementary fashion. Collectively, these results indicate that natural selection actively preserves much of the pervasive secondary structure that is evident within eukaryote-infecting ssDNA virus genomes and, therefore, that much of this structure is biologically functional. Lastly, we provide examples of various highly conserved but completely uncharacterized structural elements that likely have important functions within some of the ssDNA virus genomes analyzed here. PMID:24284329
Design and applications of a clamp for Green Fluorescent Protein with picomolar affinity
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hansen, Simon; Stüber, Jakob C.; Ernst, Patrick
Green fluorescent protein (GFP) fusions are pervasively used to study structures and processes. Specific GFP-binders are thus of great utility for detection, immobilization or manipulation of GFP-fused molecules. We determined structures of two designed ankyrin repeat proteins (DARPins), complexed with GFP, which revealed different but overlapping epitopes. Here in this paper we show a structure-guided design strategy that, by truncation and computational reengineering, led to a stable construct where both can bind simultaneously: by linkage of the two binders, fusion constructs were obtained that “wrap around” GFP, have very high affinities of about 10–30 pM, and extremely slow off-rates. Theymore » can be natively produced in E. coli in very large amounts, and show excellent biophysical properties. Their very high stability and affinity, facile site-directed functionalization at introduced unique lysines or cysteines facilitate many applications. As examples, we present them as tight yet reversible immobilization reagents for surface plasmon resonance, as fluorescently labelled monomeric detection reagents in flow cytometry, as pull-down ligands to selectively enrich GFP fusion proteins from cell extracts, and as affinity column ligands for inexpensive large-scale protein purification. We have thus described a general design strategy to create a “clamp” from two different high-affinity repeat proteins, even if their epitopes overlap.« less
Design and applications of a clamp for Green Fluorescent Protein with picomolar affinity
Hansen, Simon; Stüber, Jakob C.; Ernst, Patrick; ...
2017-11-24
Green fluorescent protein (GFP) fusions are pervasively used to study structures and processes. Specific GFP-binders are thus of great utility for detection, immobilization or manipulation of GFP-fused molecules. We determined structures of two designed ankyrin repeat proteins (DARPins), complexed with GFP, which revealed different but overlapping epitopes. Here in this paper we show a structure-guided design strategy that, by truncation and computational reengineering, led to a stable construct where both can bind simultaneously: by linkage of the two binders, fusion constructs were obtained that “wrap around” GFP, have very high affinities of about 10–30 pM, and extremely slow off-rates. Theymore » can be natively produced in E. coli in very large amounts, and show excellent biophysical properties. Their very high stability and affinity, facile site-directed functionalization at introduced unique lysines or cysteines facilitate many applications. As examples, we present them as tight yet reversible immobilization reagents for surface plasmon resonance, as fluorescently labelled monomeric detection reagents in flow cytometry, as pull-down ligands to selectively enrich GFP fusion proteins from cell extracts, and as affinity column ligands for inexpensive large-scale protein purification. We have thus described a general design strategy to create a “clamp” from two different high-affinity repeat proteins, even if their epitopes overlap.« less
RENDEZVOUS: Self-Organizing Services in an Active Network
2004-02-01
http://www.cs.washington.edu/research/networking/ants/, and http://www.cs.utah.edu/flux/janos/ants.html, 2001. [2] Krishna P. Gummadi, “King...Proceedings of the Tenth ACM SIGOPS European Workshop, September 2002. [9] Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble: A Measurement Study...Davis, Eric Lemar, and Brian Bershad. “Migration for Pervasive Applications.” Submitted to OSDI, June 2002. Gummadi, P. Krishna , Stefan Saroiu, and
Design knowledge capture for the space station
NASA Technical Reports Server (NTRS)
Crouse, K. R.; Wechsler, D. B.
1987-01-01
The benefits of design knowledge availability are identifiable and pervasive. The implementation of design knowledge capture and storage using current technology increases the probability for success, while providing for a degree of access compatibility with future applications. The space station design definition should be expanded to include design knowledge. Design knowledge should be captured. A critical timing relationship exists between the space station development program, and the implementation of this project.
Power-Hop: A Pervasive Observation for Real Complex Networks
2016-03-14
found at: https:// github.com/kpelechrinis/powerhop. The web graph used was obtained from Yahoo ! under signing NDA and hence, cannot be made available...However, Yahoo ! is making available datasets to eligible organizations/entities through application to Webscope. In particular, the dataset used in...our study can be requested through the following URL: http:// webscope.sandbox.yahoo.com/catalog.php? datatype=g (G2 - Yahoo ! AltaVista Web Page
Semiconductors: Still a Wide Open Frontier for Scientists/Engineers
NASA Astrophysics Data System (ADS)
Seiler, David G.
1997-10-01
A 1995 Business Week article described several features of the explosive use of semiconductor chips today: ``Booming'' personal computer markets are driving high demand for microprocessors and memory chips; (2) New information superhighway markets will `ignite' sales of multimedia and communication chips; and (3) Demand for digital-signal-processing and data-compression chips, which speed up video and graphics, is `red hot.' A Washington Post article by Stan Hinden said that technology is creating an unstoppable demand for electronic elements. This ``digital pervasiveness'' means that a semiconductor chip is going into almost every high-tech product that people buy - cars, televisions, video recorders, telephones, radios, alarm clocks, coffee pots, etc. ``Semiconductors are everywhere.'' Silicon and compound semiconductors are absolutely essential and are pervasive enablers for DoD operations and systems. DoD's Critical Technologies Plan of 1991 says that ``Semiconductor materials and microelectronics are critically important and appropriately lead the list of critical defense technologies.'' These trends continue unabated. This talk describes some of the frontiers of semiconductors today and shows how scientists and engineers can effectively contribute to its advancement. Cooperative, multidisciplinary efforts are increasing. Specific examples will be given for scanning capacitance microscopy and thin-film metrology.
Arnrich, Bert; Ersoy, Cem; Mayora, Oscar; Dey, Anind; Berthouze, Nadia; Kunze, Kai
2017-01-09
This accompanying editorial provides a brief introduction into the focus theme "Wearable Therapy". The focus theme "Wearable Therapy" aims to present contributions which target wearable and mobile technologies to support clinical and self-directed therapy. A call for papers was announced to all participants of the "9th International Conference on Pervasive Computing Technologies for Healthcare" and was published in November 2015. A peer review process was conducted to select the papers for the focus theme. Six papers were selected to be included in this focus theme. The paper topics cover a broad range including an approach to build a health informatics research program, a comprehensive literature review of self-quantification for health self-management, methods for affective state detection of informal care givers, social-aware handling of falls, smart shoes for supporting self-directed therapy of alcohol addicts, and reference information model for pervasive health systems. More empirical evidence is needed that confirms sustainable effects of employing wearable and mobile technology for clinical and self-directed therapy. Inconsistencies between different conceptual approaches need to be revealed in order to enable more systematic investigations and comparisons.
The mixed reality of things: emerging challenges for human-information interaction
NASA Astrophysics Data System (ADS)
Spicer, Ryan P.; Russell, Stephen M.; Rosenberg, Evan Suma
2017-05-01
Virtual and mixed reality technology has advanced tremendously over the past several years. This nascent medium has the potential to transform how people communicate over distance, train for unfamiliar tasks, operate in challenging environments, and how they visualize, interact, and make decisions based on complex data. At the same time, the marketplace has experienced a proliferation of network-connected devices and generalized sensors that are becoming increasingly accessible and ubiquitous. As the "Internet of Things" expands to encompass a predicted 50 billion connected devices by 2020, the volume and complexity of information generated in pervasive and virtualized environments will continue to grow exponentially. The convergence of these trends demands a theoretically grounded research agenda that can address emerging challenges for human-information interaction (HII). Virtual and mixed reality environments can provide controlled settings where HII phenomena can be observed and measured, new theories developed, and novel algorithms and interaction techniques evaluated. In this paper, we describe the intersection of pervasive computing with virtual and mixed reality, identify current research gaps and opportunities to advance the fundamental understanding of HII, and discuss implications for the design and development of cyber-human systems for both military and civilian use.
Sensor Network Middleware for Cyber-Physical Systems: Opportunities and Challenges
NASA Astrophysics Data System (ADS)
Singh, G.
2015-12-01
Wireless Sensor Network middleware typically provides abstractions for common tasks such as atomicity, synchronization and communication with the intention of isolating the developers of distributed applications from lower-level details of the underlying platforms. Developing middleware to meet the performance constraints of applications is an important challenge. Although one would like to develop generic middleware services which can be used in a variety of different applications, efficiency considerations often force developers to design middleware and algorithms customized to specific operational contexts. This presentation will discuss techniques to design middleware that is customizable to suit the performance needs of specific applications. We also discuss the challenges poised in designing middleware for pervasive sensor networks and cyber-physical systems with specific focus on environmental monitoring.
Usability factors of mobile health application for chronic diseases
NASA Astrophysics Data System (ADS)
Zahra, Fatima; Hussain, Azham; Mohd, Haslina
2016-08-01
M-health has changed the conventional delivery system of health-care, permitting continuous, pervasive Health-care anywhere, anytime. Chronic disease apps are increasing, as many health workers, patients and clinicians already embracing smartphones in their comprehensive and diverse practices. There are lots of challenges and requirements that need to be addressed for mobile health applications to prevent or eliminate design problems and minimize potential threats for users, the proposed factors for chronic disease mobile applications can be used as a guide for app developers While, the usability testing, and evaluations of chronic disease apps have not yet touched the accuracy level of other web based applications. This study is being conducted to learn about challenges of m-health apps and to identify the factors that affect the usability of such applications.
Science, technology and the future of small autonomous drones.
Floreano, Dario; Wood, Robert J
2015-05-28
We are witnessing the advent of a new era of robots - drones - that can autonomously fly in natural and man-made environments. These robots, often associated with defence applications, could have a major impact on civilian tasks, including transportation, communication, agriculture, disaster mitigation and environment preservation. Autonomous flight in confined spaces presents great scientific and technical challenges owing to the energetic cost of staying airborne and to the perceptual intelligence required to negotiate complex environments. We identify scientific and technological advances that are expected to translate, within appropriate regulatory frameworks, into pervasive use of autonomous drones for civilian applications.
New Challenges in Information Integration
NASA Astrophysics Data System (ADS)
Haas, Laura M.; Soffer, Aya
Information integration is the cornerstone of modern business informatics. It is a pervasive problem; rarely is a new application built without an initial phase of gathering and integrating information. Information integration comes in a wide variety of forms. Historically, two major approaches were recognized: data federation and data warehousing. Today, we need new approaches, as information integration becomes more dynamic, while coping with growing volumes of increasingly dirty and diverse data. At the same time, information integration must be coupled more tightly with the applications and the analytics that will leverage the integrated results, to make the integration process more tractable and the results more consumable.
NASA Astrophysics Data System (ADS)
Breeding, C. M.; Ague, J. J.; Broecker, M.
2001-12-01
Digital field mapping of outcrops on the island of Tinos, Greece, was undertaken to investigate the nature of retrograde fluid infiltration during exhumation of high-P metamorphic rocks of the Attic-Cycladic blueschist belt. High-resolution digital photographs of outcrops were taken and loaded into graphics editing software on a portable, belt-mounted computer in the field. Geologic features from outcrops were drawn and labeled on the digital images using the software in real-time. The ability to simultaneously identify geologic features in outcrops and digitize those features onto digital photographs in the field allows the creation of detailed, field-verified, outcrop-scale maps that aid in geologic interpretation. During Cretaceous-Eocene subduction in the Cyclades, downgoing crustal material was metamorphosed to eclogite and blueschist facies. Subsequent Oligocene-Miocene exhumation of the high-P rocks was accompanied by pervasive, retrograde fluid infiltration resulting in nearly complete greenschist facies overprinting. On Tinos, most high-P rocks have undergone intense retrogression; however, adjacent to thick marble horizons with completely retrograded contact zones, small (sub km-scale) enclaves of high-P rocks (blueschist and minor eclogite facies) were preserved. Field observations suggest that the remnant high-P zones consist mostly of massive metabasic rocks and minor adjacent metasediments. Within the enclaves, detailed digital outcrop maps reveal that greenschist retrogression increases in intensity outward from the center, implying interaction with a fluid flowing along enclave perimeters. Permeability contrasts could not have been solely responsible for preservation of the high-P rocks, as similar rock suites distal to marble contacts were completely overprinted. We conclude that the retrograded contacts of the marble units served as high-permeability conduits for regional retrograde fluid flow. Pervasive, layer-parallel flow through metasediments would have been drawn into these more permeable flow channels. Deflections in fluid flow paths toward the high flux contacts likely caused retrograde fluids to flow around the enclaves, preserving the zones of "dry," unretrograded high-P rocks near marble horizons. Digital mapping of outcrops is a unique method for direct examination of the relationships between geologic structure, lithology, and mineral assemblage variation in the field. Outcrop mapping in the Attic-Cycladic blueschist belt has revealed that regional fluid flow along contacts can have important implications for the large-scale distribution of mineral assemblages in metamorphic terranes.
Signature detection and matching for document image retrieval.
Zhu, Guangyu; Zheng, Yefeng; Doermann, David; Jaeger, Stefan
2009-11-01
As one of the most pervasive methods of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. However, detection and segmentation of free-form objects such as signatures from clustered background is currently an open document analysis problem. In this paper, we focus on two fundamental problems in signature-based document image retrieval. First, we propose a novel multiscale approach to jointly detecting and segmenting signatures from document images. Rather than focusing on local features that typically have large variations, our approach captures the structural saliency using a signature production model and computes the dynamic curvature of 2D contour fragments over multiple scales. This detection framework is general and computationally tractable. Second, we treat the problem of signature retrieval in the unconstrained setting of translation, scale, and rotation invariant nonrigid shape matching. We propose two novel measures of shape dissimilarity based on anisotropic scaling and registration residual error and present a supervised learning framework for combining complementary shape information from different dissimilarity metrics using LDA. We quantitatively study state-of-the-art shape representations, shape matching algorithms, measures of dissimilarity, and the use of multiple instances as query in document image retrieval. We further demonstrate our matching techniques in offline signature verification. Extensive experiments using large real-world collections of English and Arabic machine-printed and handwritten documents demonstrate the excellent performance of our approaches.
Data compression for sequencing data
2013-01-01
Post-Sanger sequencing methods produce tons of data, and there is a general agreement that the challenge to store and process them must be addressed with data compression. In this review we first answer the question “why compression” in a quantitative manner. Then we also answer the questions “what” and “how”, by sketching the fundamental compression ideas, describing the main sequencing data types and formats, and comparing the specialized compression algorithms and tools. Finally, we go back to the question “why compression” and give other, perhaps surprising answers, demonstrating the pervasiveness of data compression techniques in computational biology. PMID:24252160
The fission yeast CENP-B protein Abp1 prevents pervasive transcription of repetitive DNA elements.
Daulny, Anne; Mejía-Ramírez, Eva; Reina, Oscar; Rosado-Lugo, Jesus; Aguilar-Arnal, Lorena; Auer, Herbert; Zaratiegui, Mikel; Azorin, Fernando
2016-10-01
It is well established that eukaryotic genomes are pervasively transcribed producing cryptic unstable transcripts (CUTs). However, the mechanisms regulating pervasive transcription are not well understood. Here, we report that the fission yeast CENP-B homolog Abp1 plays an important role in preventing pervasive transcription. We show that loss of abp1 results in the accumulation of CUTs, which are targeted for degradation by the exosome pathway. These CUTs originate from different types of genomic features, but the highest increase corresponds to Tf2 retrotransposons and rDNA repeats, where they map along the entire elements. In the absence of abp1, increased RNAPII-Ser5P occupancy is observed throughout the Tf2 coding region and, unexpectedly, RNAPII-Ser5P is enriched at rDNA repeats. Loss of abp1 also results in Tf2 derepression and increased nucleolus size. Altogether these results suggest that Abp1 prevents pervasive RNAPII transcription of repetitive DNA elements (i.e., Tf2 and rDNA repeats) from internal cryptic sites. Copyright © 2016 Elsevier B.V. All rights reserved.
AI Techniques in a Context-Aware Ubiquitous Environment
NASA Astrophysics Data System (ADS)
Coppola, Paolo; Mea, Vincenzo Della; di Gaspero, Luca; Lomuscio, Raffaella; Mischis, Danny; Mizzaro, Stefano; Nazzi, Elena; Scagnetto, Ivan; Vassena, Luca
Nowadays, the mobile computing paradigm and the widespread diffusion of mobile devices are quickly changing and replacing many common assumptions about software architectures and interaction/communication models. The environment, in particular, or more generally, the so-called user context is claiming a central role in everyday’s use of cellular phones, PDAs, etc. This is due to the huge amount of data “suggested” by the surrounding environment that can be helpful in many common tasks. For instance, the current context can help a search engine to refine the set of results in a useful way, providing the user with a more suitable and exploitable information. Moreover, we can take full advantage of this new data source by “pushing” active contents towards mobile devices, empowering the latter with new features (e.g., applications) that can allow the user to fruitfully interact with the current context. Following this vision, mobile devices become dynamic self-adapting tools, according to the user needs and the possibilities offered by the environment. The present work proposes MoBe: an approach for providing a basic infrastructure for pervasive context-aware applications on mobile devices, in which AI techniques (namely a principled combination of rule-based systems, Bayesian networks and ontologies) are applied to context inference. The aim is to devise a general inferential framework to make easier the development of context-aware applications by integrating the information coming from physical and logical sensors (e.g., position, agenda) and reasoning about this information in order to infer new and more abstract contexts.
The Grid as a healthcare provision tool.
Hernández, V; Blanquer, I
2005-01-01
This paper presents a survey on HealthGrid technologies, describing the current status of Grid and eHealth and analyzing them in the medium-term future. The objective is to analyze the key points, barriers and driving forces for the take-up of HealthGrids. The article considers the procedures from other Grid disciplines such as high energy physics or biomolecular engineering and discusses the differences with respect to healthcare. It analyzes the status of the basic technology, the needs of the eHealth environment and the successes of current projects in health and other relevant disciplines. Information and communication technology (ICT) in healthcare is a promising area for the use of the Grid. There are many driving forces that are fostering the application of the secure, pervasive, ubiquitous and transparent access to information and computing resources that Grid technologies can provide. However, there are many barriers that must be solved. Many technical problems that arise in eHealth (standardization of data, federation of databases, content-based knowledge extraction, and management of personal data ...) can be solved with Grid technologies. The article presents the development of successful and demonstrative applications as the key for the take-up of HealthGrids, where short-term future medical applications will surely be biocomputing-oriented, and the future of Grid technologies on medical imaging seems promising. Finally, exploitation of HealthGrid is analyzed considering the curve of the adoption of ICT solutions and the definition of business models, which are far more complex than in other e-business technologies such ASP.
Activity Recognition on Streaming Sensor Data.
Krishnan, Narayanan C; Cook, Diane J
2014-02-01
Many real-world applications that focus on addressing needs of a human, require information about the activities being performed by the human in real-time. While advances in pervasive computing have lead to the development of wireless and non-intrusive sensors that can capture the necessary activity information, current activity recognition approaches have so far experimented on either a scripted or pre-segmented sequence of sensor events related to activities. In this paper we propose and evaluate a sliding window based approach to perform activity recognition in an on line or streaming fashion; recognizing activities as and when new sensor events are recorded. To account for the fact that different activities can be best characterized by different window lengths of sensor events, we incorporate the time decay and mutual information based weighting of sensor events within a window. Additional contextual information in the form of the previous activity and the activity of the previous window is also appended to the feature describing a sensor window. The experiments conducted to evaluate these techniques on real-world smart home datasets suggests that combining mutual information based weighting of sensor events and adding past contextual information into the feature leads to best performance for streaming activity recognition.
Smith, Ian; Greenside, Peyton G; Natoli, Ted; Lahr, David L; Wadden, David; Tirosh, Itay; Narayan, Rajiv; Root, David E; Golub, Todd R; Subramanian, Aravind; Doench, John G
2017-11-01
The application of RNA interference (RNAi) to mammalian cells has provided the means to perform phenotypic screens to determine the functions of genes. Although RNAi has revolutionized loss-of-function genetic experiments, it has been difficult to systematically assess the prevalence and consequences of off-target effects. The Connectivity Map (CMAP) represents an unprecedented resource to study the gene expression consequences of expressing short hairpin RNAs (shRNAs). Analysis of signatures for over 13,000 shRNAs applied in 9 cell lines revealed that microRNA (miRNA)-like off-target effects of RNAi are far stronger and more pervasive than generally appreciated. We show that mitigating off-target effects is feasible in these datasets via computational methodologies to produce a consensus gene signature (CGS). In addition, we compared RNAi technology to clustered regularly interspaced short palindromic repeat (CRISPR)-based knockout by analysis of 373 single guide RNAs (sgRNAs) in 6 cells lines and show that the on-target efficacies are comparable, but CRISPR technology is far less susceptible to systematic off-target effects. These results will help guide the proper use and analysis of loss-of-function reagents for the determination of gene function.
Technology survey on video face tracking
NASA Astrophysics Data System (ADS)
Zhang, Tong; Gomes, Herman Martins
2014-03-01
With the pervasiveness of monitoring cameras installed in public areas, schools, hospitals, work places and homes, video analytics technologies for interpreting these video contents are becoming increasingly relevant to people's lives. Among such technologies, human face detection and tracking (and face identification in many cases) are particularly useful in various application scenarios. While plenty of research has been conducted on face tracking and many promising approaches have been proposed, there are still significant challenges in recognizing and tracking people in videos with uncontrolled capturing conditions, largely due to pose and illumination variations, as well as occlusions and cluttered background. It is especially complex to track and identify multiple people simultaneously in real time due to the large amount of computation involved. In this paper, we present a survey on literature and software that are published or developed during recent years on the face tracking topic. The survey covers the following topics: 1) mainstream and state-of-the-art face tracking methods, including features used to model the targets and metrics used for tracking; 2) face identification and face clustering from face sequences; and 3) software packages or demonstrations that are available for algorithm development or trial. A number of publically available databases for face tracking are also introduced.
... difficult to diagnose and may be misdiagnosed as autism, pervasive developmental disorder, hearing impairment, learning disability, auditory/ ... difficult to diagnose and may be misdiagnosed as autism, pervasive developmental disorder, hearing impairment, learning disability, auditory/ ...
Location Privacy in RFID Applications
NASA Astrophysics Data System (ADS)
Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian
RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.
"What Are You Viewing?" Exploring the Pervasive Social TV Experience
NASA Astrophysics Data System (ADS)
Schatz, Raimund; Baillie, Lynne; Fröhlich, Peter; Egger, Sebastian; Grechenig, Thomas
The vision of pervasive TV foresees users engaging with interactive video services across a variety of contexts and user interfaces. Following this idea, this chapter extends traditional Social TV toward the notion of pervasive Social TV (PSTV) by including mobile viewing scenarios. We discuss social interaction enablers that integrate TV content consumption and communication in the context of two case studies that evaluate Social TV on mobile smartphones as well as the traditional set-top-box-based setup. We report on the impact of social features such as text-chat, audio-chat, and synchronized channel-choice on the end-user's media experience. By analyzing the commonalities and the differences between mobile and living-room Social TV that we found, we provide guidance on the design of pervasive Social TV systems as well as on future research issues.
Bryńska, Anita; Lipińska, Elzbieta; Matelska, Monika
2011-01-01
Repetitive and stereotyped behaviours in the form of stereotyped interests or specific routine activities are one ofthe diagnostic criteria in pervasive developmental disorders. The occurrence of repetitive behaviours in patients with pervasive developmental disorders is a starting point for questions about the type and classification criteria of such behaviours. The aim of the article is to present case studies of patients with pervasive developmental disorders and co-morbid symptoms in the form of routine activities, tics, obsessive-compulsive symptoms or stereotyped behaviours. The first case study describes a patient with Asperger's syndrome and obsessive compulsive symptoms. The diagnostic problems regarding complex motor tics are discussed in the second case study which describes a patient with Asperger's syndrome and Gilles de la Tourette syndrome. The third and fourth case study describes mono-zygotic twins with so called High Functioning Autism whose repetitive activities point to either obsessive compulsive symptoms, stereotypic movements, need for absolute consistency or echopraxia. The possible comorbidity of pervasive developmental disorders and symptoms in the form of repetitive behaviours, possible interactions as well as diagnostic challenges is discussed in the article.
The 'Biologically-Inspired Computing' Column
NASA Technical Reports Server (NTRS)
Hinchey, Mike
2006-01-01
The field of Biology changed dramatically in 1953, with the determination by Francis Crick and James Dewey Watson of the double helix structure of DNA. This discovery changed Biology for ever, allowing the sequencing of the human genome, and the emergence of a "new Biology" focused on DNA, genes, proteins, data, and search. Computational Biology and Bioinformatics heavily rely on computing to facilitate research into life and development. Simultaneously, an understanding of the biology of living organisms indicates a parallel with computing systems: molecules in living cells interact, grow, and transform according to the "program" dictated by DNA. Moreover, paradigms of Computing are emerging based on modelling and developing computer-based systems exploiting ideas that are observed in nature. This includes building into computer systems self-management and self-governance mechanisms that are inspired by the human body's autonomic nervous system, modelling evolutionary systems analogous to colonies of ants or other insects, and developing highly-efficient and highly-complex distributed systems from large numbers of (often quite simple) largely homogeneous components to reflect the behaviour of flocks of birds, swarms of bees, herds of animals, or schools of fish. This new field of "Biologically-Inspired Computing", often known in other incarnations by other names, such as: Autonomic Computing, Pervasive Computing, Organic Computing, Biomimetics, and Artificial Life, amongst others, is poised at the intersection of Computer Science, Engineering, Mathematics, and the Life Sciences. Successes have been reported in the fields of drug discovery, data communications, computer animation, control and command, exploration systems for space, undersea, and harsh environments, to name but a few, and augur much promise for future progress.
Sadeghi, Koosha; Junghyo Lee; Banerjee, Ayan; Sohankar, Javad; Gupta, Sandeep K S
2017-07-01
Brain-Computer Interface (BCI) systems use some permanent features of brain signals to recognize their corresponding cognitive states with high accuracy. However, these features are not perfectly permanent, and BCI system should be continuously trained over time, which is tedious and time consuming. Thus, analyzing the permanency of signal features is essential in determining how often to repeat training. In this paper, we monitor electroencephalogram (EEG) signals, and analyze their behavior through continuous and relatively long period of time. In our experiment, we record EEG signals corresponding to rest state (eyes open and closed) from one subject everyday, for three and a half months. The results show that signal features such as auto-regression coefficients remain permanent through time, while others such as power spectral density specifically in 5-7 Hz frequency band are not permanent. In addition, eyes open EEG data shows more permanency than eyes closed data.
Radiology: "killer app" for next generation networks?
McNeill, Kevin M
2004-03-01
The core principles of digital radiology were well developed by the end of the 1980 s. During the following decade tremendous improvements in computer technology enabled realization of those principles at an affordable cost. In this decade work can focus on highly distributed radiology in the context of the integrated health care enterprise. Over the same period computer networking has evolved from a relatively obscure field used by a small number of researchers across low-speed serial links to a pervasive technology that affects nearly all facets of society. Development directions in network technology will ultimately provide end-to-end data paths with speeds that match or exceed the speeds of data paths within the local network and even within workstations. This article describes key developments in Next Generation Networks, potential obstacles, and scenarios in which digital radiology can become a "killer app" that helps to drive deployment of new network infrastructure.
Brasil, L M; de Azevedo, F M; Barreto, J M
2001-09-01
This paper proposes a hybrid expert system (HES) to minimise some complexity problems pervasive to the artificial intelligence such as: the knowledge elicitation process, known as the bottleneck of expert systems; the model choice for knowledge representation to code human reasoning; the number of neurons in the hidden layer and the topology used in the connectionist approach; the difficulty to obtain the explanation on how the network arrived to a conclusion. Two algorithms applied to developing of HES are also suggested. One of them is used to train the fuzzy neural network and the other to obtain explanations on how the fuzzy neural network attained a conclusion. To overcome these difficulties the cognitive computing was integrated to the developed system. A case study is presented (e.g. epileptic crisis) with the problem definition and simulations. Results are also discussed.
Dependence in probabilistic modeling Dempster-Shafer theory and probability bounds analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ferson, Scott; Nelsen, Roger B.; Hajagos, Janos
2015-05-01
This report summarizes methods to incorporate information (or lack of information) about inter-variable dependence into risk assessments that use Dempster-Shafer theory or probability bounds analysis to address epistemic and aleatory uncertainty. The report reviews techniques for simulating correlated variates for a given correlation measure and dependence model, computation of bounds on distribution functions under a specified dependence model, formulation of parametric and empirical dependence models, and bounding approaches that can be used when information about the intervariable dependence is incomplete. The report also reviews several of the most pervasive and dangerous myths among risk analysts about dependence in probabilistic models.
HERA: A New Platform for Embedding Agents in Heterogeneous Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Alonso, Ricardo S.; de Paz, Juan F.; García, Óscar; Gil, Óscar; González, Angélica
Ambient Intelligence (AmI) based systems require the development of innovative solutions that integrate distributed intelligent systems with context-aware technologies. In this sense, Multi-Agent Systems (MAS) and Wireless Sensor Networks (WSN) are two key technologies for developing distributed systems based on AmI scenarios. This paper presents the new HERA (Hardware-Embedded Reactive Agents) platform, that allows using dynamic and self-adaptable heterogeneous WSNs on which agents are directly embedded on the wireless nodes This approach facilitates the inclusion of context-aware capabilities in AmI systems to gather data from their surrounding environments, achieving a higher level of ubiquitous and pervasive computing.
Undesirable Effects of Media on Children: Why Limitation is Necessary?
Karaagac, Aysu Turkmen
2015-06-01
Pervasive media environment is a social problem shared by most of the countries around the world. Several studies have been performed to highlight the undesired effects of media on children. Some of these studies have focused on the time spent by children watching television, playing with computers or using mobile media devices while some others have tried to explain the associations between the obesity, postural abnormalities or psychological problems of children, and their media use. This article discusses the recent approaches to curb influence of media on children, and the importance of family media literacy education programs with particular relevance to developing countries.
Fragile X Syndrome: Genetic Predisposition to Psychopathology.
ERIC Educational Resources Information Center
Bregman, Joel D.; And Others
1988-01-01
Psychiatric evaluation of 14 males (ages 3-27 years) with the fragile X syndrome found pervasive hyperactivity, impulsivity, and attentional deficits, and a significant degree of anxiety. However, diagnostic criteria for persistent pervasive developmental disorder and autism were not met. (Author/DB)
Pervasive Developmental Disorders: Distinguishing among Subtypes.
ERIC Educational Resources Information Center
Harris, Sandra L.; Glasberg, Beth; Ricca, Donna
1996-01-01
Describes pervasive developmental disorders (PPDs), which are severe conditions that begin in early life and influence multiple areas of development. Conditions include autistic disorders, Asperger's disorder, Rett's disorder, childhood disintegrative disorder, and PPDs "not otherwise specified." Intensive behavioral intervention at an early age…
Bio-inspired Autonomic Structures: a middleware for Telecommunications Ecosystems
NASA Astrophysics Data System (ADS)
Manzalini, Antonio; Minerva, Roberto; Moiso, Corrado
Today, people are making use of several devices for communications, for accessing multi-media content services, for data/information retrieving, for processing, computing, etc.: examples are laptops, PDAs, mobile phones, digital cameras, mp3 players, smart cards and smart appliances. One of the most attracting service scenarios for future Telecommunications and Internet is the one where people will be able to browse any object in the environment they live: communications, sensing and processing of data and services will be highly pervasive. In this vision, people, machines, artifacts and the surrounding space will create a kind of computational environment and, at the same time, the interfaces to the network resources. A challenging technological issue will be interconnection and management of heterogeneous systems and a huge amount of small devices tied together in networks of networks. Moreover, future network and service infrastructures should be able to provide Users and Application Developers (at different levels, e.g., residential Users but also SMEs, LEs, ASPs/Web2.0 Service roviders, ISPs, Content Providers, etc.) with the most appropriate "environment" according to their context and specific needs. Operators must be ready to manage such level of complication enabling their latforms with technological advanced allowing network and services self-supervision and self-adaptation capabilities. Autonomic software solutions, enhanced with innovative bio-inspired mechanisms and algorithms, are promising areas of long term research to face such challenges. This chapter proposes a bio-inspired autonomic middleware capable of leveraging the assets of the underlying network infrastructure whilst, at the same time, supporting the development of future Telecommunications and Internet Ecosystems.
Machine learning techniques for energy optimization in mobile embedded systems
NASA Astrophysics Data System (ADS)
Donohoo, Brad Kyoshi
Mobile smartphones and other portable battery operated embedded systems (PDAs, tablets) are pervasive computing devices that have emerged in recent years as essential instruments for communication, business, and social interactions. While performance, capabilities, and design are all important considerations when purchasing a mobile device, a long battery lifetime is one of the most desirable attributes. Battery technology and capacity has improved over the years, but it still cannot keep pace with the power consumption demands of today's mobile devices. This key limiter has led to a strong research emphasis on extending battery lifetime by minimizing energy consumption, primarily using software optimizations. This thesis presents two strategies that attempt to optimize mobile device energy consumption with negligible impact on user perception and quality of service (QoS). The first strategy proposes an application and user interaction aware middleware framework that takes advantage of user idle time between interaction events of the foreground application to optimize CPU and screen backlight energy consumption. The framework dynamically classifies mobile device applications based on their received interaction patterns, then invokes a number of different power management algorithms to adjust processor frequency and screen backlight levels accordingly. The second strategy proposes the usage of machine learning techniques to learn a user's mobile device usage pattern pertaining to spatiotemporal and device contexts, and then predict energy-optimal data and location interface configurations. By learning where and when a mobile device user uses certain power-hungry interfaces (3G, WiFi, and GPS), the techniques, which include variants of linear discriminant analysis, linear logistic regression, non-linear logistic regression, and k-nearest neighbor, are able to dynamically turn off unnecessary interfaces at runtime in order to save energy.
Integrating Intelligent Systems Domain Knowledge Into the Earth Science Curricula
NASA Astrophysics Data System (ADS)
Güereque, M.; Pennington, D. D.; Pierce, S. A.
2017-12-01
High-volume heterogeneous datasets are becoming ubiquitous, migrating to center stage over the last ten years and transcending the boundaries of computationally intensive disciplines into the mainstream, becoming a fundamental part of every science discipline. Despite the fact that large datasets are now pervasive across industries and academic disciplines, the array of skills is generally absent from earth science programs. This has left the bulk of the student population without access to curricula that systematically teach appropriate intelligent-systems skills, creating a void for skill sets that should be universal given their need and marketability. While some guidance regarding appropriate computational thinking and pedagogy is appearing, there exist few examples where these have been specifically designed and tested within the earth science domain. Furthermore, best practices from learning science have not yet been widely tested for developing intelligent systems-thinking skills. This research developed and tested evidence based computational skill modules that target this deficit with the intention of informing the earth science community as it continues to incorporate intelligent systems techniques and reasoning into its research and classrooms.
Autism Spectrum Disorders (Pervasive Developmental Disorders)
ERIC Educational Resources Information Center
Strock, Margaret
2007-01-01
This booklet focuses on classic autism, pervasive developmental disorder not otherwise specified (PDD-NOS), and Asperger syndrome, with brief descriptions of Rett syndrome and childhood disintegrative disorder. The booklet describes possible indicators of autism spectrum disorders (ASD), their diagnosis, available aids, treatment options, adults…
2014-01-01
Background Catatonia has been associated with both schizophrenia and pervasive developmental disorders. The aim of this study was to evaluate catatonic features among adolescents suffering from schizophrenia. Further, we compared these features between adolescents with a comorbid pervasive developmental disorder and those without one. Finally, we wanted to compare the profile of catatonia-like features of our schizophrenia patients to that described earlier among persons with autism spectrum disorders. Methods The study comprised a consecutive sample of 18 adolescents with schizophrenia (mean age 15.6 years, SD 1.4) and their families. Diagnosis of schizophrenia was assessed with the Schedule for Affective Disorders and Schizophrenia for School-Aged Children – Present and Life-Time (K-SADS-PL) for the DSM-IV. The Diagnostic Interview for Social and Communication Disorders version 11 was used to assess catatonic features. Results All adolescents with schizophrenia had showed some lifetime catatonic features. Approximately 78% of them had already expressed these features before the age of 10. The number of catatonic features before the age of 10 was significantly higher among the adolescents with a comorbid pervasive developmental disorder compared to those without one. The numbers of catatonic features after the age of 10 did not significantly differ between the two groups. Over three-quarters of schizophrenia patients shared four lifetime catatonic features: “lacks facial expression”, “odd intonation”, “poor eye contact” and “lack of cooperation”. Conclusions Adolescent schizophrenia patients with a comorbid pervasive developmental disorder show many catatonic features in childhood whereas those without one seem to develop these features first in adolescence. Catatonic features exhibited by adolescents with schizophrenia resemble those described among persons with pervasive developmental disorders without schizophrenia. PMID:24914405
Waris, Petra; Lindberg, Nina; Kettunen, Kirsi; Lipsanen, Jari; Tani, Pekka
2014-01-01
Catatonia has been associated with both schizophrenia and pervasive developmental disorders. The aim of this study was to evaluate catatonic features among adolescents suffering from schizophrenia. Further, we compared these features between adolescents with a comorbid pervasive developmental disorder and those without one. Finally, we wanted to compare the profile of catatonia-like features of our schizophrenia patients to that described earlier among persons with autism spectrum disorders. The study comprised a consecutive sample of 18 adolescents with schizophrenia (mean age 15.6 years, SD 1.4) and their families. Diagnosis of schizophrenia was assessed with the Schedule for Affective Disorders and Schizophrenia for School-Aged Children - Present and Life-Time (K-SADS-PL) for the DSM-IV. The Diagnostic Interview for Social and Communication Disorders version 11 was used to assess catatonic features. All adolescents with schizophrenia had showed some lifetime catatonic features. Approximately 78% of them had already expressed these features before the age of 10. The number of catatonic features before the age of 10 was significantly higher among the adolescents with a comorbid pervasive developmental disorder compared to those without one. The numbers of catatonic features after the age of 10 did not significantly differ between the two groups. Over three-quarters of schizophrenia patients shared four lifetime catatonic features: "lacks facial expression", "odd intonation", "poor eye contact" and "lack of cooperation". Adolescent schizophrenia patients with a comorbid pervasive developmental disorder show many catatonic features in childhood whereas those without one seem to develop these features first in adolescence. Catatonic features exhibited by adolescents with schizophrenia resemble those described among persons with pervasive developmental disorders without schizophrenia.
ERIC Educational Resources Information Center
Uono, Shota; Sato, Wataru; Toichi, Motomi
2010-01-01
Individuals with pervasive developmental disorder (PDD) have difficulty with social communication via emotional facial expressions, but behavioral studies involving static images have reported inconsistent findings about emotion recognition. We investigated whether dynamic presentation of facial expression would enhance subjective perception of…
Nadon, G; Ehrmann Feldman, D; Gisel, E
2008-08-01
Current evaluations used by occupational therapists to assess and treat feeding problems derive mainly from the domain of dysphagia. The purpose of this article is to familiarize the reader with tools used, in research, for children with pervasive developmental disorders (PDD) and to determine if any of these meet the needs of occupational therapists. The following data bases were searched: Medline, CINAHL, HAPI and PsyINFO, using the terms pervasive developmental disorder, autism, Asperger syndrome, pervasive developmental disorder not otherwise specified, eating behavior, eating disorder, food preference, food selectivity, feeding disorders, picky eater and child. All articles published between 1980 and 2006 (n=27) were reviewed. A total of 20 studies met our selection criteria. Assessment methods are compared using the Disability Creation Model (DCP). The DCP is the Quebec alternative to the International Classification of Functioning, Disability and Health (ICF). None of the evaluation tools reviewed met all factors that may influence eating in children with PDD. Implications for research and practice in occupational therapy are discussed.
Koldijk, Saskia; Kraaij, Wessel; Neerincx, Mark A
2016-07-05
Stress in office environments is a big concern, often leading to burn-out. New technologies are emerging, such as easily available sensors, contextual reasoning, and electronic coaching (e-coaching) apps. In the Smart Reasoning for Well-being at Home and at Work (SWELL) project, we explore the potential of using such new pervasive technologies to provide support for the self-management of well-being, with a focus on individuals' stress-coping. Ideally, these new pervasive systems should be grounded in existing work stress and intervention theory. However, there is a large diversity of theories and they hardly provide explicit directions for technology design. The aim of this paper is to present a comprehensive and concise framework that can be used to design pervasive technologies that support knowledge workers to decrease stress. Based on a literature study we identify concepts relevant to well-being at work and select different work stress models to find causes of work stress that can be addressed. From a technical perspective, we then describe how sensors can be used to infer stress and the context in which it appears, and use intervention theory to further specify interventions that can be provided by means of pervasive technology. The resulting general framework relates several relevant theories: we relate "engagement and burn-out" to "stress", and describe how relevant aspects can be quantified by means of sensors. We also outline underlying causes of work stress and how these can be addressed with interventions, in particular utilizing new technologies integrating behavioral change theory. Based upon this framework we were able to derive requirements for our case study, the pervasive SWELL system, and we implemented two prototypes. Small-scale user studies proved the value of the derived technology-supported interventions. The presented framework can be used to systematically develop theory-based technology-supported interventions to address work stress. In the area of pervasive systems for well-being, we identified the following six key research challenges and opportunities: (1) performing multi-disciplinary research, (2) interpreting personal sensor data, (3) relating measurable aspects to burn-out, (4) combining strengths of human and technology, (5) privacy, and (6) ethics.
Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud
Munisamy, Shyamala Devi; Chokkalingam, Arun
2015-01-01
Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider's premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization. PMID:26380364
Dorsolateral Prefrontal Contributions to Human Intelligence
Barbey, Aron K.; Colom, Roberto; Grafman, Jordan
2012-01-01
Although cognitive neuroscience has made remarkable progress in understanding the involvement of the prefrontal cortex in executive control functions for human intelligence, the necessity of the dorsolateral prefrontal cortex (dlPFC) for key competencies of general intelligence and executive function remains to be well established. Here we studied human brain lesion patients with dlPFC lesions to investigate whether this region is computationally necessary for performance on neuropsychological tests of general intelligence and executive function, administering the Wechsler Adult Intelligence Scale (WAIS) and subtests of the Delis Kaplan Executive Function System (D-KEFS) to three groups: dlPFC lesions (n = 19), non-dlPFC lesions (n = 152), and no brain lesions (n = 55). The key results indicate that: (1) patients with focal dlPFC damage exhibit lower scores, at the latent variable level, than controls in general intelligence (g) and executive function; (2) dlPFC patients demonstrate lower scores than controls in several executive measures; and (3) these latter differences are no longer significant when the pervasive influence of the general factor of intelligence (g) is statistically removed. The observed findings support a central role for the dlPFC in general intelligence and make specific recommendations for the interpretation and application of the WAIS and D-KEFS to the study of high-level cognition in health and disease. PMID:22634247
The Promises and Pitfalls of Digital Technology in Its Application to Alcohol Treatment
Muench, Frederick
2014-01-01
Individuals seeking to change their alcohol use form a heterogeneous group with varied treatment goals—including moderation and abstinence—that therefore requires flexible treatment options. The availability of alcohol in the United States, and the pervasive social pressure to drink, warrant treatments that support individuals outside the treatment environment and that foster coping and self-regulation in the face of these demands. Emerging digital technologies show promise for helping both to hone therapies to clients’ individual needs and to support clients in settings beyond the clinic. In the broader health care arena, digital health technologies (DHTs) are transforming how health professionals assess, prevent, and treat both physical and mental health problems. DHTs include assessments and interventions delivered via computer, Internet, mobile phone, and wireless or wearable device technologies. The emerging literature examining within-treatment and mobile DHTs highlights an opportunity to create personalized alcohol treatments for every person seeking care. Despite the promises DHTs may hold, however, there still are many potential risks to using them and a number of challenges regarding how to integrate them into treatment successfully. This article will review the current and potential advantages of DHTs in alcohol treatment and the technological, personal, organizational, and systemic limitations of integrating various technology-based assessment and intervention programs into care. PMID:26259008
Munisamy, Shyamala Devi; Chokkalingam, Arun
2015-01-01
Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider's premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.
King, Abby C; Friedman, Robert; Marcus, Bess; Castro, Cynthia; Forsyth, LeighAnn; Napolitano, Melissa; Pinto, Bernardine
2002-10-01
Physical inactivity among middle- and older-aged adults is pervasive, and is linked with numerous chronic conditions that diminish health and functioning. Counselor-directed physical activity programs may enhance extrinsic motivation (reflected in social influence theories, such as self-presentation theory) and, in turn, physical activity adherence, while the counselor is in charge of program delivery. However, external influences can undermine intrinsic motivation, making it more difficult to maintain physical activity once counselor-initiated contact ends. In contrast, programs that diminish the socially evaluative and controlling aspects of the counseling interchange may promote intrinsic motivation (described in cognitive evaluation theory), and, thus, physical activity maintenance, even when counselor-initiated contact ceases. The objective of the Community Health Advice by Telephone (CHAT) project is to compare these two theories by conducting a randomized controlled trial evaluating the effects of a telephone-administered counseling program delivered by a person (social influence enhancement) or computer (cognitive evaluation enhancement) on physical activity adoption and maintenance over 18 months. Healthy, sedentary adults (n = 225) aged 55 years and older are randomized to one of these programs or to a control arm. This study will contribute to advancing motivational theory as well as provide information on the sustained effectiveness of interventions with substantial public health applicability.
Trends in Autism Spectrum Disorder Diagnoses: 1994-2007
ERIC Educational Resources Information Center
Rosenberg, Rebecca E.; Daniels, Amy M.; Law, J. Kiely; Law, Paul A.; Kaufmann, Walter E.
2009-01-01
We analyzed predictors of parent-reported initial diagnosis (autistic disorder [AD], pervasive developmental disorder-not otherwise specified [PDD-NOS], pervasive developmental disorder ["PDD"] and autism spectrum disorder ["ASD"], and Asperger syndrome [AS]), among 6,176 individuals with autism spectrum disorders diagnosed from 1994 through 2007.…
Pervasive Agility and Agile Fires in Support of Decisive Action
2012-03-29
Pervasive Agility and Agile Fires in Support of Decisive Action FORMAT: Civilian Research Project DATE: 29 March 2012 WORD COUNT : 12,599 PAGES: 54...will face, this pollenization may require creative measures, perhaps virtual or constructive scenarios. The National Training Center at Fort Irwin
Jha, Raghbendra; Gaiha, Raghav; Sharma, Anurag
2010-01-01
This article reports on mean consumption, poverty (all three FGT measures) and inequality during 2004 for rural India using National Sample Survey (NSS) data for the 60th Round. Mean consumption at the national level is much higher than the poverty line. However, the Gini coefficient is higher than in recent earlier rounds. The headcount ratio is 22.9 per cent. Mean consumption, all three measures of poverty and the Gini coefficient are computed at the level of 20 states and 63 agro-climatic zones in these 20 states. It is surmised that despite impressive growth rates deprivation is pervasive, pockets of severe poverty persist, and inequality is rampant.
NASA Astrophysics Data System (ADS)
Cavallo, Andrea; Ansuini, Caterina; Becchio, Cristina
2015-03-01
When we observe actions performed by others, our motor system resonates along with that of the observed agent [1]. The exact features of this resonant motor response, however, are unclear. Do we mirror the goal of others' actions or rather the low-kinematic features of their movements? D'Ausilio et al. suggest that this is an ill-defined problem: the mirror system plausibly replicates the same computational mechanisms implicated by motor control. Accordingly, motor synergies may not only constitute a pervasive element of motor control, but also form the fundamental unit of action observation.
Contact centers, pervasive computing and telemedicine: a quality health care triangle.
Maglaveras, Nicos
2004-01-01
The Citizen Health System (CHS) is a European Commission (CEC) funded project in the field of IST for Health. Its main goal is to develop a generic contact center which in its pilot stage can be used in the monitoring, treatment and management of chronically ill patients at home in Greece, Spain, and Germany. Such contact centers, using any type of communication technology, and providing timely and preventive prompting to the patients are envisaged in the future to evolve into well-being contact centers providing services to all citizens. In this paper, we present the structure of such a generic contact center and present its major achievements, and their impact to the quality of health delivery.
Anharmonic effects in simple physical models: introducing undergraduates to nonlinearity
NASA Astrophysics Data System (ADS)
Christian, J. M.
2017-09-01
Given the pervasive character of nonlinearity throughout the physical universe, a case is made for introducing undergraduate students to its consequences and signatures earlier rather than later. The dynamics of two well-known systems—a spring and a pendulum—are reviewed when the standard textbook linearising assumptions are relaxed. Some qualitative effects of nonlinearity can be anticipated from symmetry (e.g., inspection of potential energy functions), and further physical insight gained by applying a simple successive-approximation method that might be taught in parallel with courses on classical mechanics, ordinary differential equations, and computational physics. We conclude with a survey of how these ideas have been deployed on programmes at a UK university.
Toward genome-enabled mycology.
Hibbett, David S; Stajich, Jason E; Spatafora, Joseph W
2013-01-01
Genome-enabled mycology is a rapidly expanding field that is characterized by the pervasive use of genome-scale data and associated computational tools in all aspects of fungal biology. Genome-enabled mycology is integrative and often requires teams of researchers with diverse skills in organismal mycology, bioinformatics and molecular biology. This issue of Mycologia presents the first complete fungal genomes in the history of the journal, reflecting the ongoing transformation of mycology into a genome-enabled science. Here, we consider the prospects for genome-enabled mycology and the technical and social challenges that will need to be overcome to grow the database of complete fungal genomes and enable all fungal biologists to make use of the new data.
ERIC Educational Resources Information Center
Tobing, Lauren E.; Glenwick, David S.
2006-01-01
This study explored potential predictors of psychological distress and moderators of the relation between parenting stress and psychological distress in mothers of children with pervasive developmental disorders (PDDs). Ninety-seven mothers of children diagnosed with autism spectrum disorders completed measures assessing children's functional…
Pervasive Developmental Disorders. NICHCY Briefing Paper FS20.
ERIC Educational Resources Information Center
Tsai, Luke Y.
This briefing paper is intended to provide basic information about the diagnosis, educational programming, and special needs of children and youth with Pervasive Developmental Disorders (PDD), a group of neurological disorders usually evident by age 3 and characterized by impairments in social interaction, imaginative activity, and verbal and…
Structure of the Autism Symptom Phenotype: A Proposed Multidimensional Model
ERIC Educational Resources Information Center
Georgiades, Stelios; Szatmari, Peter; Zwaigenbaum, Lonnie; Duku, Eric; Bryson, Susan; Roberts, Wendy; Goldberg, Jeremy; Mahoney, William
2007-01-01
Background: The main objective of this study was to develop a comprehensive, empirical model that would allow the reorganization of the structure of the pervasive developmental disorder symptom phenotype through factor analysis into more homogeneous dimensions. Method: The sample consisted of 209 children with pervasive developmental disorder…
ERIC Educational Resources Information Center
Waters, Anna Jeddeloh
2013-01-01
Research has identified language impairment as a pervasive disability (Bishop & Edmundson, 1987; Greenhalgh & Strong, 2001). Classroom communication behaviors have a role in the maintenance of special education eligibility and functional communication difficulties for young children with language impairment. This paper reviews the…
A Divided Attention Experiment with Pervasively Hyperactive Children.
ERIC Educational Resources Information Center
van der Meere, Jaap; Sergeant, Joseph
1987-01-01
Task performance of 12 pervasive hyperactives and controls (ages 8-13) was studied in a divided attention reaction time experiment. Hyperactives were slower than controls, had more variable reaction times, and made more frequent errors. Task inefficiency in hyperactives could not be explained by a divided attention deficiency or impulsive…
Prevalence of Gastrointestinal Disorders in Adult Clients with Pervasive Developmental Disorders
ERIC Educational Resources Information Center
Galli-Carminati, G.; Chauvet, I.; Deriaz, N.
2006-01-01
Background: In clients with pervasive developmental disorders (PDD), some authors have noticed the presence of gastrointestinal disorders and behavioural disorders. An augmented prevalence of different histological anomalies has also been reported. The aim of our study is to highlight the prevalence of gastrointestinal disorders in this adult with…
ERIC Educational Resources Information Center
Atlas, Jeffrey A.; Lapidus, Leah Blumberg
1988-01-01
A total of 48 children (aged 4-14) with severe pervasive developmental disturbance, exhibiting mutism, echolalia, or nonecholalic speech, were observed in their communicative behaviors across modalities. Levels of symbolization in gesture, play, and drawing were significantly intercorrelated and were most strongly correlated with the criterion…
Autism Spectrum Disorder and Young Children. AECA Research in Practice Series.
ERIC Educational Resources Information Center
Roe, Diana
This booklet provides an overview of the characteristics and needs of young children with autism spectrum disorders or pervasive developmental disorders. It addresses: (1) different disabilities under the classification of autism spectrum disorders or pervasive developmental disorders; (2) characteristics of autism; (3) characteristics of children…
Brief Report: Pervasive Developmental Disorder Can Evolve into ADHD--Case Illustrations
ERIC Educational Resources Information Center
Fein, Deborah; Dixon, Pamela; Paul, Jennifer; Levin, Harriet
2005-01-01
Despite prominent attentional symptoms in Pervasive Developmental Disorders (PDD) the relationship between PDD and Attention Deficit Hyperactivity Disorder (ADHD) has received little direct examination. In addition, outcome studies of children with PDD often focus on language, educational placement, or adaptive skills, but seldom on loss of the…
ERPs and Eye Movements Reflect Atypical Visual Perception in Pervasive Developmental Disorder
ERIC Educational Resources Information Center
Kemner, Chantal; van Engeland, Herman
2006-01-01
Many studies of eye tracking or event-related brain potentials (ERPs) in subjects with Pervasive Developmental Disorder (PDD) have yielded inconsistent results on attentional processing. However, recent studies have indicated that there are specific abnormalities in early processing that are probably related to perception. ERP amplitudes in…
Fragmented Visuospatial Processing in Children with Pervasive Developmental Disorder
ERIC Educational Resources Information Center
Schlooz, Wim A. J. M.; Hulstijn, Wouter; van den Broek, Pieter J. A.; van der Pijll, Angela C. A. M.; Gabreels, Fons; van der Gaag, Rutger J.; Rotteveel, Jan J.
2006-01-01
Children diagnosed with Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS) and Asperger Syndrome (AS) may be characterised by a similar perceptual focus on details as children with autistic disorder (AD). This was tested by analysing their performance in a visuoperceptual task [the Children's Embedded Figure Test (CEFT)] and a…
24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.
Code of Federal Regulations, 2012 CFR
2012-04-01
..., unemployment and general distress. 598.110 Section 598.110 Housing and Urban Development Regulations Relating... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment...) Unemployment. Unemployment is demonstrated by: (1) The most recent data available indicating that the annual...
24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.
Code of Federal Regulations, 2014 CFR
2014-04-01
..., unemployment and general distress. 598.110 Section 598.110 Housing and Urban Development Regulations Relating... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment...) Unemployment. Unemployment is demonstrated by: (1) The most recent data available indicating that the annual...
24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.
Code of Federal Regulations, 2013 CFR
2013-04-01
..., unemployment and general distress. 598.110 Section 598.110 Housing and Urban Development Regulations Relating... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment...) Unemployment. Unemployment is demonstrated by: (1) The most recent data available indicating that the annual...
24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.
Code of Federal Regulations, 2011 CFR
2011-04-01
..., unemployment and general distress. 598.110 Section 598.110 Housing and Urban Development Regulations Relating... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment...) Unemployment. Unemployment is demonstrated by: (1) The most recent data available indicating that the annual...
ERIC Educational Resources Information Center
Magnee, Maurice J. C. M.; de Gelder, Beatrice; van Engeland, Herman; Kemner, Chantal
2008-01-01
Background: Integration of information from multiple sensory sources is an important prerequisite for successful social behavior, especially during face-to-face conversation. It has been suggested that communicative impairments among individuals with pervasive developmental disorders (PDD) might be caused by an inability to integrate synchronously…
Gastrointestinal Symptoms in a Sample of Children with Pervasive Developmental Disorders
ERIC Educational Resources Information Center
Nikolov, Roumen N.; Bearss, Karen E.; Lettinga, Jelle; Erickson, Craig; Rodowski, Maria; Aman, Michael G.; McCracken, James T.; McDougle, Christopher J.; Tierney, Elaine; Vitiello, Benedetto; Arnold, L. Eugene; Shah, Bhavik; Posey, David J.; Ritz, Louise; Scahill, Lawrence
2009-01-01
Objective: To evaluate gastrointestinal (GI) problems in a large, well-characterized sample of children with pervasive developmental disorders (PDDs). Methods: One hundred seventy two children entering one of two trials conducted by the Research Units on Pediatric Psychopharmacology (RUPP) Autism Network were assessed comprehensively prior to…
Thongseiratch, Therdpong; Worachotekamjorn, Juthamas
2016-10-01
This study compared the number of attention deficit hyperactivity disorder (ADHD) cases defined by Diagnostic and Statistical Manual (DSM)-IV versus DSM-V criterion in children who have learning or behavioral problems with high IQ. The medical records of children ≤15 years of age who presented with learning or behavioral problems and underwent a Wechsler Intelligence Scale for Children (WISC)-III IQ test at the Pediatric Outpatient Clinic unit between 2010 and 2015 were reviewed. Information on DSM-IV and DSM-V criteria for ADHD were derived from computer-based medical records. Twenty-eight children who had learning or behavioral problems were identified to have a full-scale IQ ≥120. Sixteen of these high-IQ children met the DSM-IV criteria diagnosis for ADHD. Applying the extension of the age-of-onset criterion from 7 to 12 years in DSM-V led to an increase of three cases, all of which were the inattentive type ADHD. Including the pervasive developmental disorder criterion led to an increase of one case. The total number of ADHD cases also increased from 16 to 20 in this group. The data supported the hypothesis that applying the extension of the age-of-onset ADHD criterion and enabling the diagnosis of children with pervasive developmental disorders will increase the number of ADHD diagnoses among children with high IQ. © The Author(s) 2016.
Pervasive surveillance-agent system based on wireless sensor networks: design and deployment
NASA Astrophysics Data System (ADS)
Martínez, José F.; Bravo, Sury; García, Ana B.; Corredor, Iván; Familiar, Miguel S.; López, Lourdes; Hernández, Vicente; Da Silva, Antonio
2010-12-01
Nowadays, proliferation of embedded systems is enhancing the possibilities of gathering information by using wireless sensor networks (WSNs). Flexibility and ease of installation make these kinds of pervasive networks suitable for security and surveillance environments. Moreover, the risk for humans to be exposed to these functions is minimized when using these networks. In this paper, a virtual perimeter surveillance agent, which has been designed to detect any person crossing an invisible barrier around a marked perimeter and send an alarm notification to the security staff, is presented. This agent works in a state of 'low power consumption' until there is a crossing on the perimeter. In our approach, the 'intelligence' of the agent has been distributed by using mobile nodes in order to discern the cause of the event of presence. This feature contributes to saving both processing resources and power consumption since the required code that detects presence is the only system installed. The research work described in this paper illustrates our experience in the development of a surveillance system using WNSs for a practical application as well as its evaluation in real-world deployments. This mechanism plays an important role in providing confidence in ensuring safety to our environment.
Framework of sensor-based monitoring for pervasive patient care.
Triantafyllidis, Andreas K; Koutkias, Vassilis G; Chouvarda, Ioanna; Adami, Ilia; Kouroubali, Angelina; Maglaveras, Nicos
2016-09-01
Sensor-based health systems can often become difficult to use, extend and sustain. The authors propose a framework for designing sensor-based health monitoring systems aiming to provide extensible and usable monitoring services in the scope of pervasive patient care. The authors' approach relies on a distributed system for monitoring the patient health status anytime-anywhere and detecting potential health complications, for which healthcare professionals and patients are notified accordingly. Portable or wearable sensing devices measure the patient's physiological parameters, a smart mobile device collects and analyses the sensor data, a Medical Center system receives notifications on the detected health condition, and a Health Professional Platform is used by formal caregivers in order to review the patient condition and configure monitoring schemas. A Service-oriented architecture is utilised to provide extensible functional components and interoperable interactions among the diversified system components. The framework was applied within the REMOTE ambient-assisted living project in which a prototype system was developed, utilising Bluetooth to communicate with the sensors and Web services for data exchange. A scenario of using the REMOTE system and preliminary usability results show the applicability, usefulness and virtue of our approach.
Framework of sensor-based monitoring for pervasive patient care
Koutkias, Vassilis G.; Chouvarda, Ioanna; Adami, Ilia; Kouroubali, Angelina; Maglaveras, Nicos
2016-01-01
Sensor-based health systems can often become difficult to use, extend and sustain. The authors propose a framework for designing sensor-based health monitoring systems aiming to provide extensible and usable monitoring services in the scope of pervasive patient care. The authors’ approach relies on a distributed system for monitoring the patient health status anytime-anywhere and detecting potential health complications, for which healthcare professionals and patients are notified accordingly. Portable or wearable sensing devices measure the patient's physiological parameters, a smart mobile device collects and analyses the sensor data, a Medical Center system receives notifications on the detected health condition, and a Health Professional Platform is used by formal caregivers in order to review the patient condition and configure monitoring schemas. A Service-oriented architecture is utilised to provide extensible functional components and interoperable interactions among the diversified system components. The framework was applied within the REMOTE ambient-assisted living project in which a prototype system was developed, utilising Bluetooth to communicate with the sensors and Web services for data exchange. A scenario of using the REMOTE system and preliminary usability results show the applicability, usefulness and virtue of our approach. PMID:27733920
Ma, JiaLi; Zhang, TanTan; Dong, MingChui
2015-05-01
This paper presents a novel electrocardiogram (ECG) compression method for e-health applications by adapting an adaptive Fourier decomposition (AFD) algorithm hybridized with a symbol substitution (SS) technique. The compression consists of two stages: first stage AFD executes efficient lossy compression with high fidelity; second stage SS performs lossless compression enhancement and built-in data encryption, which is pivotal for e-health. Validated with 48 ECG records from MIT-BIH arrhythmia benchmark database, the proposed method achieves averaged compression ratio (CR) of 17.6-44.5 and percentage root mean square difference (PRD) of 0.8-2.0% with a highly linear and robust PRD-CR relationship, pushing forward the compression performance to an unexploited region. As such, this paper provides an attractive candidate of ECG compression method for pervasive e-health applications.
Review of battery powered embedded systems design for mission-critical low-power applications
NASA Astrophysics Data System (ADS)
Malewski, Matthew; Cowell, David M. J.; Freear, Steven
2018-06-01
The applications and uses of embedded systems is increasingly pervasive. Mission and safety critical systems relying on embedded systems pose specific challenges. Embedded systems is a multi-disciplinary domain, involving both hardware and software. Systems need to be designed in a holistic manner so that they are able to provide the desired reliability and minimise unnecessary complexity. The large problem landscape means that there is no one solution that fits all applications of embedded systems. With the primary focus of these mission and safety critical systems being functionality and reliability, there can be conflicts with business needs, and this can introduce pressures to reduce cost at the expense of reliability and functionality. This paper examines the challenges faced by battery powered systems, and then explores at more general problems, and several real-world embedded systems.
Pervasive Muslim-Hindu fertility differences in India.
Dharmalingam, A; Morgan, S Philip
2004-08-01
Using the 1993 Indian Family and Health Survey, we examined Muslim-Hindu differences in (1) the parity-specific intent to have another child and (2) given a stated intent for no more children, reports of the current use of contraceptives. We found that Muslims are much more likely than Hindus to intend to have additional children and, among those who do not want more children, Muslims are much less likely than Hindus to use contraceptives. These findings are robust to model specification and pervasive across the states of India. This national study provides the context within which local studies should be enmeshed and begs for general (as opposed to place-specific) explanations for these pervasive differences.
Modeling the Space Radiation Environment
NASA Technical Reports Server (NTRS)
Xapsos, Michael A.
2006-01-01
There has been a renaissance of interest in space radiation environment modeling. This has been fueled by the growing need to replace long time standard AP-9 and AE-8 trapped particle models, the interplanetary exploration initiative, the modern satellite instrumentation that has led to unprecedented measurement accuracy, and the pervasive use of Commercial off the Shelf (COTS) microelectronics that require more accurate predictive capabilities. The objective of this viewgraph presentation was to provide basic understanding of the components of the space radiation environment and their variations, review traditional radiation effects application models, and present recent developments.
ERIC Educational Resources Information Center
Rahimi, Regina; Liston, Delores D.
2012-01-01
"Pervasive Vulnerabilities" explores the beliefs, attitudes, and behaviors of adolescent girls and boys and female teachers in order to expose the continuing persistence of sexual harassment in the United States. The book addresses the sexual double standard that continues to hold girls and women accountable for male sexual aggression, and…
Mental Development and Autistic Behavior in Children with Pervasive Developmental Disorders
ERIC Educational Resources Information Center
Suzuki, Mayo
2011-01-01
The aim of this study was to clarify the features of mental development and autistic behavior in children with pervasive developmental disorders (PDD) from the viewpoint of remedial therapy. The Tokyo Child Development Schedule (TCDS) and the Tokyo Autistic Behavior Scale (TABS), designed to be completed by children's caregivers, were used. A…
Housing Honors. National Collegiate Honors Council Monograph Series
ERIC Educational Resources Information Center
Frost, Linda, Ed.; Kay, Lisa W., Ed.; Poe, Rachael, Ed.
2015-01-01
Honors administrators spend much of their time explaining and describing what honors is and does. When they talk about what honors looks like nationally, they should have answers to the following important questions: How pervasive is the model of separate honors facilities?; How pervasive are the legendary closets that honors programs have so…
Quality of Life of Adults with Pervasive Developmental Disorders and Intellectual Disabilities
ERIC Educational Resources Information Center
Gerber, F.; Baud, M. A.; Giroud, M.; Carminati, G. Galli
2008-01-01
The purpose of this study was to observe quality of life (QoL) and global evolution of persons with Pervasive Developmental Disorders (PDD) in three different groups. Individualized programs for PDD were compared to traditional programs for intellectual disabilities. Behavioural disorders were repeatedly evaluated using the Aberrant Behaviour…
ERIC Educational Resources Information Center
Kamio, Yoko; Wolf, Julie; Fein, Deborah
2006-01-01
This study examined automatic processing of emotional faces in individuals with high-functioning Pervasive Developmental Disorders (HFPDD) using an affective priming paradigm. Sixteen participants (HFPDD and matched controls) were presented with happy faces, fearful faces or objects in both subliminal and supraliminal exposure conditions, followed…
Pervasive Developmental Disorder: Client-Centered Approach. A Guide for Parents and Teachers.
ERIC Educational Resources Information Center
Stewart, Bonnie C.
This guide to pervasive developmental disorder (PDD) or autistic spectrum disorder (ASD) first provides a review of the literature on defining characteristics of PDD/ASD, causes of PDD, and diagnosis of PDD. Review of intervention and treatment comprises the major portion of the paper. After briefly considering parent education, this section…
Processing Capacity in Children and Adolescents with Pervasive Developmental Disorders
ERIC Educational Resources Information Center
Hoeksma, Marco R.; Kemner, Chantal; Verbaten, Marinus N.; van Engeland, Herman
2004-01-01
This study sought to investigate whether the abnormally small P3 amplitudes observed in pervasive developmental disorder (PDD) are related to differences in processing capacity. PDD children and adolescents and their control groups participated in the study. Visual probe stimuli were presented during an auditory task with two levels of difficulty.…
ERIC Educational Resources Information Center
Koenig, Kathleen; White, Susan Williams; Pachler, Maryellen; Lau, Monika; Lewis, Moira; Klin, Ami; Scahill, Lawrence
2010-01-01
A randomized controlled design was employed to evaluate a social skills intervention for children with pervasive developmental disorders. Aims included evaluating the acceptability of the program and gathering preliminary evidence on efficacy. Forty-four children, ages 8-11 years, were randomly assigned to treatment or wait list. Treatment…
A SCORM Compliant Courseware Authoring Tool for Supporting Pervasive Learning
ERIC Educational Resources Information Center
Wang, Te-Hua; Chang, Flora Chia-I
2007-01-01
The sharable content object reference model (SCORM) includes a representation of distance learning contents and a behavior definition of how users should interact with the contents. Generally, SCORMcompliant systems were based on multimedia and Web technologies on PCs. We further build a pervasive learning environment, which allows users to read…
ERIC Educational Resources Information Center
Levine, Karen
This information booklet is designed for parents who have a child who has been diagnosed with Pervasive Developmental Disorder (PDD) or Asperger's Disorder. It provides information on: (1) the definition of PDD; (2) the five subtypes of PDD, including PDD "not otherwise specified," Asperger's disorder, autistic disorder, childhood…
Brief Report: Prevalence of Pervasive Developmental Disorder in Brazil--A Pilot Study
ERIC Educational Resources Information Center
Paula, Cristiane S.; Ribeiro, Sabrina H.; Fombonne, Eric; Mercadante, Marcos T.
2011-01-01
This pilot study presents preliminary results concerning the prevalence of Pervasive Developmental Disorder (PDD) in South America. It was a three-phase study conducted in a typical town in Southeast Brazil. Case definition was based in a combination of standardized instruments and clinical evaluations by experts. The prevalence of PDD was…
ERIC Educational Resources Information Center
Lifter, Karin; Ellis, James; Cannon, Barbara; Anderson, Stephen R.
2005-01-01
Developmentally specific play programs were designed for three children with pervasive developmental disorders being served in a home-based program. Using the Developmental Play Assessment, six activities for each of three adjacent developmentally sequenced play categories were targeted for direct instruction using different toy sets. A modified…
Parent Perceptions of Time Spent Meaningfully by Young Adults with Pervasive Support Needs
ERIC Educational Resources Information Center
Rossetti, Zachary; Lehr, Donna; Lederer, Leslie; Pelerin, Dana; Huang, Shuoxi
2015-01-01
This article describes a qualitative study that examined how 23 young adults with pervasive support needs and limited functional communication spent their time and how their parents (n = 23) and direct support professionals (DSPs; n = 2) defined meaningfulness in relation to the young adults' experiences. Data were collected through…
Sleep Correlates of Pervasive Developmental Disorders: A Review of the Literature
ERIC Educational Resources Information Center
Hollway, Jill A.; Aman, Michael G.
2011-01-01
Sleep disturbance is a significant problem in the general pediatric population, and it occurs even more frequently in children with pervasive developmental disorders (PDDs). Much time and energy have been spent examining the characteristics that predispose children to insomnia and it is likely that equivalent factors influence sleep in PDDs.…
Prevalence of Pervasive Developmental Disorders in Two Canadian Provinces
ERIC Educational Resources Information Center
Ouellette-Kuntz, Helene; Coo, Helen; Yu, C. T.; Chudley, Albert E.; Noonan, Andrea; Breitenbach, Marlene; Ramji, Nasreen; Prosick, Talia; Bedard, Angela; Holden, Jeanette J. A.
2006-01-01
Although it is generally accepted that the proportion of children diagnosed with pervasive developmental disorders (PDDs) has increased in the past two decades, there is no consensus on the prevalence of these conditions. The accompanying large rise in demand for services, together with uncertainty regarding the extent to which the observed…
Injury Treatment among Children with Autism or Pervasive Developmental Disorder
ERIC Educational Resources Information Center
McDermott, Suzanne; Zhou, Li; Mann, Joshua
2008-01-01
This study examined the differences in the frequency and type of injury for children with autism and pervasive developmental disorder (PDD) compared with typically developing peers, when both groups are insured by Medicaid. The relative rate (RR) of emergency/hospital treatment of injury for children with autism or PDD compared to controls was…
ERIC Educational Resources Information Center
Doyle, Robert L.; Frazier, Jean; Spencer, Thomas J.; Geller, Daniel; Biederman, Joseph; Wilens, Timothy
2006-01-01
Background: Recent studies reported ADHD-like symptoms and cognitive deficits in pervasive developmental disorder (PDD). Because work in dementia documents improvement in executive function deficits with the acetylcholinesterase inhibitor donepezil, the authors reason that similar benefits could be obtained in PDD. Method: The authors describe…
Targeting Social Skills Deficits in an Adolescent with Pervasive Developmental Disorder
ERIC Educational Resources Information Center
Hagopian, Louis P.; Kuhn, David E.; Strother, Geri E.
2009-01-01
Social skills deficits are a defining feature of individuals diagnosed with autism and other pervasive developmental disorders (PDD), which can impair functioning and put the individual at higher risk for developing problem behavior (e.g., self-injury, aggression). In the current study, an adolescent with PDD displayed inappropriate social…
Child Maltreatment and Gender Interactions as Predictors of Differential Neuroendocrine Profiles
Doom, Jenalee R.; Cicchetti, Dante; Rogosch, Fred A.; Dackis, Melissa N.
2013-01-01
Summary Child maltreatment is a potent stressor associated with neuroendocrine dysregulation and increased risk for mental and physical disorders throughout the lifespan. Gender differences in stress reactivity and adult psychopathology prevalence may be related to sex-specific responsivity to stress. The purpose of this study is to examine whether gender interacts with the stress of maltreatment to produce differential neuroendocrine profiles in children. Participants included 137 maltreated and 110 nonmaltreated low-income, racially and ethnically diverse children (range: 7.9–10.9 years; M= 9.42 years; 52% male) who attended a summer research day camp. Saliva was collected 3 times across the day for 5 days for cortisol and dehydroepiandosterone (DHEA) analysis. Department of Human Services records were examined to determine the type, severity, chronicity, onset, and recency of maltreatment for children in the maltreated group. Significant interactions between gender and maltreatment pervasiveness predicted diurnal cortisol, DHEA, and cortisol/DHEA ratio levels. Elevated daily cortisol levels were reported for boys compared to girls in the group with more pervasive maltreatment. Boys with less pervasive maltreatment had lower DHEA and higher cortisol/DHEA ratio levels than girls with similar experiences, nonmaltreated boys, and boys with more pervasive maltreatment. Further results are consistent with down-regulation of cortisol production in girls with more pervasive maltreatment and girls who experienced maltreatment that was early onset and not recent. The effectiveness of interventions for maltreated children may be improved with greater knowledge of how maltreatment differentially affects neuroendocrine regulation by gender. PMID:23333253
Sun, Yi; Wen, Qiaoyan; Zhang, Yudong; Li, Wenmin
2014-01-01
With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients' health information and doctors' diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions.
Wen, Qiaoyan; Zhang, Yudong; Li, Wenmin
2014-01-01
With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients' health information and doctors' diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions. PMID:25126107
Intestinal cytokines in children with pervasive developmental disorders.
DeFelice, Magee L; Ruchelli, Eduardo D; Markowitz, Jonathan E; Strogatz, Melissa; Reddy, Krishna P; Kadivar, Khadijeh; Mulberg, Andrew E; Brown, Kurt A
2003-08-01
A relationship between autism and gastrointestinal (GI) immune dysregulation has been postulated based on incidence of GI complaints as well as macroscopically observed lymphonodular hyperplasia and microscopically determined enterocolitis in pediatric patients with autism. To evaluate GI immunity, we quantitatively assessed levels of proinflammatory cytokines, interleukin (IL)-6, IL-8, and IL-1beta, produced by intestinal biopsies of children with pervasive developmental disorders. Fifteen patients, six with pervasive developmental disorders and nine age-matched controls, presenting for diagnostic colonoscopy were enrolled. Endoscopic biopsies were organ cultured, supernatants were harvested, and IL-6, IL-8, and IL-1beta levels were quantified by ELISA. Tissue histology was evaluated by blinded pathologists. Concentrations of IL-6 from intestinal organ culture supernatants of patients with pervasive developmental disorders (median 318.5 pg/ml, interquartile range 282.0-393.0 pg/ml) when compared with controls (median 436.9 pg/ml, interquartile range 312.6-602.5 pg/ml) were not significantly different (p = 0.0987). Concentrations of IL-8 (median 84,000 pg/ml, interquartile range 16,000-143,000 pg/ml) when compared with controls (median 177,000 pg/ml, interquartile range 114,000-244,000 pg/ml) were not significantly different (p = 0.0707). Concentrations of IL-1beta (median 0.0 pg/ml, interquartile range 0.0-94.7 pg/ml) when compared with controls (median 0.0 pg/ml, interquartile range 0.0-60.2 pg/ml) were not significantly different (p = 0.8826). Tissue histology was nonpathological for all patients. We have demonstrated no significant difference in production of IL-6, IL-8, and IL-1beta between patients with pervasive developmental disorders and age-matched controls. In general, intestinal levels of IL-6 and IL-8 were lower in patients with pervasive developmental disorders than in age-matched controls. These data fail to support an association between autism and GI inflammation.
Koldijk, Saskia; Kraaij, Wessel
2016-01-01
Background Stress in office environments is a big concern, often leading to burn-out. New technologies are emerging, such as easily available sensors, contextual reasoning, and electronic coaching (e-coaching) apps. In the Smart Reasoning for Well-being at Home and at Work (SWELL) project, we explore the potential of using such new pervasive technologies to provide support for the self-management of well-being, with a focus on individuals' stress-coping. Ideally, these new pervasive systems should be grounded in existing work stress and intervention theory. However, there is a large diversity of theories and they hardly provide explicit directions for technology design. Objective The aim of this paper is to present a comprehensive and concise framework that can be used to design pervasive technologies that support knowledge workers to decrease stress. Methods Based on a literature study we identify concepts relevant to well-being at work and select different work stress models to find causes of work stress that can be addressed. From a technical perspective, we then describe how sensors can be used to infer stress and the context in which it appears, and use intervention theory to further specify interventions that can be provided by means of pervasive technology. Results The resulting general framework relates several relevant theories: we relate “engagement and burn-out” to “stress”, and describe how relevant aspects can be quantified by means of sensors. We also outline underlying causes of work stress and how these can be addressed with interventions, in particular utilizing new technologies integrating behavioral change theory. Based upon this framework we were able to derive requirements for our case study, the pervasive SWELL system, and we implemented two prototypes. Small-scale user studies proved the value of the derived technology-supported interventions. Conclusions The presented framework can be used to systematically develop theory-based technology-supported interventions to address work stress. In the area of pervasive systems for well-being, we identified the following six key research challenges and opportunities: (1) performing multi-disciplinary research, (2) interpreting personal sensor data, (3) relating measurable aspects to burn-out, (4) combining strengths of human and technology, (5) privacy, and (6) ethics. PMID:27380749
A Bayesian method for assessing multiscalespecies-habitat relationships
Stuber, Erica F.; Gruber, Lutz F.; Fontaine, Joseph J.
2017-01-01
ContextScientists face several theoretical and methodological challenges in appropriately describing fundamental wildlife-habitat relationships in models. The spatial scales of habitat relationships are often unknown, and are expected to follow a multi-scale hierarchy. Typical frequentist or information theoretic approaches often suffer under collinearity in multi-scale studies, fail to converge when models are complex or represent an intractable computational burden when candidate model sets are large.ObjectivesOur objective was to implement an automated, Bayesian method for inference on the spatial scales of habitat variables that best predict animal abundance.MethodsWe introduce Bayesian latent indicator scale selection (BLISS), a Bayesian method to select spatial scales of predictors using latent scale indicator variables that are estimated with reversible-jump Markov chain Monte Carlo sampling. BLISS does not suffer from collinearity, and substantially reduces computation time of studies. We present a simulation study to validate our method and apply our method to a case-study of land cover predictors for ring-necked pheasant (Phasianus colchicus) abundance in Nebraska, USA.ResultsOur method returns accurate descriptions of the explanatory power of multiple spatial scales, and unbiased and precise parameter estimates under commonly encountered data limitations including spatial scale autocorrelation, effect size, and sample size. BLISS outperforms commonly used model selection methods including stepwise and AIC, and reduces runtime by 90%.ConclusionsGiven the pervasiveness of scale-dependency in ecology, and the implications of mismatches between the scales of analyses and ecological processes, identifying the spatial scales over which species are integrating habitat information is an important step in understanding species-habitat relationships. BLISS is a widely applicable method for identifying important spatial scales, propagating scale uncertainty, and testing hypotheses of scaling relationships.
Affective e-Learning: Using "Emotional" Data to Improve Learning in Pervasive Learning Environment
ERIC Educational Resources Information Center
Shen, Liping; Wang, Minjuan; Shen, Ruimin
2009-01-01
Using emotion detection technologies from biophysical signals, this study explored how emotion evolves during learning process and how emotion feedback could be used to improve learning experiences. This article also described a cutting-edge pervasive e-Learning platform used in a Shanghai online college and proposed an affective e-Learning model,…
ERIC Educational Resources Information Center
Uono, Shota; Sato, Wataru; Toichi, Motomi
2013-01-01
This study was designed to identify specific difficulties and associated features related to the problems with social interaction experienced by individuals with pervasive developmental disorder-not otherwise specified (PDD-NOS) using an emotion-recognition task. We compared individuals with PDD-NOS or Asperger's disorder (ASP) and typically…
ERIC Educational Resources Information Center
Greaves-Lord, Kirstin; Eussen, Mart L. J. M.; Verhulst, Frank C.; Minderaa, Ruud B.; Mandy, William; Hudziak, James J.; Steenhuis, Mark Peter; de Nijs, Pieter F.; Hartman, Catharina A.
2013-01-01
This study aimed to contribute to the Diagnostic and Statistical Manual (DSM) debates on the conceptualization of autism by investigating (1) whether empirically based distinct phenotypic profiles could be distinguished within a sample of mainly cognitively able children with pervasive developmental disorder (PDD), and (2) how profiles related to…
ERIC Educational Resources Information Center
Keown, Louise J.; Woodward, Lianne J.
2006-01-01
This study compared the peer functioning of a community sample of preschool boys with pervasive hyperactivity (N=33) and comparison boys (N=34), and examined the extent to which any differences in peer functioning between these groups could be explained by comorbid child conduct problems and parenting factors. The quality of boys' peer relations…
Interventions for Children with Pervasive Developmental Disorders in Low and Middle Income Countries
ERIC Educational Resources Information Center
Hastings, Richard P.; Robertson, Janet; Yasamy, M. T.
2012-01-01
Background: Although interventions for children with pervasive developmental disorders (PDD) have been the focus of research effort and evidence reviews in many Western countries, this evidence has not been assessed in the context of low- and middle-income (LAMI) countries especially in terms of the fit with different cultures and resources.…
Regression of Language and Non-Language Skills in Pervasive Developmental Disorders
ERIC Educational Resources Information Center
Meilleur, A. -A. S.; Fombonne, E.
2009-01-01
Background: As part of the pervasive developmental disorders (PDD), there is a subgroup of individuals reported to have a different onset of symptom appearance consisting of an apparently normal early development, followed by a loss of verbal and/or non-verbal skills prior to 2 years of age. This study aims at comparing the symptomatology of…
ERIC Educational Resources Information Center
Cheng, Yufang; Huang, Ruowen
2012-01-01
The focus of this study is using data glove to practice Joint attention skill in virtual reality environment for people with pervasive developmental disorder (PDD). The virtual reality environment provides a safe environment for PDD people. Especially, when they made errors during practice in virtual reality environment, there is no suffering or…
ERIC Educational Resources Information Center
Arnone, Marilyn P.; Small, Ruth V.; Chauncey, Sarah A.; McKenna, H. Patricia
2011-01-01
This paper identifies the need for developing new ways to study curiosity in the context of today's pervasive technologies and unprecedented information access. Curiosity is defined in this paper in a way which incorporates the concomitant constructs of interest and engagement. A theoretical model for curiosity, interest and engagement in new…
New Research on Multitasking Points to Role of Self-Control
ERIC Educational Resources Information Center
Sparks, Sarah D.
2012-01-01
For a generation of children immersed in technology, emerging research suggests that while the temptation to multitask may be pervasive, the ability to control it could be the real bellwether of academic success. The pervasiveness of technology and social media, coupled with a fear of missing out on something important, has led students to pay…
ERIC Educational Resources Information Center
Scahill, Lawrence; McDougle, Christopher J.; Aman, Michael G.; Johnson, Cynthia; Handen, Benjamin; Bearss, Karen; Dziura, James; Butter, Eric; Swiezy, Naomi G.; Arnold, L. Eugene; Stigler, Kimberly A.; Sukhodolsky, Denis D.; Lecavalier, Luc; Pozdol, Stacie L.; Nikolov, Roumen; Hollway, Jill A.; Korzekwa, Patricia; Gavaletz, Allison; Kohn, Arlene E.; Koenig, Kathleen; Grinnon, Stacie; Mulick, James A.; Yu, Sunkyung; Vitiello, Benedetto
2012-01-01
Objective: Children with Pervasive Developmental Disorders (PDDs) have social interaction deficits, delayed communication, and repetitive behaviors as well as impairments in adaptive functioning. Many children actually show a decline in adaptive skills compared with age mates over time. Method: This 24-week, three-site, controlled clinical trial…
ERIC Educational Resources Information Center
Pierce-Jordan, Sandra; Lifter, Karin
2005-01-01
This study investigated the relationship between the social and play behaviors of young children with pervasive developmental disorder (PDD) and without PDD. Videotaped observations of 21 preschool children (12 with PDD and 9 without PDD) were examined independently for (a) social complexity and (b) play complexity that was assessed on an…
ERIC Educational Resources Information Center
Aman, Michael G.; McDougle, Christopher J.; Scahill, Lawrence; Handen, Benjamin; Arnold, L. Eugene; Johnson, Cynthia; Stigler, Kimberly A.; Bearss, Karen; Butter, Eric; Swiezy, Naomi B.; Sukhodolsky, Denis D.; Ramadan, Yaser; Pozdol, Stacie L.; Nikolov, Roumen; Lecavalier, Luc; Kohn, Arlene E.; Koenig, Kathleen; Hollway, Jill A.; Korzekwa, Patricia; Gavaletz, Allison; Mulick, James A.; Hall, Kristy L.; Dziura, James; Ritz, Louise; Trollinger, Stacie; Yu, Sunkyung; Vitiello, Benedetto; Wagner, Ann
2009-01-01
Objective: Many children with pervasive developmental disorders (PDDs) have serious, functionally impairing behavioral problems. We tested whether combined treatment (COMB) with risperidone and parent training (PT) in behavior management is superior to medication alone (MED) in improving severe behavioral problems in children with PDDs. Method:…
ERIC Educational Resources Information Center
Emck, Claudia; Bosscher, Ruud; Beek, Peter; Doreleijers, Theo
2009-01-01
Aims: Motor performance and self-perceived motor competence have a great impact on the psychosocial development of children in general. In this review, empirical studies of gross motor performance and self-perception of motor competence in children with emotional (depression and anxiety), behavioural, and pervasive developmental disorders are…
ERIC Educational Resources Information Center
Yetim, Nalan; Yetim, Unsal
2006-01-01
The primary purpose of this study was to determine whether cultural orientations which were pervasive and salient in the society of SMEs' entrepreneurs predict employees' job satisfaction. Paternalism, collectivism, individualism, power distance, uncertainty avoidance were assessed as pervasive and salient attributes for Turkish society. Data were…
ERIC Educational Resources Information Center
Akshoomoff, Natacha; Farid, Nikdokht; Courchesne, Eric; Haas, Richard
2007-01-01
This study examined the nature and frequency of neurological and EEG abnormalities in 60 young children (ages 2-6 years) with pervasive developmental disorders. A number of standard neurological functions could not be adequately assessed due to the young age of the children and/or limited comprehension and cooperation. The most common neurological…
ERIC Educational Resources Information Center
Magnee, Maurice J. C. M.; de Gelder, Beatrice; van Engeland, Herman; Kemner, Chantal
2007-01-01
Background: Despite extensive research, it is still debated whether impairments in social skills of individuals with pervasive developmental disorder (PDD) are related to specific deficits in the early processing of emotional information. We aimed to test both automatic processing of facial affect as well as the integration of auditory and visual…
Diagnostic Utility of the Pervasive Developmental Disorder Behavior Inventory
ERIC Educational Resources Information Center
Reel, Kristy H.; Lecavalier, Luc; Butter, Eric; Mulick, James A.
2012-01-01
This study assessed the diagnostic utility of the Pervasive Developmental Disorder Behavior Inventory (PDDBI) in a sample of 84 children aged 3-12 years of age. Forty-two children with ASD were individually matched on age and non-verbal IQ to 42 children with other disabilities and groups were compared on PDDBI subscales and total score. Results…
ERIC Educational Resources Information Center
Saban-Bezalel, Ronit; Mashal, Nira
2015-01-01
Previous studies on individuals with pervasive developmental disorders (PDD) have pointed to difficulties in comprehension of figurative language. Using the divided visual field paradigm, the present study examined hemispheric processing of idioms and irony in 23 adults with PDD and in 24 typically developing (TD) adults. The results show that…
ERIC Educational Resources Information Center
Demouy, Julie; Plaza, Monique; Xavier, Jean; Ringeval, Fabien; Chetouani, Mohamed; Perisse, Didier; Chauvin, Dominique; Viaux, Sylvie; Golse, Bernard; Cohen, David; Robel, Laurence
2011-01-01
Language impairment is a common core feature in Pervasive Developmental Disorders (PDD) and Specific Language Impairment (SLI). Many studies have tried to define the specific language profiles of these disorders, some claiming the existence of overlaps, and others conceiving of them as separate categories. Fewer have sought to determine whether…
ERIC Educational Resources Information Center
Kemner, C.; Schuller, A-M.; Van Engeland, H.
2006-01-01
Background: Children with pervasive developmental disorder (PDD) show behavioral abnormalities in gaze and face processing, but recent studies have indicated that normal activation of face-specific brain areas in response to faces is possible in this group. It is not clear whether the brain activity related to gaze processing is also normal in…
ERIC Educational Resources Information Center
Wertz, Jasmin; Zavos, Helena M. S.; Matthews, Timothy; Gray, Rebecca; Best-Lane, Janis; Pariante, Carmine M.; Moffitt, Terrie E.; Arseneault, Louise
2016-01-01
The aim of this study was to disentangle pervasive from situational antisocial behaviors using multiple informants, and to investigate their genetic and environmental etiologies in preadolescence and across time. Antisocial behaviors were assessed in 2,232 twins from the Environmental Risk (E-Risk) Longitudinal Twin Study at ages 5 and 12.…
ERIC Educational Resources Information Center
Vorgraft, Yitzchak; Farbstein, Ilana; Spiegel, Rene; Apter, Alan
2007-01-01
The objective of this preliminary study was to evaluate a novel intensive therapy program in young children with pervasive developmental disorder (PDD). Twenty-three children treated at the Mifne Institute in Israel between 1997 and 1999 were assessed. Videos taken before coming to Mifne and after intensive treatment at the institute and before…
Using Collaborative Learning Exercises to Transfer Pervasive Skills: Some South African Evidence
ERIC Educational Resources Information Center
Strauss-Keevy, Monique
2015-01-01
The Competency Framework, introduced by the South African Institute of Chartered Accountants (SAICA) details technical competencies, but also places emphasis on the pervasive skills that need to be attained by candidates for them to qualify as chartered accountants (CAs). Thus, an additional onus has been placed on academics to ensure that they…
Emerging CAE technologies and their role in Future Ambient Intelligence Environments
NASA Astrophysics Data System (ADS)
Noor, Ahmed K.
2011-03-01
Dramatic improvements are on the horizon in Computer Aided Engineering (CAE) and various simulation technologies. The improvements are due, in part, to the developments in a number of leading-edge technologies and their synergistic combinations/convergence. The technologies include ubiquitous, cloud, and petascale computing; ultra high-bandwidth networks, pervasive wireless communication; knowledge based engineering; networked immersive virtual environments and virtual worlds; novel human-computer interfaces; and powerful game engines and facilities. This paper describes the frontiers and emerging simulation technologies, and their role in the future virtual product creation and learning/training environments. The environments will be ambient intelligence environments, incorporating a synergistic combination of novel agent-supported visual simulations (with cognitive learning and understanding abilities); immersive 3D virtual world facilities; development chain management systems and facilities (incorporating a synergistic combination of intelligent engineering and management tools); nontraditional methods; intelligent, multimodal and human-like interfaces; and mobile wireless devices. The Virtual product creation environment will significantly enhance the productivity and will stimulate creativity and innovation in future global virtual collaborative enterprises. The facilities in the learning/training environment will provide timely, engaging, personalized/collaborative and tailored visual learning.
Khandaker, Mitu
2009-01-01
Autism spectrum disorders (ASD) are a group of developmental neuropsychiatric disorders, comprised of three diagnostic entities - autistic disorder (AD), Asperger's disorder (AS), and Pervasive Developmental Disorder Not Otherwise Specified (including atypical autism) (PDD-NOS). A number of intervention techniques are currently used to reduce some of the associated challenges, with techniques ranging from behavioral therapy to dietary interventions and traditional counseling. This positional paper proposes the use of video games which leverage affective computing technologies as intervention in autism spectrum disorders in the context of the use of traditional play therapy with adolescents, who may feel uncomfortable engaging in traditional play with toys they may be too old for. It aims to explore the potential for greater 'social physics' made possible by affective computing technologies. This involves computationally 'recognizing' emotions in a user, often through the use of multimodal affective sensors, including facial expressions, postural shifts, and physiological signals such as heart rate, skin conductivity, and EEG signals. However, it is suggested that this should be augmented by researching the effect of social game design mechanisms on social-emotional development, particularly for those who experience difficulty with social interaction.
Overlapping Community Detection based on Network Decomposition
NASA Astrophysics Data System (ADS)
Ding, Zhuanlian; Zhang, Xingyi; Sun, Dengdi; Luo, Bin
2016-04-01
Community detection in complex network has become a vital step to understand the structure and dynamics of networks in various fields. However, traditional node clustering and relatively new proposed link clustering methods have inherent drawbacks to discover overlapping communities. Node clustering is inadequate to capture the pervasive overlaps, while link clustering is often criticized due to the high computational cost and ambiguous definition of communities. So, overlapping community detection is still a formidable challenge. In this work, we propose a new overlapping community detection algorithm based on network decomposition, called NDOCD. Specifically, NDOCD iteratively splits the network by removing all links in derived link communities, which are identified by utilizing node clustering technique. The network decomposition contributes to reducing the computation time and noise link elimination conduces to improving the quality of obtained communities. Besides, we employ node clustering technique rather than link similarity measure to discover link communities, thus NDOCD avoids an ambiguous definition of community and becomes less time-consuming. We test our approach on both synthetic and real-world networks. Results demonstrate the superior performance of our approach both in computation time and accuracy compared to state-of-the-art algorithms.
NASA Astrophysics Data System (ADS)
Ha, Minsu; Nehm, Ross H.
2016-06-01
Automated computerized scoring systems (ACSSs) are being increasingly used to analyze text in many educational settings. Nevertheless, the impact of misspelled words (MSW) on scoring accuracy remains to be investigated in many domains, particularly jargon-rich disciplines such as the life sciences. Empirical studies confirm that MSW are a pervasive feature of human-generated text and that despite improvements, spell-check and auto-replace programs continue to be characterized by significant errors. Our study explored four research questions relating to MSW and text-based computer assessments: (1) Do English language learners (ELLs) produce equivalent magnitudes and types of spelling errors as non-ELLs? (2) To what degree do MSW impact concept-specific computer scoring rules? (3) What impact do MSW have on computer scoring accuracy? and (4) Are MSW more likely to impact false-positive or false-negative feedback to students? We found that although ELLs produced twice as many MSW as non-ELLs, MSW were relatively uncommon in our corpora. The MSW in the corpora were found to be important features of the computer scoring models. Although MSW did not significantly or meaningfully impact computer scoring efficacy across nine different computer scoring models, MSW had a greater impact on the scoring algorithms for naïve ideas than key concepts. Linguistic and concept redundancy in student responses explains the weak connection between MSW and scoring accuracy. Lastly, we found that MSW tend to have a greater impact on false-positive feedback. We discuss the implications of these findings for the development of next-generation science assessments.
NASA Astrophysics Data System (ADS)
Fukuda, Takeshi
The plasma control technique for use in large tokamak devices has made great developmental strides in the last decade, concomitantly with progress in the understanding of tokamak physics and in part facilitated by the substantial advancement in the computing environment. Equilibrium control procedures have thereby been established, and it has been pervasively recognized in recent years that the real-time feedback control of physical quantities is indispensable for the improvement and sustainment of plasma performance in a quasi-steady-state. Further development is presently undertaken to realize the “advanced plasma control” concept, where integrated fusion performance is achieved by the simultaneous feedback control of multiple physical quantities, combined with equilibrium control.
Cognition is … Fundamentally Cultural.
Bender, Andrea; Beller, Sieghard
2013-03-01
A prevailing concept of cognition in psychology is inspired by the computer metaphor. Its focus on mental states that are generated and altered by information input, processing, storage and transmission invites a disregard for the cultural dimension of cognition, based on three (implicit) assumptions: cognition is internal, processing can be distinguished from content, and processing is independent of cultural background. Arguing against each of these assumptions, we point out how culture may affect cognitive processes in various ways, drawing on instances from numerical cognition, ethnobiological reasoning, and theory of mind. Given the pervasive cultural modulation of cognition-on all of Marr's levels of description-we conclude that cognition is indeed fundamentally cultural, and that consideration of its cultural dimension is essential for a comprehensive understanding.
Learning Setting-Generalized Activity Models for Smart Spaces
Cook, Diane J.
2011-01-01
The data mining and pervasive computing technologies found in smart homes offer unprecedented opportunities for providing context-aware services, including health monitoring and assistance to individuals experiencing difficulties living independently at home. In order to provide these services, smart environment algorithms need to recognize and track activities that people normally perform as part of their daily routines. However, activity recognition has typically involved gathering and labeling large amounts of data in each setting to learn a model for activities in that setting. We hypothesize that generalized models can be learned for common activities that span multiple environment settings and resident types. We describe our approach to learning these models and demonstrate the approach using eleven CASAS datasets collected in seven environments. PMID:21461133
New Sociotechnical Insights in Interaction Design
NASA Astrophysics Data System (ADS)
Abdelnour-Nocera, José; Mørch, Anders I.
New challenges are facing interaction design. On one hand because of advances in technology - pervasive, ubiquitous, multimodal and adaptive computing - are changing the nature of interaction. On the other, web 2.0, massive multiplayer games and collaboration software extends the boundaries of HCI to deal with interaction in settings of remote communication and collaboration. The aim of this workshop is to provide a forum for HCI practitioners and researchers interested in knowledge from the social sciences to discuss how sociotechnical insights can be used to inform interaction design, and more generally how social science methods and theories can help to enrich the conceptual framework of systems development and participatory design. Position papers submissions are invited to address key aspects of current research and practical case studies.
Pervasive Developmental Disorders in Individuals with Cerebral Palsy
ERIC Educational Resources Information Center
Kilincaslan, Ayse; Mukaddes, Nahit Motavalli
2009-01-01
The aim of the present study was to describe the prevalence and associated factors of pervasive developmental disorders (PDD), including autistic disorder and PDD not otherwise specified (NOS), in a clinical sample of 126 children and adolescents (75 males, 51 females; age range 4-18y, mean 8y 8mo, SD 3y 8mo) with tetraplegic, hemiplegic,…
ERIC Educational Resources Information Center
Schurink, J.; Hartman, E.; Scherder, E. J. A.; Houwen, S.; Visscher, C.
2012-01-01
This study examines the motor skills and executive functioning (EF) of 28 children diagnosed with pervasive developmental disorder-not otherwise specified (PDD-NOS; mean age: 10 years 6 months, range: 7-12 years; 19 boys, 9 girls) in comparison with age- and gender-matched typically developing children. The potential relationship between motor…
The Art of Gamification; Teaching Sustainability and System Thinking by Pervasive Game Development
ERIC Educational Resources Information Center
Nordby, Anders; Øygardslia, Kristine; Sverdrup, Ulrik; Sverdrup, Harald
2016-01-01
In 2013 Hedmark University College conducted a research project where students from a game development project/study program developed and tested a Pervasive Game for learning as part of a class in System Thinking. The overall game goal was to teach Sustainability through System Thinking, and to give the students a real world experience with their…
ERIC Educational Resources Information Center
Viviers, Herman Albertus
2016-01-01
The primary objective of this article is to evaluate the design variables of a newly developed teaching intervention, "The Amazing Tax Race". It comprises a race against time in which accounting students participate within teams in multiple tax-related activities so that they are exposed to pervasive skills. The findings provide…
ERIC Educational Resources Information Center
Mulder, Erik J.; Anderson, George M.; Kema, Ido P.; De Bildt, Annelies; Van Lang, Natasja D.J.; Den Boer, Johan A.; Minderaa Ruud B.
2004-01-01
Objective: To investigate group differences, the within-group distributions, and the clinical correlates of platelet serotonin (5-HT) levels in pervasive developmental disorders (PDD). Method: Platelet 5-HT levels were measured in Dutch children and young adults, recruited from 2001 through 2003, with PDD (autism, Asperger's and PDD-not otherwise…
ERIC Educational Resources Information Center
Oeseburg, B.; Groothoff, J. W.; Dijkstra, G. J.; Reijneveld, S. A.; Jansen, D. E. M. C.
2010-01-01
Evidence on the association between somatic chronic diseases in ID-adolescents and the full range of pervasive developmental disorder behavior (PDD behavior) is scarce. The aim of the present study is to assess the association between somatic chronic diseases in ID-adolescents and mild PDD behavior. We obtained data on 1044 ID-adolescents, aged…
ERIC Educational Resources Information Center
Sukhodolsky, Denis G.; Scahill, Lawrence; Gadow, Kenneth D.; Arnold, L. Eugene; Aman, Michael G.; McDougle, Christopher J.; McCracken, James T.; Tierney, Elaine; White, Susan Williams; Lecavalier, Luc; Vitiello, Benedetto
2008-01-01
Background: In addition to the core symptoms, children with Pervasive Developmental Disorders (PDD) often exhibit other problem behaviors such as aggression, hyperactivity, and anxiety, which can contribute to overall impairment and, therefore, become the focus of clinical attention. Limited data are available on the prevalence of anxiety in these…
ERIC Educational Resources Information Center
Osa, Justina O.
2007-01-01
Racial diversity is one of the greatest strengths of America?s higher education system. But racial prejudice is entrenched and pervasive in many campuses of institutions of higher learning. A close observation reveals that racial prejudice is not restricted to any race. As much as one would like to believe that simply passing legislations and…
ERIC Educational Resources Information Center
Kuroda, Miho; Wakabayashi, Akio; Uchiyama, Tokio; Yoshida, Yuko; Koyama, Tomonori; Kamio, Yoko
2011-01-01
Deficits in understanding the mental state of others ("mind-reading") have been well documented in individuals with pervasive developmental disorders (PDD). However, it is unclear whether this deficit in social cognition differs between the subgroups of PDD defined by the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text…
The Pervasiveness of 1/f Scaling in Speech Reflects the Metastable Basis of Cognition
ERIC Educational Resources Information Center
Kello, Christopher T.; Anderson, Gregory G.; Holden, John G.; Van Orden, Guy C.
2008-01-01
Human neural and behavioral activities have been reported to exhibit fractal dynamics known as "1/f noise," which is more aptly named "1/f scaling." Some argue that 1/f scaling is a general and pervasive property of the dynamical substrate from which cognitive functions are formed. Others argue that it is an idiosyncratic property of…
ERIC Educational Resources Information Center
Paul, Rhea; Miles, Stephanie; Cicchetti, Domenic; Sparrow, Sara; Klin, Ami; Volkmar, Fred; Coflin, Megan; Booker, Shelley
2004-01-01
The purpose of this study is to provide a microanalysis of differences in adaptive functioning seen between well-matched groups of school-aged children with autism and those diagnosed as having Pervasive Developmental Disorder-Not Otherwise Specified, all of whom functioned in the mild to moderate range of intellectual impairment. Findings…
An Open-Label Trial of Escitalopram in Pervasive Developmental Disorders.
ERIC Educational Resources Information Center
Owley, Thomas; Walton, Laura; Salt, Jeff; Guter, Stephen J., Jr.; Winnega, Marrea; Leventhal, Bennett L.; Cook, Edwin H., Jr.
2005-01-01
Objective: To assess the effect of escitalopram in the treatment of pervasive developmental disorders (PDDs). Method: This 10-week study had a forced titration, open-label design. Twenty-eight subjects (mean age 125.1 [+ or -] 33.5 months) with a PDD received escitalopram at a dose that increased weekly to a maximum dose of 20 mg as tolerated. The…
ERIC Educational Resources Information Center
Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Buonocunto, Francesca; Sacco, Valentina; Colonna, Fabio; Navarro, Jorge; Lanzilotti, Crocifissa; Bosco, Andrea; Megna, Gianfranco; De Tommaso, Marina
2009-01-01
Post-coma persons in an apparent condition of vegetative state and pervasive motor impairment pose serious problems in terms of assessment and intervention options. A technology-based learning assessment procedure might serve for them as a diagnostic supplement with possible implications for rehabilitation intervention. The learning assessment…
ERIC Educational Resources Information Center
Brennan, Laura; Barton, Marianne; Chen, Chi-Ming; Green, James; Fein, Deborah
2015-01-01
Hierarchical cluster analyses were used to detect three subgroups in a sample of children with pervasive developmental disorder--not otherwise specified (PDD-NOS) evaluated at ages 2 and 4. At age 2, Cluster 1 demonstrated few autism symptoms and high cognitive scores; 60% no longer met criteria for PDD at 4. Cluster 2 exhibited more autism…
ERIC Educational Resources Information Center
Xavier, Jean; Vannetzel, Leonard; Viaux, Sylvie; Leroy, Arthur; Plaza, Monique; Tordjman, Sylvie; Mille, Christian; Bursztejn, Claude; Cohen, David; Guile, Jean-Marc
2011-01-01
The Pervasive Developmental Disorder-Not Otherwise Specified (PDD-NOS) category is a psychopathological entity few have described and is poorly, and mainly negatively, defined by autism exclusion. In order to limit PDD-NOS heterogeneity, alternative clinical constructs have been developed. This study explored the reliability and the diagnostic…
ERIC Educational Resources Information Center
Hellings, Jessica A.; Cardona, Alicia M.; Schroeder, Stephen R.
2010-01-01
The objective of this study was to examine long-term adverse events of risperidone in 19 children, adolescents, and adults with Pervasive Developmental Disorders and intellectual disability, continuing risperidone for a mean of 186.5 weeks, following a 46-week risperidone study. Nineteen individuals continued long-term follow-up after our…
ERIC Educational Resources Information Center
Fernandez-Jaen, Alberto; Fernandez-Mayoralas, Daniel Martin; Calleja-Perez, Beatriz; Munoz-Jareno, Nuria; Campos Diaz, Maria del Rosario; Lopez-Arribas, Sonia
2013-01-01
Objective: Atomoxetine's tolerance and efficacy were studied in 24 patients with pervasive developmental disorder and symptoms of ADHD. Method: Prospective, open-label, 16-week study was performed, using the variables of the Clinical Global Impression Scale and the Conners' Scale, among others. Results: A significant difference was found between…
ERIC Educational Resources Information Center
Reichow, Brian; Volkmar, Fred R.; Bloch, Michael H.
2013-01-01
Many children with pervasive developmental disorders (PDD) exhibit behaviors and symptoms of attention-deficit/hyperactivity disorder (ADHD). We sought to determine the relative efficacy of medications for treating ADHD symptoms in children with PDD by identifying all double-blind, randomized, placebo-controlled trials examining the efficacy of…
ERIC Educational Resources Information Center
Ito, Hiroyuki; Tani, Iori; Yukihiro, Ryoji; Adachi, Jun; Hara, Koichi; Ogasawara, Megumi; Inoue, Masahiko; Kamio, Yoko; Nakamura, Kazuhiko; Uchiyama, Tokio; Ichikawa, Hironobu; Sugiyama, Toshiro; Hagiwara, Taku; Tsujii, Masatsugu
2012-01-01
The pervasive developmental disorders (PDDs) Autism Society Japan Rating Scale (PARS), an interview-based instrument for evaluating PDDs, has been developed in Japan with the aim of providing a method that (1) can be used to evaluate PDD symptoms and related support needs and (2) is simpler and easier than the currently used "gold…
Larger Brains in Medication Naive High-Functioning Subjects with Pervasive Developmental Disorder
ERIC Educational Resources Information Center
Palmen, Saskia J. M. C.; Pol, Hilleke E. Hulshoff; Kemner, Chantal; Schnack, Hugo G.; Janssen, Joost; Kahn, Rene S.; van Engeland, Herman
2004-01-01
Background: Are brain volumes of individuals with Pervasive Developmental Disorder (PDD) still enlarged in adolescence and adulthood, and if so, is this enlargement confined to the gray and/or the white matter and is it global or more prominent in specific brain regions. Methods: Brain MRI scans were made of 21 adolescents with PDD and 21 closely…
ERIC Educational Resources Information Center
Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Buonocunto, Francesca; Sacco, Valentina; Colonna, Fabio; Navarro, Jorge; Oliva, Doretta; Signorino, Mario; Megna, Gianfranco
2009-01-01
Intervention programs, based on learning principles and assistive technology, were assessed in two studies with two post-coma men with minimally conscious state and pervasive motor disabilities. Study I assessed a program that included (a) an optic microswitch, activated via double blinking, which allowed a man direct access to brief music…
ERIC Educational Resources Information Center
Davis, Allyson L.; Neece, Cameron L.
2017-01-01
Introduction: Studies have shown that parents of children with pervasive developmental disorders (PDD) exhibit higher levels of stress than parents of typically developing children or children with other types of developmental delays (DD). This relationship appears to be mediated by elevated levels of behavior problems observed in children with…
Indoor localization using magnetic fields
NASA Astrophysics Data System (ADS)
Pathapati Subbu, Kalyan Sasidhar
Indoor localization consists of locating oneself inside new buildings. GPS does not work indoors due to multipath reflection and signal blockage. WiFi based systems assume ubiquitous availability and infrastructure based systems require expensive installations, hence making indoor localization an open problem. This dissertation consists of solving the problem of indoor localization by thoroughly exploiting the indoor ambient magnetic fields comprising mainly of disturbances termed as anomalies in the Earth's magnetic field caused by pillars, doors and elevators in hallways which are ferromagnetic in nature. By observing uniqueness in magnetic signatures collected from different campus buildings, the work presents the identification of landmarks and guideposts from these signatures and further develops magnetic maps of buildings - all of which can be used to locate and navigate people indoors. To understand the reason behind these anomalies, first a comparison between the measured and model generated Earth's magnetic field is made, verifying the presence of a constant field without any disturbances. Then by modeling the magnetic field behavior of different pillars such as steel reinforced concrete, solid steel, and other structures like doors and elevators, the interaction of the Earth's field with the ferromagnetic fields is described thereby explaining the causes of the uniqueness in the signatures that comprise these disturbances. Next, by employing the dynamic time warping algorithm to account for time differences in signatures obtained from users walking at different speeds, an indoor localization application capable of classifying locations using the magnetic signatures is developed solely on the smart phone. The application required users to walk short distances of 3-6 m anywhere in hallway to be located with accuracies of 80-99%. The classification framework was further validated with over 90% accuracies using model generated magnetic signatures representing hallways with different kinds of pillars, doors and elevators. All in all, this dissertation contributes the following: 1) provides a framework for understanding the presence of ambient magnetic fields indoors and utilizing them to solve the indoor localization problem; 2) develops an application that is independent of the user and the smart phones and 3) requires no other infrastructure since it is deployed on a device that encapsulates the sensing, computing and inferring functionalities, thereby making it a novel contribution to the mobile and pervasive computing domain.
NASA Astrophysics Data System (ADS)
Irving, D. H.; Rasheed, M.; Hillman, C.; O'Doherty, N.
2012-12-01
Oilfield management is moving to a more operational footing with near-realtime seismic and sensor monitoring governing drilling, fluid injection and hydrocarbon extraction workflows within safety, productivity and profitability constraints. To date, the geoscientific analytical architectures employed are configured for large volumes of data, computational power or analytical latency and compromises in system design must be made to achieve all three aspects. These challenges are encapsulated by the phrase 'Big Data' which has been employed for over a decade in the IT industry to describe the challenges presented by data sets that are too large, volatile and diverse for existing computational architectures and paradigms. We present a data-centric architecture developed to support a geoscientific and geotechnical workflow whereby: ●scientific insight is continuously applied to fresh data ●insights and derived information are incorporated into engineering and operational decisions ●data governance and provenance are routine within a broader data management framework Strategic decision support systems in large infrastructure projects such as oilfields are typically relational data environments; data modelling is pervasive across analytical functions. However, subsurface data and models are typically non-relational (i.e. file-based) in the form of large volumes of seismic imaging data or rapid streams of sensor feeds and are analysed and interpreted using niche applications. The key architectural challenge is to move data and insight from a non-relational to a relational, or structured, data environment for faster and more integrated analytics. We describe how a blend of MapReduce and relational database technologies can be applied in geoscientific decision support, and the strengths and weaknesses of each in such an analytical ecosystem. In addition we discuss hybrid technologies that use aspects of both and translational technologies for moving data and analytics across these platforms. Moving to a data-centric architecture requires data management methodologies to be overhauled by default and we show how end-to-end data provenancing and dependency management is implicit in such an environment and how it benefits system administration as well as the user community. Whilst the architectural experiences are drawn from the oil industry, we believe that they are more broadly applicable in academic and government settings where large volumes of data are added to incrementally and require revisiting with low analytical latency and we suggest application to earthquake monitoring and remote sensing networks.
Key Lessons in Building "Data Commons": The Open Science Data Cloud Ecosystem
NASA Astrophysics Data System (ADS)
Patterson, M.; Grossman, R.; Heath, A.; Murphy, M.; Wells, W.
2015-12-01
Cloud computing technology has created a shift around data and data analysis by allowing researchers to push computation to data as opposed to having to pull data to an individual researcher's computer. Subsequently, cloud-based resources can provide unique opportunities to capture computing environments used both to access raw data in its original form and also to create analysis products which may be the source of data for tables and figures presented in research publications. Since 2008, the Open Cloud Consortium (OCC) has operated the Open Science Data Cloud (OSDC), which provides scientific researchers with computational resources for storing, sharing, and analyzing large (terabyte and petabyte-scale) scientific datasets. OSDC has provided compute and storage services to over 750 researchers in a wide variety of data intensive disciplines. Recently, internal users have logged about 2 million core hours each month. The OSDC also serves the research community by colocating these resources with access to nearly a petabyte of public scientific datasets in a variety of fields also accessible for download externally by the public. In our experience operating these resources, researchers are well served by "data commons," meaning cyberinfrastructure that colocates data archives, computing, and storage infrastructure and supports essential tools and services for working with scientific data. In addition to the OSDC public data commons, the OCC operates a data commons in collaboration with NASA and is developing a data commons for NOAA datasets. As cloud-based infrastructures for distributing and computing over data become more pervasive, we ask, "What does it mean to publish data in a data commons?" Here we present the OSDC perspective and discuss several services that are key in architecting data commons, including digital identifier services.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurt Derr; Milos Manic
Time and location data play a very significant role in a variety of factory automation scenarios, such as automated vehicles and robots, their navigation, tracking, and monitoring, to services of optimization and security. In addition, pervasive wireless capabilities combined with time and location information are enabling new applications in areas such as transportation systems, health care, elder care, military, emergency response, critical infrastructure, and law enforcement. A person/object in proximity to certain areas for specific durations of time may pose a risk hazard either to themselves, others, or the environment. This paper presents a novel fuzzy based spatio-temporal risk calculationmore » DSTiPE method that an object with wireless communications presents to the environment. The presented Matlab based application for fuzzy spatio-temporal risk cluster extraction is verified on a diagonal vehicle movement example.« less
NASA Astrophysics Data System (ADS)
Demidov, V. I.; Koepke, M. E.; Kurlyandskaya, I. P.; Malkov, M. A.
2018-02-01
This paper reviews existing theories for interpreting probe measurements of electron distribution functions (EDF) at high gas pressure when collisions of electrons with atoms and/or molecules near the probe are pervasive. An explanation of whether or not the measurements are realizable and reliable, an enumeration of the most common sources of measurement error, and an outline of proper probe-experiment design elements that inherently limit or avoid error is presented. Additionally, we describe recent expanded plasma-condition compatibility for EDF measurement, including in applications of large wall probe plasma diagnostics. This summary of the authors’ experiences gained over decades of practicing and developing probe diagnostics is intended to inform, guide, suggest, and detail the advantages and disadvantages of probe application in plasma research.
mlCAF: Multi-Level Cross-Domain Semantic Context Fusioning for Behavior Identification.
Razzaq, Muhammad Asif; Villalonga, Claudia; Lee, Sungyoung; Akhtar, Usman; Ali, Maqbool; Kim, Eun-Soo; Khattak, Asad Masood; Seung, Hyonwoo; Hur, Taeho; Bang, Jaehun; Kim, Dohyeong; Ali Khan, Wajahat
2017-10-24
The emerging research on automatic identification of user's contexts from the cross-domain environment in ubiquitous and pervasive computing systems has proved to be successful. Monitoring the diversified user's contexts and behaviors can help in controlling lifestyle associated to chronic diseases using context-aware applications. However, availability of cross-domain heterogeneous contexts provides a challenging opportunity for their fusion to obtain abstract information for further analysis. This work demonstrates extension of our previous work from a single domain (i.e., physical activity) to multiple domains (physical activity, nutrition and clinical) for context-awareness. We propose multi-level Context-aware Framework (mlCAF), which fuses the multi-level cross-domain contexts in order to arbitrate richer behavioral contexts. This work explicitly focuses on key challenges linked to multi-level context modeling, reasoning and fusioning based on the mlCAF open-source ontology. More specifically, it addresses the interpretation of contexts from three different domains, their fusioning conforming to richer contextual information. This paper contributes in terms of ontology evolution with additional domains, context definitions, rules and inclusion of semantic queries. For the framework evaluation, multi-level cross-domain contexts collected from 20 users were used to ascertain abstract contexts, which served as basis for behavior modeling and lifestyle identification. The experimental results indicate a context recognition average accuracy of around 92.65% for the collected cross-domain contexts.
Digital modulation and achievable information rates of thru-body haptic communications
NASA Astrophysics Data System (ADS)
Hanisch, Natalie; Pierobon, Massimiliano
2017-05-01
The ever increasing biocompatibility and pervasive nature of wearable and implantable devices demand novel sustainable solutions to realize their connectivity, which can impact broad application scenarios such as in the defense, biomedicine, and entertainment fields. Where wireless electromagnetic communications are facing challenges such as device miniaturization, energy scarcity, limited range, and possibility of interception, solutions not only inspired but also based on natural communication means might result into valid alternatives. In this paper, a communication paradigm where digital information is propagated through the nervous system is proposed and analyzed on the basis of achievable information rates. In particular, this paradigm is based on an analytical framework where the response of a system based on haptic (tactile) information transmission and ElectroEncephaloGraphy (EEG)-based reception is modeled and characterized. Computational neuroscience models of the somatosensory signal representation in the brain, coupled with models of the generation and propagation of somatosensory stimulation from skin mechanoreceptors, are employed in this paper to provide a proof-of-concept evaluation of achievable performance in encoding information bits into tactile stimulation, and decoding them from the recorded brain activity. Based on these models, the system is simulated and the resulting data are utilized to train a Support Vector Machine (SVM) classifier, which is finally used to provide a proof-of-concept validation of the system performance in terms of information rates against bit error probability at the reception.
mlCAF: Multi-Level Cross-Domain Semantic Context Fusioning for Behavior Identification
Villalonga, Claudia; Lee, Sungyoung; Akhtar, Usman; Ali, Maqbool; Kim, Eun-Soo; Khattak, Asad Masood; Seung, Hyonwoo; Hur, Taeho; Kim, Dohyeong; Ali Khan, Wajahat
2017-01-01
The emerging research on automatic identification of user’s contexts from the cross-domain environment in ubiquitous and pervasive computing systems has proved to be successful. Monitoring the diversified user’s contexts and behaviors can help in controlling lifestyle associated to chronic diseases using context-aware applications. However, availability of cross-domain heterogeneous contexts provides a challenging opportunity for their fusion to obtain abstract information for further analysis. This work demonstrates extension of our previous work from a single domain (i.e., physical activity) to multiple domains (physical activity, nutrition and clinical) for context-awareness. We propose multi-level Context-aware Framework (mlCAF), which fuses the multi-level cross-domain contexts in order to arbitrate richer behavioral contexts. This work explicitly focuses on key challenges linked to multi-level context modeling, reasoning and fusioning based on the mlCAF open-source ontology. More specifically, it addresses the interpretation of contexts from three different domains, their fusioning conforming to richer contextual information. This paper contributes in terms of ontology evolution with additional domains, context definitions, rules and inclusion of semantic queries. For the framework evaluation, multi-level cross-domain contexts collected from 20 users were used to ascertain abstract contexts, which served as basis for behavior modeling and lifestyle identification. The experimental results indicate a context recognition average accuracy of around 92.65% for the collected cross-domain contexts. PMID:29064459
Edoh, Thierry
2018-04-10
The risk of spreading diseases within (ad-hoc)crowds and the need to pervasively screen asymptomatic individuals to protect the population against emerging infectious diseases, request permanentcrowd surveillance., particularly in high-risk regions. Thecase of Ebola epidemic in West Africa in recent years has shown the need for pervasive screening. The trend today in diseases surveillance is consisting of epidemiological data collection about emerging infectious diseases using social media, wearable sensors systems, or mobile applications and data analysis. This approach presents various limitations. This paper proposes a novel approach for diseases monitoring and risk prevention of spreading infectious diseases. The proposed approach, aiming at overcoming the limitation of existing disease surveillance approaches, combines the hybrid crowdsensing paradigm with sensing individuals' bio-signals using optical sensors for monitoring any risks of spreading emerging infectious diseases in any (ad-hoc) crowds. A proof-of-concept has been performed using a drone armed with a cat s60 smartphone featuring a Forward Looking Infra-Red (FLIR) camera. According to the results of the conducted experiment, the concept has the potential to improve the conventional epidemiological data collection. The measurement is reliable, and the recorded data are valid. The measurement error rates are about 8%.
Response to 'pervasive sequence patents cover the entire human genome' - authors' reply.
Rosenfeld, Jeffrey; Mason, Christopher
2014-01-01
An author reply to the Letter to the Editor from Tu et al. regarding Pervasive sequence patents cover the entire human genome by J Rosenfeld and C Mason. Genome Med 2013, 5:27. See related Correspondence by Rosenfeld and Mason, http://genomemedicine.com/content/5/3/27, and related letter by Tu et al., http://genomemedicine.com/content/6/2/14.
ERIC Educational Resources Information Center
Kanai, Chieko; Tani, Masayuki; Hashimoto, Ryuichiro; Yamada, Takashi; Ota, Haruhisa; Watanabe, Hiromi; Iwanami, Akira; Kato, Nobumasa
2012-01-01
Little is known about the cognitive profiles of high-functioning Pervasive Developmental Disorders (PDD) in adults based on the Wechsler Intelligence Scale III (WAIS-III). We examined cognitive profiles of adults with no intellectual disability (IQ greater than 70), and in adults with Asperger's disorder (AS; n = 47), high-functioning autism (HFA;…
ERIC Educational Resources Information Center
Easterbrooks, S. R.; Handley, C. M.
2005-01-01
The broad term "pervasive developmental disorder" (PPD) describes a set of symptoms that occur along a continuum of severity; these symptoms are often referred to as "autism spectrum disorders" (ASDs). Little is known about the incidence and prevalence of ASDs among students who are deaf or hard of hearing (DHH). Teachers of DHH students, who must…
ERIC Educational Resources Information Center
Hur, Jung Won; Oh, Jaekyeon
2012-01-01
This study explored an initiative that created a pervasive learning environment in a middle school in South Korea and examined its impact on student academic achievement and learning engagement. Forty students received a laptop to use for class projects, online collaboration, and lesson reviews over a 3-year period. To measure the effect of laptop…
ERIC Educational Resources Information Center
Buitelaar, Jan K.; Van der Gaag, Rutger; Klin, Ami; Volkmar, Fred
1999-01-01
A study compared characteristics of individuals with mild retardation and clinically classified as autistic disorder (n=205), Pervasive Developmental Disorder Not Otherwise Specified (PDDNOS) (n=80), and other non-PDD disorders (n=174). Only a few items from the ICD-10 and DSM-IV discriminated the PDDNOS group from other disorders. Suggested…
Unger, J B; Cruz, T B; Schuster, D; Flora, J A; Johnson, C A
2001-01-01
Exposure to tobacco-related marketing has been implicated as one of the risk factors for tobacco use among adolescents. However, tobacco-related marketing exposure has been measured in different ways in different studies, including perceived pervasiveness, receptivity, recognition, recall, and affect. It is not known whether these measures represent one or more underlying constructs and how these underlying constructs are associated with adolescent smoking status. This study analyzed data from 5,870 eighth-grade students in California, collected in 1996-1997 as part of the Independent Evaluation of the California Tobacco Control, Prevention, and Education Program. An exploratory factor analysis of multiple measures of tobacco-related marketing exposure revealed four distinct factors: perceived pervasiveness of protobacco marketing, perceived pervasiveness of antitobacco marketing, recognition of specific anti-tobacco advertisements, and receptivity to protobacco marketing. Receptivity to pro-tobacco marketing showed the strongest association with smoking status; higher levels of receptivity were associated with higher levels of smoking. Two measures of exposure to anti-tobacco marketing (perceived pervasiveness of anti-tobacco marketing and recognition of specific anti-tobacco ads) were highest among established smokers and lowest among susceptible nonsmokers. The same pattern was evident for perceived pervasiveness of pro-tobacco marketing. Results suggest that exposure to tobacco-related marketing is a multidimensional construct, and each dimension may have a unique contribution to the process of smoking initiation. Because adolescents are exposed to numerous pro- and anti-tobacco messages, it is important to develop anti-tobacco media campaigns that can successfully counter pro-tobacco marketing efforts. Potential strategies include targeting the susceptible nonsmokers who are at high risk for smoking and developing messages to decrease receptivity.
Nicolas, Pierre; Repoila, Francis; Bardowski, Jacek; Aymerich, Stéphane
2017-01-01
In eukaryotes, RNA species originating from pervasive transcription are regulators of various cellular processes, from the expression of individual genes to the control of cellular development and oncogenesis. In prokaryotes, the function of pervasive transcription and its output on cell physiology is still unknown. Most bacteria possess termination factor Rho, which represses pervasive, mostly antisense, transcription. Here, we investigate the biological significance of Rho-controlled transcription in the Gram-positive model bacterium Bacillus subtilis. Rho inactivation strongly affected gene expression in B. subtilis, as assessed by transcriptome and proteome analysis of a rho–null mutant during exponential growth in rich medium. Subsequent physiological analyses demonstrated that a considerable part of Rho-controlled transcription is connected to balanced regulation of three mutually exclusive differentiation programs: cell motility, biofilm formation, and sporulation. In the absence of Rho, several up-regulated sense and antisense transcripts affect key structural and regulatory elements of these differentiation programs, thereby suppressing motility and biofilm formation and stimulating sporulation. We dissected how Rho is involved in the activity of the cell fate decision-making network, centered on the master regulator Spo0A. We also revealed a novel regulatory mechanism of Spo0A activation through Rho-dependent intragenic transcription termination of the protein kinase kinB gene. Altogether, our findings indicate that distinct Rho-controlled transcripts are functional and constitute a previously unknown built-in module for the control of cell differentiation in B. subtilis. In a broader context, our results highlight the recruitment of the termination factor Rho, for which the conserved biological role is probably to repress pervasive transcription, in highly integrated, bacterium-specific, regulatory networks. PMID:28723971