Sample records for pervasive computing devices

  1. Simple video format for mobile applications

    NASA Astrophysics Data System (ADS)

    Smith, John R.; Miao, Zhourong; Li, Chung-Sheng

    2000-04-01

    With the advent of pervasive computing, there is a growing demand for enabling multimedia applications on mobile devices. Large numbers of pervasive computing devices, such as personal digital assistants (PDAs), hand-held computer (HHC), smart phones, portable audio players, automotive computing devices, and wearable computers are gaining access to online information sources. However, the pervasive computing devices are often constrained along a number of dimensions, such as processing power, local storage, display size and depth, connectivity, and communication bandwidth, which makes it difficult to access rich image and video content. In this paper, we report on our initial efforts in designing a simple scalable video format with low-decoding and transcoding complexity for pervasive computing. The goal is to enable image and video access for mobile applications such as electronic catalog shopping, video conferencing, remote surveillance and video mail using pervasive computing devices.

  2. Building Efficient Wireless Infrastructures for Pervasive Computing Environments

    ERIC Educational Resources Information Center

    Sheng, Bo

    2010-01-01

    Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…

  3. Challenges in Securing the Interface Between the Cloud and Pervasive Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lagesse, Brent J

    2011-01-01

    Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources andmore » issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.« less

  4. Pervasive access to images and data--the use of computing grids and mobile/wireless devices across healthcare enterprises.

    PubMed

    Pohjonen, Hanna; Ross, Peeter; Blickman, Johan G; Kamman, Richard

    2007-01-01

    Emerging technologies are transforming the workflows in healthcare enterprises. Computing grids and handheld mobile/wireless devices are providing clinicians with enterprise-wide access to all patient data and analysis tools on a pervasive basis. In this paper, emerging technologies are presented that provide computing grids and streaming-based access to image and data management functions, and system architectures that enable pervasive computing on a cost-effective basis. Finally, the implications of such technologies are investigated regarding the positive impacts on clinical workflows.

  5. Middleware Architecture for Ambient Intelligence in the Networked Home

    NASA Astrophysics Data System (ADS)

    Georgantas, Nikolaos; Issarny, Valerie; Mokhtar, Sonia Ben; Bromberg, Yerom-David; Bianco, Sebastien; Thomson, Graham; Raverdy, Pierre-Guillaume; Urbieta, Aitor; Cardoso, Roberto Speicys

    With computing and communication capabilities now embedded in most physical objects of the surrounding environment and most users carrying wireless computing devices, the Ambient Intelligence (AmI) / pervasive computing vision [28] pioneered by Mark Weiser [32] is becoming a reality. Devices carried by nomadic users can seamlessly network with a variety of devices, both stationary and mobile, both nearby and remote, providing a wide range of functional capabilities, from base sensing and actuating to rich applications (e.g., smart spaces). This then allows the dynamic deployment of pervasive applications, which dynamically compose functional capabilities accessible in the pervasive network at the given time and place of an application request.

  6. A Secure Framework for Location Verification in Pervasive Computing

    NASA Astrophysics Data System (ADS)

    Liu, Dawei; Lee, Moon-Chuen; Wu, Dan

    The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.

  7. A Service-oriented Approach towards Context-aware Mobile Learning Management Systems

    DTIC Science & Technology

    2010-07-01

    towards a pervasive university. Keywords-context-aware computing, service-oriented archi- tecture, mobile computing, elearning , learn management sys- tem I...usage of device- specific features provide support for various ubiquitous and pervasive eLearning scenarios [2][3]. By knowing where the user currently...data from the mobile device towards a context-aware mobile LMS. II. BASIC CONCEPTS For a better understanding of the presented eLearning sce- narios

  8. From black box to toolbox: Outlining device functionality, engagement activities, and the pervasive information architecture of mHealth interventions.

    PubMed

    Danaher, Brian G; Brendryen, Håvar; Seeley, John R; Tyler, Milagra S; Woolley, Tim

    2015-03-01

    mHealth interventions that deliver content via mobile phones represent a burgeoning area of health behavior change. The current paper examines two themes that can inform the underlying design of mHealth interventions: (1) mobile device functionality, which represents the technological toolbox available to intervention developers; and (2) the pervasive information architecture of mHealth interventions, which determines how intervention content can be delivered concurrently using mobile phones, personal computers, and other devices. We posit that developers of mHealth interventions will be better able to achieve the promise of this burgeoning arena by leveraging the toolbox and functionality of mobile devices in order to engage participants and encourage meaningful behavior change within the context of a carefully designed pervasive information architecture.

  9. Mobility in hospital work: towards a pervasive computing hospital environment.

    PubMed

    Morán, Elisa B; Tentori, Monica; González, Víctor M; Favela, Jesus; Martínez-Garcia, Ana I

    2007-01-01

    Handheld computers are increasingly being used by hospital workers. With the integration of wireless networks into hospital information systems, handheld computers can provide the basis for a pervasive computing hospital environment; to develop this designers need empirical information to understand how hospital workers interact with information while moving around. To characterise the medical phenomena we report the results of a workplace study conducted in a hospital. We found that individuals spend about half of their time at their base location, where most of their interactions occur. On average, our informants spent 23% of their time performing information management tasks, followed by coordination (17.08%), clinical case assessment (15.35%) and direct patient care (12.6%). We discuss how our results offer insights for the design of pervasive computing technology, and directions for further research and development in this field such as transferring information between heterogeneous devices and integration of the physical and digital domains.

  10. Towards Situation Driven Mobile Tutoring System for Learning Languages and Communication Skills: Application to Users with Specific Needs

    ERIC Educational Resources Information Center

    Khemaja, Maha; Taamallah, Aroua

    2016-01-01

    Current advances in portable devices and wireless technologies had drastically impacted mobile and pervasive computing development and use. Nowadays, mobile and or pervasive applications, are increasingly being used to support users' everyday activities. These apps either distributed or standalone are characterized by the variability of the…

  11. Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way

    NASA Astrophysics Data System (ADS)

    Cui, Yank; Kobara, Kazukuni; Matsuura, Kanta; Imai, Hideki

    As pervasive computing technologies develop fast, the privacy protection becomes a crucial issue and needs to be coped with very carefully. Typically, it is difficult to efficiently identify and manage plenty of the low-cost pervasive devices like Radio Frequency Identification Devices (RFID), without leaking any privacy information. In particular, the attacker may not only eavesdrop the communication in a passive way, but also mount an active attack to ask queries adaptively, which is obviously more dangerous. Towards settling this problem, in this paper, we propose two lightweight authentication protocols which are privacy-preserving against active attack, in an asymmetric way. That asymmetric style with privacy-oriented simplification succeeds to reduce the load of low-cost devices and drastically decrease the computation cost for the management of server. This is because that, unlike the usual management of the identities, our approach does not require any synchronization nor exhaustive search in the database, which enjoys great convenience in case of a large-scale system. The protocols are based on a fast asymmetric encryption with specialized simplification and only one cryptographic hash function, which consequently assigns an easy work to pervasive devices. Besides, our results do not require the strong assumption of the random oracle.

  12. Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-based Services

    NASA Astrophysics Data System (ADS)

    Soppera, A.; Burbridge, T.

    During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists and science fiction writers. Today this subject has become of interest to business, government, and society. Governmental authorities exercise their power through the networked environment. Credit card databases maintain our credit history and decide whether we are allowed to rent a house or obtain a loan. Mobile telephones can locate us in real time so that we do not miss calls. Within another 10 years, all sorts of devices will be connected through the network. Our fridge, our food, together with our health information, may all be networked for the purpose of maintaining diet and well-being. The Internet will move from being an infrastructure to connect computers, to being an infrastructure to connect everything [2, 3].

  13. The Pathways to Enterprise Mobile Readiness: Analysis of Perceptions, Pressures, Preparedness, and Progression

    ERIC Educational Resources Information Center

    Johnson, James Nathaniel

    2013-01-01

    Ubiquitous computing is a near reality in both the private and public arena. Business and personal spaces are seeing a proliferation of mobile computing devices and pervasive computing technologies. This phenomenon is creating a unique set of challenges for organizational IT professionals, specifically in the numerous spillover effects of having…

  14. Collaborative Joins in a Pervasive Computing Environment

    DTIC Science & Technology

    2003-07-28

    the available resources of each device. For example, CQP allows a tourist to use her handheld device to ask for the closest cheapest laundromat that is...open, given her current location, time of the day and a price range. The protocol also allows the tourist to ask for the closest laundromat adjacent

  15. QR Codes in Higher Ed: Fad or Functional Tool?

    ERIC Educational Resources Information Center

    Gradel, Kathleen; Edson, Alden J.

    2013-01-01

    As higher education grapples with addressing the 21st century needs of learners, technology is a pervasive concern. Waters (2012) painted a picture of three historical "screens," namely the television screen, the computer monitor, and today's mobile device screen. As mobile devices become increasingly commonplace in the workplace and on the…

  16. Human computer confluence applied in healthcare and rehabilitation.

    PubMed

    Viaud-Delmon, Isabelle; Gaggioli, Andrea; Ferscha, Alois; Dunne, Stephen

    2012-01-01

    Human computer confluence (HCC) is an ambitious research program studying how the emerging symbiotic relation between humans and computing devices can enable radically new forms of sensing, perception, interaction, and understanding. It is an interdisciplinary field, bringing together researches from horizons as various as pervasive computing, bio-signals processing, neuroscience, electronics, robotics, virtual & augmented reality, and provides an amazing potential for applications in medicine and rehabilitation.

  17. Computing technology in the 1980's. [computers

    NASA Technical Reports Server (NTRS)

    Stone, H. S.

    1978-01-01

    Advances in computing technology have been led by consistently improving semiconductor technology. The semiconductor industry has turned out ever faster, smaller, and less expensive devices since transistorized computers were first introduced 20 years ago. For the next decade, there appear to be new advances possible, with the rate of introduction of improved devices at least equal to the historic trends. The implication of these projections is that computers will enter new markets and will truly be pervasive in business, home, and factory as their cost diminishes and their computational power expands to new levels. The computer industry as we know it today will be greatly altered in the next decade, primarily because the raw computer system will give way to computer-based turn-key information and control systems.

  18. Interface Architecture for Testing in Foreign Language Education

    ERIC Educational Resources Information Center

    Laborda, Jesus Garcia

    2009-01-01

    The implications of new learning environments have been far-reaching and pervasive (Plass, 1998), at least in the field of interface design both in traditional computer and mobile devices (Fallahkhair, Pemberton, & Griffiths, 2007). Given the current status of efficient models, educators need the unproven unification of interfaces and working…

  19. From Operating-System Correctness to Pervasively Verified Applications

    NASA Astrophysics Data System (ADS)

    Daum, Matthias; Schirmer, Norbert W.; Schmidt, Mareike

    Though program verification is known and has been used for decades, the verification of a complete computer system still remains a grand challenge. Part of this challenge is the interaction of application programs with the operating system, which is usually entrusted with retrieving input data from and transferring output data to peripheral devices. In this scenario, the correct operation of the applications inherently relies on operating-system correctness. Based on the formal correctness of our real-time operating system Olos, this paper describes an approach to pervasively verify applications running on top of the operating system.

  20. Integrating Digital and STEM Practices

    ERIC Educational Resources Information Center

    White, Tobin; Martin, Lee

    2012-01-01

    As mobile devices become increasingly pervasive among youth, the gap between students with and without access to personal computers at home may soon be replaced by a new digital divide: between one set of informal ways of using those tools that are familiar, personally meaningful, and relevant to their out-of-school lives, and another set of uses…

  1. Human-technology Integration

    NASA Astrophysics Data System (ADS)

    Mullen, Katharine M.

    Human-technology integration is the replacement of human parts and extension of human capabilities with engineered devices and substrates. Its result is hybrid biological-artificial systems. We discuss here four categories of products furthering human-technology integration: wearable computers, pervasive computing environments, engineered tissues and organs, and prosthetics, and introduce examples of currently realized systems in each category. We then note that realization of a completely artificial sytem via the path of human-technology integration presents the prospect of empirical confirmation of an aware artificially embodied system.

  2. Context-awareness in ubiquitous computing and the mobile devices

    NASA Astrophysics Data System (ADS)

    Akçit, Nuhcan; Tomur, Emrah; Karslıoǧlu, Mahmut Onur

    2015-06-01

    Mobile device use has vastly increased in the last few years. Many people use many mobile devices in their daily lives. Context-aware computing is the main feature of pervasive and ubiquitous computing. Context awareness is also an important topic that becomes more available with ubiquitous computing. As the sensors increase, the data collected via mobile device sensors and sensor networks do not have much value because of the difficulty in analysis and understanding the data. Context-aware computing helps us store contextual information and use or search it by mobile devices when we want to see or analyze it. Contextual data can be made more meaningful by context-aware processing. There are different types of data and context information that must be considered. By combining spatial and contextual data, we obtain more meaningful data based on the entities. Contextual data is any information that can be used to characterize the situation of the entity. The entity is a person, place, or object considered relevant to the interaction between the user and an application, including the users and the applications. Using contextual data and good integration to mobile devices adds great value to this data, and combining these with our other data sets will allow us to obtain more useful information and analysis.

  3. Applying mobile and pervasive computer technology to enhance coordination of work in a surgical ward.

    PubMed

    Hansen, Thomas Riisgaard; Bardram, Jakob E

    2007-01-01

    Collaboration, coordination, and communication are crucial in maintaining an efficient and smooth flow of work in an operating ward. This coordination, however, often comes at a high price in terms of unsuccessfully trying to get hold of people, disturbing telephone calls, looking for people, and unnecessary stress. To accommodate this situation and to increase the quality of work in operating wards, we have designed a set of pervasive computer systems which supports what we call context-mediated communication and awareness. These systems use large interactive displays, video streaming from key locations, tracking systems, and mobile devices to support social awareness and different types of communication modalities relevant to the current context. In this paper we report qualitative data from a one-year deployment of the system in a local hospital. Overall, this study shows that 75% of the participants strongly agreed that these systems had made their work easier.

  4. Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components.

    PubMed

    Fragopoulos, Anastasios; Gialelis, John; Serpanos, Dimitrios

    2009-01-01

    Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers.

  5. Envisioning future cognitive telerehabilitation technologies: a co-design process with clinicians.

    PubMed

    How, Tuck-Voon; Hwang, Amy S; Green, Robin E A; Mihailidis, Alex

    2017-04-01

    Purpose Cognitive telerehabilitation is the concept of delivering cognitive assessment, feedback, or therapeutic intervention at a distance through technology. With the increase of mobile devices, wearable sensors, and novel human-computer interfaces, new possibilities are emerging to expand the cognitive telerehabilitation paradigm. This research aims to: (1) explore design opportunities and considerations when applying emergent pervasive computing technologies to cognitive telerehabilitation and (2) develop a generative co-design process for use with rehabilitation clinicians. Methods We conducted a custom co-design process that used design cards, probes, and design sessions with traumatic brain injury (TBI) clinicians. All field notes and transcripts were analyzed qualitatively. Results Potential opportunities for TBI cognitive telerehabilitation exist in the areas of communication competency, executive functioning, emotional regulation, energy management, assessment, and skill training. Designers of TBI cognitive telerehabilitation technologies should consider how technologies are adapted to a patient's physical/cognitive/emotional state, their changing rehabilitation trajectory, and their surrounding life context (e.g. social considerations). Clinicians were receptive to our co-design approach. Conclusion Pervasive computing offers new opportunities for life-situated cognitive telerehabilitation. Convivial design methods, such as this co-design process, are a helpful way to explore new design opportunities and an important space for further methodological development. Implications for Rehabilitation Designers of rehabilitation technologies should consider how to extend current design methods in order to facilitate the creative contribution of rehabilitation stakeholders. This co-design approach enables a fuller participation from rehabilitation clinicians at the front-end of design. Pervasive computing has the potential to: extend the duration and intensity of cognitive telerehabilitation training (including the delivery of 'booster' sessions or maintenance therapies); provide assessment and treatment in the context of a traumatic brain injury (TBI) patient's everyday life (thereby enhancing generalization); and permit time-sensitive interventions. Long-term use of pervasive computing for TBI cognitive telerehabilitation should take into account a patient's changing recovery trajectory, their meaningful goals, and their journey from loss to redefinition.

  6. Scheduling of network access for feedback-based embedded systems

    NASA Astrophysics Data System (ADS)

    Liberatore, Vincenzo

    2002-07-01

    nd communication capabilities. Examples range from smart dust embedded in building materials to networks of appliances in the home. Embedded devices will be deployed in unprecedented numbers, will enable pervasive distributed computing, and will radically change the way people interact with the surrounding environment [EGH00a]. The paper targets embedded systems and their real-time (RT) communication requirements. RT requirements arise from the

  7. Applying Utility Functions to Adaptation Planning for Home Automation Applications

    NASA Astrophysics Data System (ADS)

    Bratskas, Pyrros; Paspallis, Nearchos; Kakousis, Konstantinos; Papadopoulos, George A.

    A pervasive computing environment typically comprises multiple embedded devices that may interact together and with mobile users. These users are part of the environment, and they experience it through a variety of devices embedded in the environment. This perception involves technologies which may be heterogeneous, pervasive, and dynamic. Due to the highly dynamic properties of such environments, the software systems running on them have to face problems such as user mobility, service failures, or resource and goal changes which may happen in an unpredictable manner. To cope with these problems, such systems must be autonomous and self-managed. In this chapter we deal with a special kind of a ubiquitous environment, a smart home environment, and introduce a user-preference-based model for adaptation planning. The model, which dynamically forms a set of configuration plans for resources, reasons automatically and autonomously, based on utility functions, on which plan is likely to best achieve the user's goals with respect to resource availability and user needs.

  8. Using Multi-modal Sensing for Human Activity Modeling in the Real World

    NASA Astrophysics Data System (ADS)

    Harrison, Beverly L.; Consolvo, Sunny; Choudhury, Tanzeem

    Traditionally smart environments have been understood to represent those (often physical) spaces where computation is embedded into the users' surrounding infrastructure, buildings, homes, and workplaces. Users of this "smartness" move in and out of these spaces. Ambient intelligence assumes that users are automatically and seamlessly provided with context-aware, adaptive information, applications and even sensing - though this remains a significant challenge even when limited to these specialized, instrumented locales. Since not all environments are "smart" the experience is not a pervasive one; rather, users move between these intelligent islands of computationally enhanced space while we still aspire to achieve a more ideal anytime, anywhere experience. Two key technological trends are helping to bridge the gap between these smart environments and make the associated experience more persistent and pervasive. Smaller and more computationally sophisticated mobile devices allow sensing, communication, and services to be more directly and continuously experienced by user. Improved infrastructure and the availability of uninterrupted data streams, for instance location-based data, enable new services and applications to persist across environments.

  9. The impact of the pervasive information age on healthcare organizations.

    PubMed

    Landry, Brett J L; Mahesh, Sathi; Hartman, Sandra J

    2005-01-01

    New information technologies place data on integrated information systems, and provide access via pervasive computing technologies. Pervasive computing puts computing power in the hands of all employees, available wherever it is needed. Integrated systems offer seamless data and process integration over diverse information systems. In this paper we look at the impact of these technologies on healthcare organizations in the future.

  10. Wireless local area network security.

    PubMed

    Bergeron, Bryan P

    2004-01-01

    Wireless local area networks (WLANs) are increasingly popular in clinical settings because they facilitate the use of wireless PDAs, laptops, and other pervasive computing devices at the point of care. However, because of the relative immaturity of wireless network technology and evolving standards, WLANs, if improperly configured, can present significant security risks. Understanding the security limitations of the technology and available fixes can help minimize the risks of clinical data loss and maintain compliance with HIPAA guidelines.

  11. The Implications of Pervasive Computing on Network Design

    NASA Astrophysics Data System (ADS)

    Briscoe, R.

    Mark Weiser's late-1980s vision of an age of calm technology with pervasive computing disappearing into the fabric of the world [1] has been tempered by an industry-driven vision with more of a feel of conspicuous consumption. In the modified version, everyone carries around consumer electronics to provide natural, seamless interactions both with other people and with the information world, particularly for eCommerce, but still through a pervasive computing fabric.

  12. Mining Personal Data Using Smartphones and Wearable Devices: A Survey

    PubMed Central

    Rehman, Muhammad Habib ur; Liew, Chee Sun; Wah, Teh Ying; Shuja, Junaid; Daghighi, Babak

    2015-01-01

    The staggering growth in smartphone and wearable device use has led to a massive scale generation of personal (user-specific) data. To explore, analyze, and extract useful information and knowledge from the deluge of personal data, one has to leverage these devices as the data-mining platforms in ubiquitous, pervasive, and big data environments. This study presents the personal ecosystem where all computational resources, communication facilities, storage and knowledge management systems are available in user proximity. An extensive review on recent literature has been conducted and a detailed taxonomy is presented. The performance evaluation metrics and their empirical evidences are sorted out in this paper. Finally, we have highlighted some future research directions and potentially emerging application areas for personal data mining using smartphones and wearable devices. PMID:25688592

  13. Pervasive healthcare as a scientific discipline.

    PubMed

    Bardram, J E

    2008-01-01

    The OECD countries are facing a set of core challenges; an increasing elderly population; increasing number of chronic and lifestyle-related diseases; expanding scope of what medicine can do; and increasing lack of medical professionals. Pervasive healthcare asks how pervasive computing technology can be designed to meet these challenges. The objective of this paper is to discuss 'pervasive healthcare' as a research field and tries to establish how novel and distinct it is, compared to related work within biomedical engineering, medical informatics, and ubiquitous computing. The paper presents the research questions, approach, technologies, and methods of pervasive healthcare and discusses these in comparison to those of other related scientific disciplines. A set of central research themes are presented; monitoring and body sensor networks; pervasive assistive technologies; pervasive computing for hospitals; and preventive and persuasive technologies. Two projects illustrate the kind of research being done in pervasive healthcare. The first project is targeted at home-based monitoring of hypertension; the second project is designing context-aware technologies for hospitals. Both projects approach the healthcare challenges in a new way, apply a new type of research method, and come up with new kinds of technological solutions. 'Clinical proof-of-concept' is recommended as a new method for pervasive healthcare research; the method helps design and test pervasive healthcare technologies, and in ascertaining their clinical potential before large-scale clinical tests are needed. The paper concludes that pervasive healthcare as a research field and agenda is novel; it is addressing new emerging research questions, represents a novel approach, designs new types of technologies, and applies a new kind of research method.

  14. Plasma Equilibrium Control in Nuclear Fusion Devices 2. Plasma Control in Magnetic Confinement Devices 2.1 Plasma Control in Tokamaks

    NASA Astrophysics Data System (ADS)

    Fukuda, Takeshi

    The plasma control technique for use in large tokamak devices has made great developmental strides in the last decade, concomitantly with progress in the understanding of tokamak physics and in part facilitated by the substantial advancement in the computing environment. Equilibrium control procedures have thereby been established, and it has been pervasively recognized in recent years that the real-time feedback control of physical quantities is indispensable for the improvement and sustainment of plasma performance in a quasi-steady-state. Further development is presently undertaken to realize the “advanced plasma control” concept, where integrated fusion performance is achieved by the simultaneous feedback control of multiple physical quantities, combined with equilibrium control.

  15. Distributed Pervasive Worlds: The Case of Exergames

    ERIC Educational Resources Information Center

    Laine, Teemu H.; Sedano, Carolina Islas

    2015-01-01

    Pervasive worlds are computing environments where a virtual world converges with the physical world through context-aware technologies such as sensors. In pervasive worlds, technology is distributed among entities that may be distributed geographically. We explore the concept, possibilities, and challenges of distributed pervasive worlds in a case…

  16. Studying the Elusive Experience in Pervasive Games

    ERIC Educational Resources Information Center

    Stenros, Jaakko; Waern, Annika; Montola, Markus

    2012-01-01

    Studying pervasive games is inherently difficult and different from studying computer or board games. This article builds upon the experiences of staging and studying several playful pervasive technology prototypes. It discusses the challenges and pitfalls of evaluating pervasive game prototypes and charts methods that have proven useful in…

  17. Using OWL in a Pervasive Computing Broker

    DTIC Science & Technology

    2005-01-01

    carries or wears (e.g., cell phones , PDAs and headphones), services that are provided by de- vices in a room (e.g., projector service, light controller...ence of the users’ devices and clothing. As Alice enters the room, these sensors inform the R210 broker that a cell phone belonging to her is present and...the broker adds this fact in its knowledge base. As she sits, the agent on Alice’s Bluetooth enabled cell phone discovers R210’s broker and engages

  18. Students Develop Real-World Web and Pervasive Computing Systems.

    ERIC Educational Resources Information Center

    Tappert, Charles C.

    In the academic year 2001-2002, Pace University (New York) Computer Science and Information Systems (CSIS) students developed real-world Web and pervasive computing systems for actual customers. This paper describes the general use of team projects in CSIS at Pace University, the real-world projects from this academic year, the benefits of…

  19. Pervasive technology in Neonatal Intensive Care Unit: a prototype for newborns unobtrusive monitoring.

    PubMed

    Ciani, Oriana; Piccini, Luca; Parini, Sergio; Rullo, Alessia; Bagnoli, Franco; Marti, Patrizia; Andreoni, Giuseppe

    2008-01-01

    Pervasive computing research is introducing new perspectives in a wide range of applications, including healthcare domain. In this study we explore the possibility to realize a prototype of a system for unobtrusive recording and monitoring of multiple biological parameters on premature newborns hospitalized in the Neonatal Intensive Care Unit (NICU). It consists of three different units: a sensitized belt for Electrocardiogram (ECG) and chest dilatation monitoring, augmented with extrinsic transducers for temperature and respiratory activity measure, a device for signals pre-processing, sampling and transmission through Bluetooth(R) (BT) technology to a remote PC station and a software for data capture and post-processing. Preliminary results obtained by monitoring babies just discharged from the ward demonstrated the feasibility of the unobtrusive monitoring on this kind of subjects and open a new scenario for premature newborns monitoring and developmental cares practice in NICU.

  20. The mixed reality of things: emerging challenges for human-information interaction

    NASA Astrophysics Data System (ADS)

    Spicer, Ryan P.; Russell, Stephen M.; Rosenberg, Evan Suma

    2017-05-01

    Virtual and mixed reality technology has advanced tremendously over the past several years. This nascent medium has the potential to transform how people communicate over distance, train for unfamiliar tasks, operate in challenging environments, and how they visualize, interact, and make decisions based on complex data. At the same time, the marketplace has experienced a proliferation of network-connected devices and generalized sensors that are becoming increasingly accessible and ubiquitous. As the "Internet of Things" expands to encompass a predicted 50 billion connected devices by 2020, the volume and complexity of information generated in pervasive and virtualized environments will continue to grow exponentially. The convergence of these trends demands a theoretically grounded research agenda that can address emerging challenges for human-information interaction (HII). Virtual and mixed reality environments can provide controlled settings where HII phenomena can be observed and measured, new theories developed, and novel algorithms and interaction techniques evaluated. In this paper, we describe the intersection of pervasive computing with virtual and mixed reality, identify current research gaps and opportunities to advance the fundamental understanding of HII, and discuss implications for the design and development of cyber-human systems for both military and civilian use.

  1. Enterprise digital assistants: the progression of wireless clinical computing.

    PubMed

    Bergeron, Bryan P

    2002-01-01

    By virtue of increasingly pervasive wireless connectivity, the proliferation of wireless handheld devices in clinical care is rapidly transforming the concept of the personal digital assistant (PDA) to the enterprise digital assistant (EDA). Wireless handheld devices are becoming extensions of the central hospital information system, in which it's understood that the health care enterprise, not the clinician carrying the information-dispensing device, owns the data. The practical implication for clinicians is that, despite the potential long-term benefits of seamless, just-in-time clinical data access, this paradigm shift portends decreased efficiency in the short term, as clinicians duplicate clinical data collection on private devices. Assuming eventual clinician acceptance, EDAs can form the basis of a national real-time clinical data acquisition system that ensures uniform prescribing, decision support, and diagnosis, and the means for tracking unusual disease presentation patterns that could be indicative of bioterrorism or natural disease outbreaks.

  2. Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology

    PubMed Central

    Zao, John K.; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodríguez Méndez, Sergio José; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping

    2014-01-01

    EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system. PMID:24917804

  3. Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology.

    PubMed

    Zao, John K; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodríguez Méndez, Sergio José; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping

    2014-01-01

    EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system.

  4. What Students Want

    ERIC Educational Resources Information Center

    Schaffhauser, Dian

    2010-01-01

    Institutions already cater to the technology needs of students. According to the 2008 Campus Computing survey, 60 percent of colleges and universities offer pervasive or near-pervasive wireless; computers are as ubiquitous as water bottles; course management systems have become one-stop shops for class content; few classrooms lack projectors; and…

  5. Pervasive Computing and Communication Technologies for U-Learning

    ERIC Educational Resources Information Center

    Park, Young C.

    2014-01-01

    The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…

  6. Internet of things for an age-friendly healthcare.

    PubMed

    Konstantinidis, Evdokimos I; Bamparopoulos, Giorgos; Billis, Antonis; Bamidis, Panagiotis D

    2015-01-01

    In healthcare applications a large cohort of recent implementations utilises IoT-oriented infrastructures (XMPP) as well as smart mobile devices as communication gateways. IoT characteristi Communication/Connectivity, Pervasive Computing and Ambient Intelligence, are all highly related to Active and Healthy Aging environments. This paper presents a new idea, that of IoT enabled devices which are directly connected to the IoT (a glucose meter is used as an example herein), complying with the XMPP messaging protocol and the incorporation of a recently released Controller Application Communication (CAC) framework for distributed, cross-platform communication. A web based exergaming platform and a disease management tool, provide the vehicles for the demonstration of the feasibility and the successful implementation and integration of the aforementioned infrastructure.

  7. Diabetes City: How Urban Game Design Strategies Can Help Diabetics

    NASA Astrophysics Data System (ADS)

    Knöll, Martin

    Computer Games are about to leave their “electronic shells” and enter the city. So-called Serious Pervasive Games (SPGs) [1] allow for hybrid - simultaneously physical and virtual - experiences, applying technologies of ubiquitous computing, communication and “intelligent” interfaces. They begin to focus on non-entertaining purposes. The following article a) presents game design strategies as a missing link between pervasive computing, Ambient Intelligence and user’s everyday life. Therefore it spurs a discussion how Pervasive Healthcare focusing on the therapy and prevention of chronic diseases can benefit from urban game design strategies. b) Moreover the article presents the development and work in progress of “DiabetesCity“ - an educational game prototype for young diabetics.

  8. Developing Online Learning Resources: Big Data, Social Networks, and Cloud Computing to Support Pervasive Knowledge

    ERIC Educational Resources Information Center

    Anshari, Muhammad; Alas, Yabit; Guan, Lim Sei

    2016-01-01

    Utilizing online learning resources (OLR) from multi channels in learning activities promise extended benefits from traditional based learning-centred to a collaborative based learning-centred that emphasises pervasive learning anywhere and anytime. While compiling big data, cloud computing, and semantic web into OLR offer a broader spectrum of…

  9. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    NASA Astrophysics Data System (ADS)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  10. Towards pervasive computing in health care - a literature review.

    PubMed

    Orwat, Carsten; Graefe, Andreas; Faulwasser, Timm

    2008-06-19

    The evolving concepts of pervasive computing, ubiquitous computing and ambient intelligence are increasingly influencing health care and medicine. Summarizing published research, this literature review provides an overview of recent developments and implementations of pervasive computing systems in health care. It also highlights some of the experiences reported in deployment processes. There is no clear definition of pervasive computing in the current literature. Thus specific inclusion criteria for selecting articles about relevant systems were developed. Searches were conducted in four scientific databases alongside manual journal searches for the period of 2002 to 2006. Articles included present prototypes, case studies and pilot studies, clinical trials and systems that are already in routine use. The searches identified 69 articles describing 67 different systems. In a quantitative analysis, these systems were categorized into project status, health care settings, user groups, improvement aims, and systems features (i.e., component types, data gathering, data transmission, systems functions). The focus is on the types of systems implemented, their frequency of occurrence and their characteristics. Qualitative analyses were performed of deployment issues, such as organizational and personnel issues, privacy and security issues, and financial issues. This paper provides a comprehensive access to the literature of the emerging field by addressing specific topics of application settings, systems features, and deployment experiences. Both an overview and an analysis of the literature on a broad and heterogeneous range of systems are provided. Most systems are described in their prototype stages. Deployment issues, such as implications on organization or personnel, privacy concerns, or financial issues are mentioned rarely, though their solution is regarded as decisive in transferring promising systems to a stage of regular operation. There is a need for further research on the deployment of pervasive computing systems, including clinical studies, economic and social analyses, user studies, etc.

  11. Cascading Policies Provide Fault Tolerance for Pervasive Clinical Communications.

    PubMed

    Williams, Rose; Jalan, Srikant; Stern, Edie; Lussier, Yves A

    2005-03-21

    We implemented an end-to-end notification system that pushed urgent clinical laboratory results to Blackberry 7510 devices over the Nextel cellular network. We designed our system to use user roles and notification policies to abstract and execute clinical notification procedures. We anticipated some problems with dropped and non-delivered messages when the device was out-of-network, however, we did not expect the same problems in other situations like device reconnection to the network. We addressed these problems by creating cascading "fault tolerance" policies to drive notification escalation when messages timed-out or delivery failed. This paper describes our experience in providing an adaptable, fault tolerant pervasive notification system for delivering secure, critical, time-sensitive patient laboratory results.

  12. Socio-inspired ICT. Towards a socially grounded society-ICT symbiosis

    NASA Astrophysics Data System (ADS)

    Ferscha, A.; Farrahi, K.; van den Hoven, J.; Hales, D.; Nowak, A.; Lukowicz, P.; Helbing, D.

    2012-11-01

    Modern ICT (Information and Communication Technology) has developed a vision where the "computer" is no longer associated with the concept of a single device or a network of devices, but rather the entirety of situated services originating in a digital world, which are perceived through the physical world. It is observed that services with explicit user input and output are becoming to be replaced by a computing landscape sensing the physical world via a huge variety of sensors, and controlling it via a plethora of actuators. The nature and appearance of computing devices is changing to be hidden in the fabric of everyday life, invisibly networked, and omnipresent, with applications greatly being based on the notions of context and knowledge. Interaction with such globe spanning, modern ICT systems will presumably be more implicit, at the periphery of human attention, rather than explicit, i.e. at the focus of human attention.Socio-inspired ICT assumes that future, globe scale ICT systems should be viewed as social systems. Such a view challenges research to identify and formalize the principles of interaction and adaptation in social systems, so as to be able to ground future ICT systems on those principles. This position paper therefore is concerned with the intersection of social behaviour and modern ICT, creating or recreating social conventions and social contexts through the use of pervasive, globe-spanning, omnipresent and participative ICT.

  13. Implementing Internet of Things in a military command and control environment

    NASA Astrophysics Data System (ADS)

    Raglin, Adrienne; Metu, Somiya; Russell, Stephen; Budulas, Peter

    2017-05-01

    While the term Internet of Things (IoT) has been coined relatively recently, it has deep roots in multiple other areas of research including cyber-physical systems, pervasive and ubiquitous computing, embedded systems, mobile ad-hoc networks, wireless sensor networks, cellular networks, wearable computing, cloud computing, big data analytics, and intelligent agents. As the Internet of Things, these technologies have created a landscape of diverse heterogeneous capabilities and protocols that will require adaptive controls to effect linkages and changes that are useful to end users. In the context of military applications, it will be necessary to integrate disparate IoT devices into a common platform that necessarily must interoperate with proprietary military protocols, data structures, and systems. In this environment, IoT devices and data will not be homogeneous and provenance-controlled (i.e. single vendor/source/supplier owned). This paper presents a discussion of the challenges of integrating varied IoT devices and related software in a military environment. A review of contemporary commercial IoT protocols is given and as a practical example, a middleware implementation is proffered that provides transparent interoperability through a proactive message dissemination system. The implementation is described as a framework through which military applications can integrate and utilize commercial IoT in conjunction with existing military sensor networks and command and control (C2) systems.

  14. Towards pervasive computing in health care – A literature review

    PubMed Central

    Orwat, Carsten; Graefe, Andreas; Faulwasser, Timm

    2008-01-01

    Background The evolving concepts of pervasive computing, ubiquitous computing and ambient intelligence are increasingly influencing health care and medicine. Summarizing published research, this literature review provides an overview of recent developments and implementations of pervasive computing systems in health care. It also highlights some of the experiences reported in deployment processes. Methods There is no clear definition of pervasive computing in the current literature. Thus specific inclusion criteria for selecting articles about relevant systems were developed. Searches were conducted in four scientific databases alongside manual journal searches for the period of 2002 to 2006. Articles included present prototypes, case studies and pilot studies, clinical trials and systems that are already in routine use. Results The searches identified 69 articles describing 67 different systems. In a quantitative analysis, these systems were categorized into project status, health care settings, user groups, improvement aims, and systems features (i.e., component types, data gathering, data transmission, systems functions). The focus is on the types of systems implemented, their frequency of occurrence and their characteristics. Qualitative analyses were performed of deployment issues, such as organizational and personnel issues, privacy and security issues, and financial issues. This paper provides a comprehensive access to the literature of the emerging field by addressing specific topics of application settings, systems features, and deployment experiences. Conclusion Both an overview and an analysis of the literature on a broad and heterogeneous range of systems are provided. Most systems are described in their prototype stages. Deployment issues, such as implications on organization or personnel, privacy concerns, or financial issues are mentioned rarely, though their solution is regarded as decisive in transferring promising systems to a stage of regular operation. There is a need for further research on the deployment of pervasive computing systems, including clinical studies, economic and social analyses, user studies, etc. PMID:18565221

  15. Undesirable Effects of Media on Children: Why Limitation is Necessary?

    PubMed

    Karaagac, Aysu Turkmen

    2015-06-01

    Pervasive media environment is a social problem shared by most of the countries around the world. Several studies have been performed to highlight the undesired effects of media on children. Some of these studies have focused on the time spent by children watching television, playing with computers or using mobile media devices while some others have tried to explain the associations between the obesity, postural abnormalities or psychological problems of children, and their media use. This article discusses the recent approaches to curb influence of media on children, and the importance of family media literacy education programs with particular relevance to developing countries.

  16. New paradigms in telemedicine: ambient intelligence, wearable, pervasive and personalized.

    PubMed

    Rubel, Paul; Fayn, Jocelyne; Simon-Chautemps, Lucas; Atoui, Hussein; Ohlsson, Mattias; Telisson, David; Adami, Stefano; Arod, Sébastien; Forlini, Marie Claire; Malossi, Cesare; Placide, Joël; Ziliani, Gian Luca; Assanelli, Deodato; Chevalier, Philippe

    2004-01-01

    After decades of development of information systems dedicated to health professionals, there is an increasing demand for personalized and non-hospital based care. An especially critical domain is cardiology: almost two third of cardiac deaths occur out of hospital, and victims do not survive long enough to benefit from in-hospital treatments. We need to reduce the time before treatment. But symptoms are often interpreted wrongly. The only immediate diagnostic tool to assess the possibility of a cardiac event is the electrocardiogram (ECG). Event and transtelephonic ECG recorders are used to improve decision making but require setting up new infrastructures. The European EPI-MEDICS project has developed an intelligent Personal ECG Monitor (PEM) for the early detection of cardiac events. The PEM embeds advanced decision making techniques, generates different alarm levels and forwards alarm messages to the relevant care providers by means of new generation wireless communication. It is cost saving, involving care provider only if necessary and requiring no specific infrastructure. This solution is a typical example of pervasive computing and ambient intelligence that demonstrates how personalized, wearable, ubiquitous devices could improve healthcare.

  17. An Adaptive Sensor Mining Framework for Pervasive Computing Applications

    NASA Astrophysics Data System (ADS)

    Rashidi, Parisa; Cook, Diane J.

    Analyzing sensor data in pervasive computing applications brings unique challenges to the KDD community. The challenge is heightened when the underlying data source is dynamic and the patterns change. We introduce a new adaptive mining framework that detects patterns in sensor data, and more importantly, adapts to the changes in the underlying model. In our framework, the frequent and periodic patterns of data are first discovered by the Frequent and Periodic Pattern Miner (FPPM) algorithm; and then any changes in the discovered patterns over the lifetime of the system are discovered by the Pattern Adaptation Miner (PAM) algorithm, in order to adapt to the changing environment. This framework also captures vital context information present in pervasive computing applications, such as the startup triggers and temporal information. In this paper, we present a description of our mining framework and validate the approach using data collected in the CASAS smart home testbed.

  18. Wearable Notification via Dissemination Service in a Pervasive Computing Environment

    DTIC Science & Technology

    2015-09-01

    context, state, and environment in a manner that would be transparent to a Soldier’s common operations. 15. SUBJECT TERMS pervasive computing, Android ...of user context shifts, i.e., changes in the user’s position, history , workflow, or resource interests. If the PCE is described as a 2-component...convenient viewing on the Glass’s screen just above the line of sight. All of the software developed uses Google’s Android open-source software stack

  19. Mobile Autonomous Sensing Unit (MASU): A Framework That Supports Distributed Pervasive Data Sensing

    PubMed Central

    Medina, Esunly; Lopez, David; Meseguer, Roc; Ochoa, Sergio F.; Royo, Dolors; Santos, Rodrigo

    2016-01-01

    Pervasive data sensing is a major issue that transverses various research areas and application domains. It allows identifying people’s behaviour and patterns without overwhelming the monitored persons. Although there are many pervasive data sensing applications, they are typically focused on addressing specific problems in a single application domain, making them difficult to generalize or reuse. On the other hand, the platforms for supporting pervasive data sensing impose restrictions to the devices and operational environments that make them unsuitable for monitoring loosely-coupled or fully distributed work. In order to help address this challenge this paper present a framework that supports distributed pervasive data sensing in a generic way. Developers can use this framework to facilitate the implementations of their applications, thus reducing complexity and effort in such an activity. The framework was evaluated using simulations and also through an empirical test, and the obtained results indicate that it is useful to support such a sensing activity in loosely-coupled or fully distributed work scenarios. PMID:27409617

  20. Pervasive access to MRI bias artifact suppression service on a grid.

    PubMed

    Ardizzone, Edoardo; Gambino, Orazio; Genco, Alessandro; Pirrone, Roberto; Sorce, Salvatore

    2009-01-01

    Bias artifact corrupts MRIs in such a way that the image is afflicted by illumination variations. Some of the authors proposed the exponential entropy-driven homomorphic unsharp masking ( E(2)D-HUM) algorithm that corrects this artifact without any a priori hypothesis about the tissues or the MRI modality. Moreover, E(2)D-HUM does not care about the body part under examination and does not require any particular training task. People who want to use this algorithm, which is Matlab-based, have to set their own computers in order to execute it. Furthermore, they have to be Matlab-skilled to exploit all the features of the algorithm. In this paper, we propose to make such algorithm available as a service on a grid infrastructure, so that people can use it almost from everywhere, in a pervasive fashion, by means of a suitable user interface running on smartphones. The proposed solution allows physicians to use the E(2)D-HUM algorithm (or any other kind of algorithm, given that it is available as a service on the grid), being it remotely executed somewhere in the grid, and the results are sent back to the user's device. This way, physicians do not need to be aware of how to use Matlab to process their images. The pervasive service provision for medical image enhancement is presented, along with some experimental results obtained using smartphones connected to an existing Globus-based grid infrastructure.

  1. Ethical Responsibility Key to Computer Security.

    ERIC Educational Resources Information Center

    Lynn, M. Stuart

    1989-01-01

    The pervasiveness of powerful computers and computer networks has raised the specter of new forms of abuse and of concomitant ethical issues. Blurred boundaries, hackers, the Computer Worm, ethical issues, and implications for academic institutions are discussed. (MLW)

  2. Cyber-Security Issues in Healthcare Information Technology.

    PubMed

    Langer, Steve G

    2017-02-01

    In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.

  3. The Pervasiveness and Impact of Electronic Communication Technologies in Organizations: A Survey of Major American Corporations.

    ERIC Educational Resources Information Center

    Hellweg, Susan A.; And Others

    A survey of the Fortune 500 corporations was conducted to ascertain the pervasiveness and perceived impact of five electronic communication technologies (electronic mail, videotex, interactive computers, video teleconferencing, and word processing). Ninety-four corporations responded to a 53-item questionnaire and follow-up survey. Analysis of the…

  4. Pervasive Knowledge, Social Networks, and Cloud Computing: E-Learning 2.0

    ERIC Educational Resources Information Center

    Anshari, Muhammad; Alas, Yabit; Guan, Lim Sei

    2015-01-01

    Embedding Web 2.0 in learning processes has extended learning from traditional based learning-centred to a collaborative based learning-centred institution that emphasises learning anywhere and anytime. While deploying Semantic Web into e-learning offers a broader spectrum of pervasive knowledge acquisition to enrich users' experience in learning.…

  5. Towards a flexible middleware for context-aware pervasive and wearable systems.

    PubMed

    Muro, Marco; Amoretti, Michele; Zanichelli, Francesco; Conte, Gianni

    2012-11-01

    Ambient intelligence and wearable computing call for innovative hardware and software technologies, including a highly capable, flexible and efficient middleware, allowing for the reuse of existing pervasive applications when developing new ones. In the considered application domain, middleware should also support self-management, interoperability among different platforms, efficient communications, and context awareness. In the on-going "everything is networked" scenario scalability appears as a very important issue, for which the peer-to-peer (P2P) paradigm emerges as an appealing solution for connecting software components in an overlay network, allowing for efficient and balanced data distribution mechanisms. In this paper, we illustrate how all these concepts can be placed into a theoretical tool, called networked autonomic machine (NAM), implemented into a NAM-based middleware, and evaluated against practical problems of pervasive computing.

  6. From Pressure to Path: Barometer-based Vehicle Tracking.

    PubMed

    Ho, Bo-Jhang; Martin, Paul; Swaminathan, Prashanth; Srivastava, Mani

    2015-11-01

    Pervasive mobile devices have enabled countless context-and location-based applications that facilitate navigation, life-logging, and more. As we build the next generation of smart cities, it is important to leverage the rich sensing modalities that these numerous devices have to offer. This work demonstrates how mobile devices can be used to accurately track driving patterns based solely on pressure data collected from the device's barometer. Specifically, by correlating pressure time-series data against topographic elevation data and road maps for a given region, a centralized computer can estimate the likely paths through which individual users have driven, providing an exceptionally low-power method for measuring driving patterns of a given individual or for analyzing group behavior across multiple users. This work also brings to bear a more nefarious side effect of pressure-based path estimation: a mobile application can, without consent and without notifying the user, use pressure data to accurately detect an individual's driving behavior, compromising both user privacy and security. We further analyze the ability to predict driving trajectories in terms of the variance in barometer pressure and geographical elevation, demonstrating cases in which more than 80% of paths can be accurately predicted.

  7. ROSA: Resource-Oriented Service Management Schemes for Web of Things in a Smart Home.

    PubMed

    Liao, Chun-Feng; Chen, Peng-Yu

    2017-09-21

    A Pervasive-computing-enriched smart home environment, which contains many embedded and tiny intelligent devices and sensors coordinated by service management mechanisms, is capable of anticipating intentions of occupants and providing appropriate services accordingly. Although there are a wealth of research achievements in recent years, the degree of market acceptance is still low. The main reason is that most of the devices and services in such environments depend on particular platform or technology, making it hard to develop an application by composing the devices or services. Meanwhile, the concept of Web of Things (WoT) is becoming popular recently. Based on WoT, the developers can build applications based on popular web tools or technologies. Consequently, the objective of this paper is to propose a set of novel WoT-driven plug-and-play service management schemes for a smart home called Resource-Oriented Service Administration (ROSA). We have implemented an application prototype, and experiments are performed to show the effectiveness of the proposed approach. The results of this research can be a foundation for realizing the vision of "end user programmable smart environments".

  8. A Method for Rapid Measurement of Contrast Sensitivity on Mobile Touch-Screens

    NASA Technical Reports Server (NTRS)

    Mulligan, Jeffrey B.

    2016-01-01

    Touch-screen displays in cell phones and tablet computers are now pervasive, making them an attractive option for vision testing outside of the laboratory or clinic. Here we de- scribe a novel method in which subjects use a finger swipe to indicate the transition from visible to invisible on a grating which is swept in both contrast and frequency. Because a single image can be swiped in about a second, it is practical to use a series of images to zoom in on particular ranges of contrast or frequency, both to increase the accuracy of the measurements and to obtain an estimate of the reliability of the subject. Sensitivities to chromatic and spatio-temporal modulations are easily measured using the same method. A proto- type has been developed for Apple Computer's iPad/iPod/iPhone family of devices, implemented using an open-source scripting environment known as QuIP (QUick Image Processing, http://hsi.arc.nasa.gov/groups/scanpath/research.php). Preliminary data show good agreement with estimates obtained from traditional psychophysical methods as well as newer rapid estimation techniques. Issues relating to device calibration are also discussed.

  9. Pervasive Computing Goes to School

    ERIC Educational Resources Information Center

    Plymale, William O.

    2005-01-01

    In 1991 Mark Weiser introduced the idea of ubiquitous computing: a world in which computers and associated technologies become invisible, and thus indistinguishable from everyday life. This invisible computing is accomplished by means of "embodied virtuality," the process of drawing computers into the physical world. Weiser proposed that…

  10. From computers to ubiquitous computing by 2010: health care.

    PubMed

    Aziz, Omer; Lo, Benny; Pansiot, Julien; Atallah, Louis; Yang, Guang-Zhong; Darzi, Ara

    2008-10-28

    Over the past decade, miniaturization and cost reduction in semiconductors have led to computers smaller in size than a pinhead with powerful processing abilities that are affordable enough to be disposable. Similar advances in wireless communication, sensor design and energy storage have meant that the concept of a truly pervasive 'wireless sensor network', used to monitor environments and objects within them, has become a reality. The need for a wireless sensor network designed specifically for human body monitoring has led to the development of wireless 'body sensor network' (BSN) platforms composed of tiny integrated microsensors with on-board processing and wireless data transfer capability. The ubiquitous computing abilities of BSNs offer the prospect of continuous monitoring of human health in any environment, be it home, hospital, outdoors or the workplace. This pervasive technology comes at a time when Western world health care costs have sharply risen, reflected by increasing expenditure on health care as a proportion of gross domestic product over the last 20 years. Drivers of this rise include an ageing post 'baby boom' population, higher incidence of chronic disease and the need for earlier diagnosis. This paper outlines the role of pervasive health care technologies in providing more efficient health care.

  11. Critical branching neural networks.

    PubMed

    Kello, Christopher T

    2013-01-01

    It is now well-established that intrinsic variations in human neural and behavioral activity tend to exhibit scaling laws in their fluctuations and distributions. The meaning of these scaling laws is an ongoing matter of debate between isolable causes versus pervasive causes. A spiking neural network model is presented that self-tunes to critical branching and, in doing so, simulates observed scaling laws as pervasive to neural and behavioral activity. These scaling laws are related to neural and cognitive functions, in that critical branching is shown to yield spiking activity with maximal memory and encoding capacities when analyzed using reservoir computing techniques. The model is also shown to account for findings of pervasive 1/f scaling in speech and cued response behaviors that are difficult to explain by isolable causes. Issues and questions raised by the model and its results are discussed from the perspectives of physics, neuroscience, computer and information sciences, and psychological and cognitive sciences.

  12. A Conceptual Framework and Principles for Trusted Pervasive Health

    PubMed Central

    Blobel, Bernd Gerhard; Seppälä, Antto Veikko; Sorvari, Hannu Olavi; Nykänen, Pirkko Anneli

    2012-01-01

    Background Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept—pervasive health—which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. Objective This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and polices which can make pervasive health trustworthy. Methods In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. Results In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that any stakeholder or system collecting or processing health data must support transparency and shall publish its trust and privacy attributes and even its domain specific policies. Conclusions The developed principles enable trustworthiness and guarantee privacy in pervasive health. The implementation of principles requires new infrastructural services such as trust verification and policy conflict resolution. After implementation, the accuracy and usability of principles should be analyzed. PMID:22481297

  13. A conceptual framework and principles for trusted pervasive health.

    PubMed

    Ruotsalainen, Pekka Sakari; Blobel, Bernd Gerhard; Seppälä, Antto Veikko; Sorvari, Hannu Olavi; Nykänen, Pirkko Anneli

    2012-04-06

    Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept-pervasive health-which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and policies which can make pervasive health trustworthy. In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that any stakeholder or system collecting or processing health data must support transparency and shall publish its trust and privacy attributes and even its domain specific policies. The developed principles enable trustworthiness and guarantee privacy in pervasive health. The implementation of principles requires new infrastructural services such as trust verification and policy conflict resolution. After implementation, the accuracy and usability of principles should be analyzed.

  14. Introduction to This Special Issue on Context-Aware Computing.

    ERIC Educational Resources Information Center

    Moran, Thomas P.; Dourish, Paul

    2001-01-01

    Discusses pervasive, or ubiquitous, computing; explains the notion of context; and defines context-aware computing as the key to disperse and enmesh computation into our lives. Considers context awareness in human-computer interaction and describes the broad topic areas of the essays included in this special issue. (LRW)

  15. Volcano Monitoring: A Case Study in Pervasive Computing

    NASA Astrophysics Data System (ADS)

    Peterson, Nina; Anusuya-Rangappa, Lohith; Shirazi, Behrooz A.; Song, Wenzhan; Huang, Renjie; Tran, Daniel; Chien, Steve; Lahusen, Rick

    Recent advances in wireless sensor network technology have provided robust and reliable solutions for sophisticated pervasive computing applications such as inhospitable terrain environmental monitoring. We present a case study for developing a real-time pervasive computing system, called OASIS for optimized autonomous space in situ sensor-web, which combines ground assets (a sensor network) and space assets (NASA’s earth observing (EO-1) satellite) to monitor volcanic activities at Mount St. Helens. OASIS’s primary goals are: to integrate complementary space and in situ ground sensors into an interactive and autonomous sensorweb, to optimize power and communication resource management of the sensorweb and to provide mechanisms for seamless and scalable fusion of future space and in situ components. The OASIS in situ ground sensor network development addresses issues related to power management, bandwidth management, quality of service management, topology and routing management, and test-bed design. The space segment development consists of EO-1 architectural enhancements, feedback of EO-1 data into the in situ component, command and control integration, data ingestion and dissemination and field demonstrations.

  16. Personal pervasive environments: practice and experience.

    PubMed

    Ballesteros, Francisco J; Guardiola, Gorka; Soriano, Enrique

    2012-01-01

    In this paper we present our experience designing and developing two different systems to enable personal pervasive computing environments, Plan B and the Octopus. These systems were fully implemented and have been used on a daily basis for years. Both are based on synthetic (virtual) file system interfaces and provide mechanisms to adapt to changes in the context and reconfigure the system to support pervasive applications. We also present the main differences between them, focusing on architectural and reconfiguration aspects. Finally, we analyze the pitfalls and successes of both systems and review the lessons we learned while designing, developing, and using them.

  17. Personal Pervasive Environments: Practice and Experience

    PubMed Central

    Ballesteros, Francisco J.; Guardiola, Gorka; Soriano, Enrique

    2012-01-01

    In this paper we present our experience designing and developing two different systems to enable personal pervasive computing environments, Plan B and the Octopus. These systems were fully implemented and have been used on a daily basis for years. Both are based on synthetic (virtual) file system interfaces and provide mechanisms to adapt to changes in the context and reconfigure the system to support pervasive applications. We also present the main differences between them, focusing on architectural and reconfiguration aspects. Finally, we analyze the pitfalls and successes of both systems and review the lessons we learned while designing, developing, and using them. PMID:22969340

  18. The use of computer vision in an intelligent environment to support aging-in-place, safety, and independence in the home.

    PubMed

    Mihailidis, Alex; Carmichael, Brent; Boger, Jennifer

    2004-09-01

    This paper discusses the use of computer vision in pervasive healthcare systems, specifically in the design of a sensing agent for an intelligent environment that assists older adults with dementia during an activity of daily living. An overview of the techniques applied in this particular example is provided, along with results from preliminary trials completed using the new sensing agent. A discussion of the results obtained to date is presented, including technical and social issues that remain for the advancement and acceptance of this type of technology within pervasive healthcare.

  19. Slovak High School Students' Attitudes toward Computers

    ERIC Educational Resources Information Center

    Kubiatko, Milan; Halakova, Zuzana; Nagyova, Sona; Nagy, Tibor

    2011-01-01

    The pervasive involvement of information and communication technologies and computers in our daily lives influences changes of attitude toward computers. We focused on finding these ecological effects in the differences in computer attitudes as a function of gender and age. A questionnaire with 34 Likert-type items was used in our research. The…

  20. ROSA: Resource-Oriented Service Management Schemes for Web of Things in a Smart Home

    PubMed Central

    Chen, Peng-Yu

    2017-01-01

    A Pervasive-computing-enriched smart home environment, which contains many embedded and tiny intelligent devices and sensors coordinated by service management mechanisms, is capable of anticipating intentions of occupants and providing appropriate services accordingly. Although there are a wealth of research achievements in recent years, the degree of market acceptance is still low. The main reason is that most of the devices and services in such environments depend on particular platform or technology, making it hard to develop an application by composing the devices or services. Meanwhile, the concept of Web of Things (WoT) is becoming popular recently. Based on WoT, the developers can build applications based on popular web tools or technologies. Consequently, the objective of this paper is to propose a set of novel WoT-driven plug-and-play service management schemes for a smart home called Resource-Oriented Service Administration (ROSA). We have implemented an application prototype, and experiments are performed to show the effectiveness of the proposed approach. The results of this research can be a foundation for realizing the vision of “end user programmable smart environments”. PMID:28934159

  1. From Pressure to Path: Barometer-based Vehicle Tracking

    PubMed Central

    Ho, Bo-Jhang; Martin, Paul; Swaminathan, Prashanth; Srivastava, Mani

    2017-01-01

    Pervasive mobile devices have enabled countless context-and location-based applications that facilitate navigation, life-logging, and more. As we build the next generation of smart cities, it is important to leverage the rich sensing modalities that these numerous devices have to offer. This work demonstrates how mobile devices can be used to accurately track driving patterns based solely on pressure data collected from the device’s barometer. Specifically, by correlating pressure time-series data against topographic elevation data and road maps for a given region, a centralized computer can estimate the likely paths through which individual users have driven, providing an exceptionally low-power method for measuring driving patterns of a given individual or for analyzing group behavior across multiple users. This work also brings to bear a more nefarious side effect of pressure-based path estimation: a mobile application can, without consent and without notifying the user, use pressure data to accurately detect an individual’s driving behavior, compromising both user privacy and security. We further analyze the ability to predict driving trajectories in terms of the variance in barometer pressure and geographical elevation, demonstrating cases in which more than 80% of paths can be accurately predicted. PMID:29503981

  2. The iPod Touch in Association with Other Technologies in Support of a Community of Inquiry in Off-Campus Teacher Education

    ERIC Educational Resources Information Center

    Walta, Caroline; Nicholas, Howard

    2013-01-01

    Hand-held technologies are pervasive and convenient in everyday use, but less commonly associated with the delivery of teacher education programs. This has implications for the way graduate teachers view the challenge of utilising these devices once they become classroom teachers, as pre-service teachers generally associate these devices with…

  3. A perspective on intelligent devices and environments in medical rehabilitation.

    PubMed

    Cooper, Rory A; Dicianno, Brad E; Brewer, Bambi; LoPresti, Edmund; Ding, Dan; Simpson, Richard; Grindle, Garrett; Wang, Hongwu

    2008-12-01

    Globally, the number of people older than 65 years is anticipated to double between 1997 and 2025, while at the same time the number of people with disabilities is growing at a similar rate, which makes technical advances and social policies critical to attain, prolong, and preserve quality of life. Recent advancements in technology, including computation, robotics, machine learning, communication, and miniaturization of sensors have been used primarily in manufacturing, military, space exploration, and entertainment. However, few efforts have been made to utilize these technologies to enhance the quality of life of people with disabilities. This article offers a perspective of future development in seven emerging areas: translation of research into clinical practice, pervasive assistive technology, cognitive assistive technologies, rehabilitation monitoring and coaching technologies, robotic assisted therapy, and personal mobility and manipulation technology.

  4. Adaptive distributed outlier detection for WSNs.

    PubMed

    De Paola, Alessandra; Gaglio, Salvatore; Lo Re, Giuseppe; Milazzo, Fabrizio; Ortolani, Marco

    2015-05-01

    The paradigm of pervasive computing is gaining more and more attention nowadays, thanks to the possibility of obtaining precise and continuous monitoring. Ease of deployment and adaptivity are typically implemented by adopting autonomous and cooperative sensory devices; however, for such systems to be of any practical use, reliability and fault tolerance must be guaranteed, for instance by detecting corrupted readings amidst the huge amount of gathered sensory data. This paper proposes an adaptive distributed Bayesian approach for detecting outliers in data collected by a wireless sensor network; our algorithm aims at optimizing classification accuracy, time complexity and communication complexity, and also considering externally imposed constraints on such conflicting goals. The performed experimental evaluation showed that our approach is able to improve the considered metrics for latency and energy consumption, with limited impact on classification accuracy.

  5. Ethics Regulation in Social Computing Research: Examining the Role of Institutional Review Boards.

    PubMed

    Vitak, Jessica; Proferes, Nicholas; Shilton, Katie; Ashktorab, Zahra

    2017-12-01

    The parallel rise of pervasive data collection platforms and computational methods for collecting, analyzing, and drawing inferences from large quantities of user data has advanced social computing research, investigating digital traces to understand mediated behaviors of individuals, groups, and societies. At the same time, methods employed to access these data have raised questions about ethical research practices. This article provides insights into U.S. institutional review boards' (IRBs) attitudes and practices regulating social computing research. Through descriptive and inferential analysis of survey data from staff at 59 IRBs at research universities, we examine how IRBs evaluate the growing variety of studies using pervasive digital data. Findings unpack the difficulties IRB staff face evaluating increasingly technical research proposals while highlighting the belief in their ability to surmount these difficulties. They also indicate a lack of consensus among IRB staff about what should be reviewed and a willingness to work closely with researchers.

  6. Development for transportation asset management inventory & management tools.

    DOT National Transportation Integrated Search

    2014-09-01

    Mobile technology is becoming more and more pervasive within the consumer industry. Devices such as smartphones and tablets : are able to relay information effectively and affordably either with or without an accompanying cellular connectivity plan. ...

  7. The Experimental Mathematician: The Pleasure of Discovery and the Role of Proof

    ERIC Educational Resources Information Center

    Borwein, Jonathan M.

    2005-01-01

    The emergence of powerful mathematical computing environments, the growing availability of correspondingly powerful (multi-processor) computers and the pervasive presence of the Internet allow for mathematicians, students and teachers, to proceed heuristically and "quasi-inductively." We may increasingly use symbolic and numeric computation,…

  8. A Longitudinal Investigation of the Effects of Computer Anxiety on Performance in a Computing-Intensive Environment

    ERIC Educational Resources Information Center

    Buche, Mari W.; Davis, Larry R.; Vician, Chelley

    2007-01-01

    Computers are pervasive in business and education, and it would be easy to assume that all individuals embrace technology. However, evidence shows that roughly 30 to 40 percent of individuals experience some level of computer anxiety. Many academic programs involve computing-intensive courses, but the actual effects of this exposure on computer…

  9. Gender Differences: An Examination of Computer-Mediated Communication.

    ERIC Educational Resources Information Center

    Gregory, Mona Y.

    Computer-mediated communication (CMC) is a pervasive means of communicating in work place, education, and home settings. Males currently occupy approximately 69% of all jobs in the computer industry and only 10% of upper-level positions are occupied by females. Stereotypical perceptions and gendered occupations contribute to the lack of females in…

  10. Is Your Mission Ready for the Information Age?

    ERIC Educational Resources Information Center

    Oblinger, Diana G.

    1999-01-01

    Urges institutions of higher education to evaluate their mission statements in light of current trends, especially the pervasive influence of information technology. Raises evaluative questions concerning information technology and distance learning, student services, the campus library, research computing, administrative computing, and public…

  11. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.

    PubMed

    Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne

    2017-05-01

    Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.

  12. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

    PubMed Central

    Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne

    2017-01-01

    Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons. PMID:28468313

  13. Emerging CAE technologies and their role in Future Ambient Intelligence Environments

    NASA Astrophysics Data System (ADS)

    Noor, Ahmed K.

    2011-03-01

    Dramatic improvements are on the horizon in Computer Aided Engineering (CAE) and various simulation technologies. The improvements are due, in part, to the developments in a number of leading-edge technologies and their synergistic combinations/convergence. The technologies include ubiquitous, cloud, and petascale computing; ultra high-bandwidth networks, pervasive wireless communication; knowledge based engineering; networked immersive virtual environments and virtual worlds; novel human-computer interfaces; and powerful game engines and facilities. This paper describes the frontiers and emerging simulation technologies, and their role in the future virtual product creation and learning/training environments. The environments will be ambient intelligence environments, incorporating a synergistic combination of novel agent-supported visual simulations (with cognitive learning and understanding abilities); immersive 3D virtual world facilities; development chain management systems and facilities (incorporating a synergistic combination of intelligent engineering and management tools); nontraditional methods; intelligent, multimodal and human-like interfaces; and mobile wireless devices. The Virtual product creation environment will significantly enhance the productivity and will stimulate creativity and innovation in future global virtual collaborative enterprises. The facilities in the learning/training environment will provide timely, engaging, personalized/collaborative and tailored visual learning.

  14. Privacy Challenges for Wireless Medical Devices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lagesse, Brent J

    2010-01-01

    Implantable medical devices are becoming more pervasive as new technologies increase their reliability and safety. Furthermore, these devices are becoming increasingly reliant on wireless communication for interaction with the device. Such technologies have the potential to leak information that could be utilized by an attacker to threaten the lives of patients. Privacy of patient information is essential; however, this information is not the only privacy issue that must be considered. In this paper, we discuss why information privacy is insufficient for protecting patients from some attacks and how information regarding the presence of individual devices can leak vulnerabilities. Furthermore, wemore » examine existing privacy enhancing algorithms and discuss their applicability to implantable medical devices.« less

  15. An Argument for Clarity: What Are Learning Management Systems, What Are They Not, and What Should They Become?

    ERIC Educational Resources Information Center

    Watson, William R.; Watson, Sunnie Lee

    2007-01-01

    The application of computers to education has a history dating back to the 1950s, well before the pervasive spread of personal computers (Reiser, 1987). With a mature history and varying approaches to utilizing computers for education, a veritable alphabet soup of terms and acronyms related to computers in education have found their way into the…

  16. Machine learning techniques for energy optimization in mobile embedded systems

    NASA Astrophysics Data System (ADS)

    Donohoo, Brad Kyoshi

    Mobile smartphones and other portable battery operated embedded systems (PDAs, tablets) are pervasive computing devices that have emerged in recent years as essential instruments for communication, business, and social interactions. While performance, capabilities, and design are all important considerations when purchasing a mobile device, a long battery lifetime is one of the most desirable attributes. Battery technology and capacity has improved over the years, but it still cannot keep pace with the power consumption demands of today's mobile devices. This key limiter has led to a strong research emphasis on extending battery lifetime by minimizing energy consumption, primarily using software optimizations. This thesis presents two strategies that attempt to optimize mobile device energy consumption with negligible impact on user perception and quality of service (QoS). The first strategy proposes an application and user interaction aware middleware framework that takes advantage of user idle time between interaction events of the foreground application to optimize CPU and screen backlight energy consumption. The framework dynamically classifies mobile device applications based on their received interaction patterns, then invokes a number of different power management algorithms to adjust processor frequency and screen backlight levels accordingly. The second strategy proposes the usage of machine learning techniques to learn a user's mobile device usage pattern pertaining to spatiotemporal and device contexts, and then predict energy-optimal data and location interface configurations. By learning where and when a mobile device user uses certain power-hungry interfaces (3G, WiFi, and GPS), the techniques, which include variants of linear discriminant analysis, linear logistic regression, non-linear logistic regression, and k-nearest neighbor, are able to dynamically turn off unnecessary interfaces at runtime in order to save energy.

  17. Telehealth, Mobile Applications, and Wearable Devices are Expanding Cancer Care Beyond Walls.

    PubMed

    Cannon, Carol

    2018-05-01

    To review telehealth solutions, mobile applications, and wearable devices that are currently impacting patients, caregivers, and providers who work in the oncology setting. A literature search was conducted using the terms (Telehealth, Mobile Health, mHealth, Wearable Devices) + (Oncology, Cancer Care). There are many current applications of telehealth and mobile health in the oncology setting. Nurses who care for patients with cancer should be aware of the pervasiveness and impact of telehealth and mobile health to this unique population. Copyright © 2018 Elsevier Inc. All rights reserved.

  18. Integrating Symbolic and Statistical Methods for Testing Intelligent Systems Applications to Machine Learning and Computer Vision

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jha, Sumit Kumar; Pullum, Laura L; Ramanathan, Arvind

    Embedded intelligent systems ranging from tiny im- plantable biomedical devices to large swarms of autonomous un- manned aerial systems are becoming pervasive in our daily lives. While we depend on the flawless functioning of such intelligent systems, and often take their behavioral correctness and safety for granted, it is notoriously difficult to generate test cases that expose subtle errors in the implementations of machine learning algorithms. Hence, the validation of intelligent systems is usually achieved by studying their behavior on representative data sets, using methods such as cross-validation and bootstrapping.In this paper, we present a new testing methodology for studyingmore » the correctness of intelligent systems. Our approach uses symbolic decision procedures coupled with statistical hypothesis testing to. We also use our algorithm to analyze the robustness of a human detection algorithm built using the OpenCV open-source computer vision library. We show that the human detection implementation can fail to detect humans in perturbed video frames even when the perturbations are so small that the corresponding frames look identical to the naked eye.« less

  19. Big Data Usage Patterns in the Health Care Domain: A Use Case Driven Approach Applied to the Assessment of Vaccination Benefits and Risks. Contribution of the IMIA Primary Healthcare Working Group.

    PubMed

    Liyanage, H; de Lusignan, S; Liaw, S-T; Kuziemsky, C E; Mold, F; Krause, P; Fleming, D; Jones, S

    2014-08-15

    Generally benefits and risks of vaccines can be determined from studies carried out as part of regulatory compliance, followed by surveillance of routine data; however there are some rarer and more long term events that require new methods. Big data generated by increasingly affordable personalised computing, and from pervasive computing devices is rapidly growing and low cost, high volume, cloud computing makes the processing of these data inexpensive. To describe how big data and related analytical methods might be applied to assess the benefits and risks of vaccines. We reviewed the literature on the use of big data to improve health, applied to generic vaccine use cases, that illustrate benefits and risks of vaccination. We defined a use case as the interaction between a user and an information system to achieve a goal. We used flu vaccination and pre-school childhood immunisation as exemplars. We reviewed three big data use cases relevant to assessing vaccine benefits and risks: (i) Big data processing using crowdsourcing, distributed big data processing, and predictive analytics, (ii) Data integration from heterogeneous big data sources, e.g. the increasing range of devices in the "internet of things", and (iii) Real-time monitoring for the direct monitoring of epidemics as well as vaccine effects via social media and other data sources. Big data raises new ethical dilemmas, though its analysis methods can bring complementary real-time capabilities for monitoring epidemics and assessing vaccine benefit-risk balance.

  20. Big Data Usage Patterns in the Health Care Domain: A Use Case Driven Approach Applied to the Assessment of Vaccination Benefits and Risks

    PubMed Central

    Liyanage, H.; Liaw, S-T.; Kuziemsky, C.; Mold, F.; Krause, P.; Fleming, D.; Jones, S.

    2014-01-01

    Summary Background Generally benefits and risks of vaccines can be determined from studies carried out as part of regulatory compliance, followed by surveillance of routine data; however there are some rarer and more long term events that require new methods. Big data generated by increasingly affordable personalised computing, and from pervasive computing devices is rapidly growing and low cost, high volume, cloud computing makes the processing of these data inexpensive. Objective To describe how big data and related analytical methods might be applied to assess the benefits and risks of vaccines. Method: We reviewed the literature on the use of big data to improve health, applied to generic vaccine use cases, that illustrate benefits and risks of vaccination. We defined a use case as the interaction between a user and an information system to achieve a goal. We used flu vaccination and pre-school childhood immunisation as exemplars. Results We reviewed three big data use cases relevant to assessing vaccine benefits and risks: (i) Big data processing using crowd-sourcing, distributed big data processing, and predictive analytics, (ii) Data integration from heterogeneous big data sources, e.g. the increasing range of devices in the “internet of things”, and (iii) Real-time monitoring for the direct monitoring of epidemics as well as vaccine effects via social media and other data sources. Conclusions Big data raises new ethical dilemmas, though its analysis methods can bring complementary real-time capabilities for monitoring epidemics and assessing vaccine benefit-risk balance. PMID:25123718

  1. Investigation of Teachers' Attitudes towards Computer Use in Primary Education in Kurdistan

    ERIC Educational Resources Information Center

    Balisane, Hewa

    2015-01-01

    Technological advances have pervasively changed our behaviours, beliefs and approaches in working, socialising and entertaining. Educators, including those in primary education, have acknowledged the positive effects of computer use in the classroom in various ways. With regard to pedagogical consideration, primary school teachers have adopted…

  2. Energy harvesting: small scale energy production from ambient sources

    NASA Astrophysics Data System (ADS)

    Yeatman, Eric M.

    2009-03-01

    Energy harvesting - the collection of otherwise unexploited energy in the local environment - is attracting increasing attention for the powering of electronic devices. While the power levels that can be reached are typically modest (microwatts to milliwatts), the key motivation is to avoid the need for battery replacement or recharging in portable or inaccessible devices. Wireless sensor networks are a particularly important application: the availability of essentially maintenance free sensor nodes, as enabled by energy harvesting, will greatly increase the feasibility of large scale networks, in the paradigm often known as pervasive sensing. Such pervasive sensing networks, used to monitor buildings, structures, outdoor environments or the human body, offer significant benefits for large scale energy efficiency, health and safety, and many other areas. Sources of energy for harvesting include light, temperature differences, and ambient motion, and a wide range of miniature energy harvesters based on these sources have been proposed or demonstrated. This paper reviews the principles and practice in miniature energy harvesters, and discusses trends, suitable applications, and possible future developments.

  3. A Pervasive Social Networking Application: I-NFC enabled Florist Smart Advisor

    NASA Astrophysics Data System (ADS)

    Swee Wen, Khoo; Mahinderjit Singh, Manmeet

    2016-11-01

    Location based service is an information and entertainment service, accessible with mobile devices through the mobile network and utilizing the ability to make use of the geographical position of the mobile device. NFC location based service is using one of the modes of NFC such as peer-to-peer, reader/writer, and card emulation to obtain the information of the object and then get the location of the object. In this paper, the proposed solution is I- NFC-enabled Pervasive Social Networking apps for florists. It combines the NFC location based service with Online Social Network (OSN). In addition, a smart advisor in the system to provide output in making their own decision while purchasing products.The development of the system demonstrates that a designed commerce site is provided which enable a communication between NFC-enabled smartphone, NFC-enabled application and OSN. GPS functionalities also implemented to provide map and location of business services. Smart advisor also designed to provide information for users who do not have ideas what to purchase.

  4. Above-Campus Services: Shaping the Promise of Cloud Computing for Higher Education

    ERIC Educational Resources Information Center

    Wheeler, Brad; Waggener, Shelton

    2009-01-01

    The concept of today's cloud computing may date back to 1961, when John McCarthy, retired Stanford professor and Turing Award winner, delivered a speech at MIT's Centennial. In that speech, he predicted that in the future, computing would become a "public utility." Yet for colleges and universities, the recent growth of pervasive, very high speed…

  5. Ubiquitous computing in sports: A review and analysis.

    PubMed

    Baca, Arnold; Dabnichki, Peter; Heller, Mario; Kornfeind, Philipp

    2009-10-01

    Ubiquitous (pervasive) computing is a term for a synergetic use of sensing, communication and computing. Pervasive use of computing has seen a rapid increase in the current decade. This development has propagated in applied sport science and everyday life. The work presents a survey of recent developments in sport and leisure with emphasis on technology and computational techniques. A detailed analysis on new technological developments is performed. Sensors for position and motion detection, and such for equipment and physiological monitoring are discussed. Aspects of novel trends in communication technologies and data processing are outlined. Computational advancements have started a new trend - development of smart and intelligent systems for a wide range of applications - from model-based posture recognition to context awareness algorithms for nutrition monitoring. Examples particular to coaching and training are discussed. Selected tools for monitoring rules' compliance and automatic decision-making are outlined. Finally, applications in leisure and entertainment are presented, from systems supporting physical activity to systems providing motivation. It is concluded that the emphasis in future will shift from technologies to intelligent systems that allow for enhanced social interaction as efforts need to be made to improve user-friendliness and standardisation of measurement and transmission protocols.

  6. Cybersecurity Regulation of Wireless Devices for Performance and Assurance in the Age of “Medjacking”

    PubMed Central

    Armstrong, David G.; Kleidermacher, David N.; Klonoff, David C.; Slepian, Marvin J.

    2015-01-01

    We are rapidly reaching a point where, as connected devices for monitoring and treating diabetes and other diseases become more pervasive and powerful, the likelihood of malicious medical device hacking (known as “medjacking”) is growing. While government could increase regulation, we have all been witness in recent times to the limitations and issues surrounding exclusive reliance on government. Herein we outline a preliminary framework for establishing security for wireless health devices based on international common criteria. Creation of an independent medical device cybersecurity body is suggested. The goal is to allow for continued growth and innovation while simultaneously fostering security, public trust, and confidence. PMID:26319227

  7. Cybersecurity Regulation of Wireless Devices for Performance and Assurance in the Age of "Medjacking".

    PubMed

    Armstrong, David G; Kleidermacher, David N; Klonoff, David C; Slepian, Marvin J

    2015-08-27

    We are rapidly reaching a point where, as connected devices for monitoring and treating diabetes and other diseases become more pervasive and powerful, the likelihood of malicious medical device hacking (known as "medjacking") is growing. While government could increase regulation, we have all been witness in recent times to the limitations and issues surrounding exclusive reliance on government. Herein we outline a preliminary framework for establishing security for wireless health devices based on international common criteria. Creation of an independent medical device cybersecurity body is suggested. The goal is to allow for continued growth and innovation while simultaneously fostering security, public trust, and confidence. © 2015 Diabetes Technology Society.

  8. Soil Science in the Digital Age

    ERIC Educational Resources Information Center

    High, Vance; VanHorn, Laura

    2012-01-01

    With the pervasiveness of digital technology, elementary students almost instinctively begin inquiry-based instruction with a bias. Visual information from digital devices competes with elementary science inquiry. To counteract this effect, teachers can use advance organizers. The advance organizer is a tool or a mental learning aid to help…

  9. Behavioral Reference Model for Pervasive Healthcare Systems.

    PubMed

    Tahmasbi, Arezoo; Adabi, Sahar; Rezaee, Ali

    2016-12-01

    The emergence of mobile healthcare systems is an important outcome of application of pervasive computing concepts for medical care purposes. These systems provide the facilities and infrastructure required for automatic and ubiquitous sharing of medical information. Healthcare systems have a dynamic structure and configuration, therefore having an architecture is essential for future development of these systems. The need for increased response rate, problem limited storage, accelerated processing and etc. the tendency toward creating a new generation of healthcare system architecture highlight the need for further focus on cloud-based solutions for transfer data and data processing challenges. Integrity and reliability of healthcare systems are of critical importance, as even the slightest error may put the patients' lives in danger; therefore acquiring a behavioral model for these systems and developing the tools required to model their behaviors are of significant importance. The high-level designs may contain some flaws, therefor the system must be fully examined for different scenarios and conditions. This paper presents a software architecture for development of healthcare systems based on pervasive computing concepts, and then models the behavior of described system. A set of solutions are then proposed to improve the design's qualitative characteristics including, availability, interoperability and performance.

  10. Ubiquitous health monitoring and real-time cardiac arrhythmias detection: a case study.

    PubMed

    Li, Jian; Zhou, Haiying; Zuo, Decheng; Hou, Kun-Mean; De Vaulx, Christophe

    2014-01-01

    As the symptoms and signs of heart diseases that cause sudden cardiac death, cardiac arrhythmia has attracted great attention. Due to limitations in time and space, traditional approaches to cardiac arrhythmias detection fail to provide a real-time continuous monitoring and testing service applicable in different environmental conditions. Integrated with the latest technologies in ECG (electrocardiograph) analysis and medical care, the pervasive computing technology makes possible the ubiquitous cardiac care services, and thus brings about new technical challenges, especially in the formation of cardiac care architecture and realization of the real-time automatic ECG detection algorithm dedicated to care devices. In this paper, a ubiquitous cardiac care prototype system is presented with its architecture framework well elaborated. This prototype system has been tested and evaluated in all the clinical-/home-/outdoor-care modes with a satisfactory performance in providing real-time continuous cardiac arrhythmias monitoring service unlimitedly adaptable in time and space.

  11. Pervasive liquid metal based direct writing electronics with roller-ball pen

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zheng, Yi; Zhang, Qin; Liu, Jing, E-mail: jliu@mail.ipc.ac.cn

    A roller-ball pen enabled direct writing electronics via room temperature liquid metal ink was proposed. With the rolling to print mechanism, the metallic inks were smoothly written on flexible polymer substrate to form conductive tracks and electronic devices. The contact angle analyzer and scanning electron microscope were implemented to disclose several unique inner properties of the obtained electronics. An ever high writing resolution with line width and thickness as 200 μm and 80 μm, respectively was realized. Further, with the administration of external writing pressure, GaIn{sub 24.5} droplets embody increasing wettability on polymer which demonstrates the pervasive adaptability of themore » roller-ball pen electronics.« less

  12. Unlocking the Barriers to Women and Minorities in Computer Science and Information Systems Studies: Results from a Multi-Methodological Study Conducted at Two Minority Serving Institutions

    ERIC Educational Resources Information Center

    Buzzetto-More, Nicole; Ukoha, Ojiabo; Rustagi, Narendra

    2010-01-01

    The under representation of women and minorities in undergraduate computer science and information systems programs is a pervasive and persistent problem in the United States. Needed is a better understanding of the background and psychosocial factors that attract, or repel, minority students from computing disciplines. An examination of these…

  13. Health Informatics Program Design and Outcomes: Learning from an Early Offering at a Mid-Level University

    ERIC Educational Resources Information Center

    Parker, Kevin R.; Srinivasan, Sankara Subramanian; Houghton, Robert F.; Kordzadeh, Nima; Bozan, Karoly; Ottaway, Thomas; Davey, Bill

    2017-01-01

    Curriculum development is particularly challenging in computing-related disciplines as the computing industry changes more quickly than most. As information technology degrees have become relatively pervasive, some institutions that offer information systems degrees have recognized a need to develop specialist studies in information systems. This…

  14. Model Uncertainty and Robustness: A Computational Framework for Multimodel Analysis

    ERIC Educational Resources Information Center

    Young, Cristobal; Holsteen, Katherine

    2017-01-01

    Model uncertainty is pervasive in social science. A key question is how robust empirical results are to sensible changes in model specification. We present a new approach and applied statistical software for computational multimodel analysis. Our approach proceeds in two steps: First, we estimate the modeling distribution of estimates across all…

  15. Law School Experience in Pervasive Electronic Communications.

    ERIC Educational Resources Information Center

    Shiels, Rosemary

    1994-01-01

    Installation of a schoolwide local area computer network at Chicago-Kent College of Law (Illinois) is described. Uses of electronic mail within a course on computer law are described. Additional social, administrative, and research uses of electronic mail are noted as are positive effects and emerging problems (e.g., burdens on recipients and…

  16. A Framework for Safe Composition of Heterogeneous SOA Services in a Pervasive Computing Environment with Resource Constraints

    ERIC Educational Resources Information Center

    Reyes Alamo, Jose M.

    2010-01-01

    The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…

  17. Technology Leadership Preparedness: Principals' Perceptions

    ERIC Educational Resources Information Center

    Metcalf, Wendy; LaFrance, Jason

    2013-01-01

    Adopting technology in the K-12 classroom is evolving from adapting lessons that highlight a technology to pervasive use of interactive and handheld devices. In this environment, school leaders have the complex task of incorporating technologies to enhance teaching and learning. The purpose of this quasi-experimental quantitative study was to…

  18. Ensemble Manifold Rank Preserving for Acceleration-Based Human Activity Recognition.

    PubMed

    Tao, Dapeng; Jin, Lianwen; Yuan, Yuan; Xue, Yang

    2016-06-01

    With the rapid development of mobile devices and pervasive computing technologies, acceleration-based human activity recognition, a difficult yet essential problem in mobile apps, has received intensive attention recently. Different acceleration signals for representing different activities or even a same activity have different attributes, which causes troubles in normalizing the signals. We thus cannot directly compare these signals with each other, because they are embedded in a nonmetric space. Therefore, we present a nonmetric scheme that retains discriminative and robust frequency domain information by developing a novel ensemble manifold rank preserving (EMRP) algorithm. EMRP simultaneously considers three aspects: 1) it encodes the local geometry using the ranking order information of intraclass samples distributed on local patches; 2) it keeps the discriminative information by maximizing the margin between samples of different classes; and 3) it finds the optimal linear combination of the alignment matrices to approximate the intrinsic manifold lied in the data. Experiments are conducted on the South China University of Technology naturalistic 3-D acceleration-based activity dataset and the naturalistic mobile-devices based human activity dataset to demonstrate the robustness and effectiveness of the new nonmetric scheme for acceleration-based human activity recognition.

  19. An integrative architecture for a sensor-supported trust management system.

    PubMed

    Trček, Denis

    2012-01-01

    Trust plays a key role not only in e-worlds and emerging pervasive computing environments, but also already for millennia in human societies. Trust management solutions that have being around now for some fifteen years were primarily developed for the above mentioned cyber environments and they are typically focused on artificial agents, sensors, etc. However, this paper presents extensions of a new methodology together with architecture for trust management support that is focused on humans and human-like agents. With this methodology and architecture sensors play a crucial role. The architecture presents an already deployable tool for multi and interdisciplinary research in various areas where humans are involved. It provides new ways to obtain an insight into dynamics and evolution of such structures, not only in pervasive computing environments, but also in other important areas like management and decision making support.

  20. Scaling Task Management in Space and Time: Reducing User Overhead in Ubiquitous-Computing Environments

    DTIC Science & Technology

    2005-03-28

    consequently users are torn between taking advantage of increasingly pervasive computing systems, and the price (in attention and skill) that they have to... advantage of the surrounding computing environments; and (c) that it is usable by non-experts. Second, from a software architect’s perspective, we...take full advantage of the computing systems accessible to them, much as they take advantage of the furniture in each physical space. In the example

  1. Web-Based Seamless Migration for Task-Oriented Mobile Distance Learning

    ERIC Educational Resources Information Center

    Zhang, Degan; Li, Yuan-chao; Zhang, Huaiyu; Zhang, Xinshang; Zeng, Guangping

    2006-01-01

    As a new kind of computing paradigm, pervasive computing will meet the requirements of human being that anybody maybe obtain services in anywhere and at anytime, task-oriented seamless migration is one of its applications. Apparently, the function of seamless mobility is suitable for mobile services, such as mobile Web-based learning. In this…

  2. Automatic Generation of Just-in-Time Online Assessments from Software Design Models

    ERIC Educational Resources Information Center

    Zualkernan, Imran A.; El-Naaj, Salim Abou; Papadopoulos, Maria; Al-Amoudi, Budoor K.; Matthews, Charles E.

    2009-01-01

    Computer software is pervasive in today's society. The rate at which new versions of computer software products are released is phenomenal when compared to the release rate of new products in traditional industries such as aircraft building. This rapid rate of change can partially explain why most certifications in the software industry are…

  3. Neural and Behavioral Evidence for a Link between Mobile Technology Engagement and Intertemporal Preference

    ERIC Educational Resources Information Center

    Wilmer, Henry H.

    2017-01-01

    Mobile electronic devices such as smartphones are playing an increasingly pervasive role in our daily activities. A growing body of literature is beginning to investigate how mobile technology habits might relate to individual differences in cognitive traits. The present study is an investigation into how individual differences in intertemporal…

  4. Mapping the Daily Media Round: Novel Methods for Understanding Families' Mobile Technology Use

    ERIC Educational Resources Information Center

    Taylor, Katie Headrick; Takeuchi, Lori; Stevens, Reed

    2018-01-01

    The pervasiveness of mobile devices in families' homes has dramatically changed the physical and temporal arrangement of co-viewing media content; the representative image of American families seated around a TV set is an anachronism. But understanding and describing contemporary co-participation arrangements around digital media is challenging…

  5. Community-Based Networks for Challenged Environments

    ERIC Educational Resources Information Center

    Vigil-Hayes, Morgan Ashlee

    2017-01-01

    The Internet as a networked system has been rendered more complex than ever before as human endpoints are grafted into the system via increasingly pervasive and personalized networked devices. According to the United Nations, the Internet is a transnational enabler of a number of human rights, and as such, access to the Internet has been…

  6. Engaging research participants to inform the ethical conduct of mobile imaging, pervasive sensing, and location tracking research.

    PubMed

    Nebeker, Camille; Lagare, Tiffany; Takemoto, Michelle; Lewars, Brittany; Crist, Katie; Bloss, Cinnamon S; Kerr, Jacqueline

    2016-12-01

    Researchers utilize mobile imaging, pervasive sensing, social media, and location tracking (MISST) technologies to observe and intervene with participants in their natural environment. The use of MISST methods and tools introduces unique ethical issues due to the type and quantity of data, and produces raising new challenges around informed consent, risk assessment, and data management. Since MISST methods are relatively new in behavioral research, there is little documented evidence to guide institutional review board (IRB) risk assessment and inform appropriate risk management strategies. This study was conducted to contribute the participant perspectives when considering ethical and responsible practices. Participants (n = 82) enrolled in an observational study where they wore several MISST devices for 1 week completed an exit survey. Survey items focused on the following: 1-device comfort, 2-informed consent, 3-privacy protections, and 4-bystander engagement. The informed consent process reflected participant actual experience. Device comfort and privacy were raised as concerns to both the participants and bystanders. While the majority of the participants reported a positive experience, it is important to note that the participants were volunteers who were not mandated to wear tracking devices and that persons who are mandated may not have a similar response. Findings support strategies proposed in the Kelly et al. (2013) ethical framework, which emphasizes procedures to improve informed consent, protect privacy, manage data, and respect bystander rights when using a wearable camera.

  7. One-Time URL: A Proximity Security Mechanism between Internet of Things and Mobile Devices.

    PubMed

    Solano, Antonio; Dormido, Raquel; Duro, Natividad; González, Víctor

    2016-10-13

    The aim of this paper is to determine the physical proximity of connected things when they are accessed from a smartphone. Links between connected things and mobile communication devices are temporarily created by means of dynamic URLs (uniform resource locators) which may be easily discovered with pervasive short-range radio frequency technologies available on smartphones. In addition, a multi cross domain silent logging mechanism to allow people to interact with their surrounding connected things from their mobile communication devices is presented. The proposed mechanisms are based in web standards technologies, evolving our social network of Internet of Things towards the so-called Web of Things.

  8. Distilling Big Data: Refining Quality Information in the Era of Yottabytes

    PubMed Central

    Subramaniam, Srinivasan; Ramasamy, Chandrasekeran

    2015-01-01

    Big Data is the buzzword of the modern century. With the invasion of pervasive computing, we live in a data centric environment, where we always leave a track of data related to our day to day activities. Be it a visit to a shopping mall or hospital or surfing Internet, we create voluminous data related to credit card transactions, user details, location information, and so on. These trails of data simply define an individual and form the backbone for user-profiling. With the mobile phones and their easy access to online social networks on the go, sensor data such as geo-taggings and events and sentiments around them contribute to the already overwhelming data containers. With reductions in the cost of storage and computational devices and with increasing proliferation of Cloud, we never felt any constraints in storing or processing such data. Eventually we end up having several exabytes of data and analysing them for their usefulness has introduced new frontiers of research. Effective distillation of these data is the need of the hour to improve the veracity of the Big Data. This research targets the utilization of the Fuzzy Bayesian process model to improve the quality of information in Big Data. PMID:26495424

  9. Distilling Big Data: Refining Quality Information in the Era of Yottabytes.

    PubMed

    Ramachandramurthy, Sivaraman; Subramaniam, Srinivasan; Ramasamy, Chandrasekeran

    2015-01-01

    Big Data is the buzzword of the modern century. With the invasion of pervasive computing, we live in a data centric environment, where we always leave a track of data related to our day to day activities. Be it a visit to a shopping mall or hospital or surfing Internet, we create voluminous data related to credit card transactions, user details, location information, and so on. These trails of data simply define an individual and form the backbone for user-profiling. With the mobile phones and their easy access to online social networks on the go, sensor data such as geo-taggings and events and sentiments around them contribute to the already overwhelming data containers. With reductions in the cost of storage and computational devices and with increasing proliferation of Cloud, we never felt any constraints in storing or processing such data. Eventually we end up having several exabytes of data and analysing them for their usefulness has introduced new frontiers of research. Effective distillation of these data is the need of the hour to improve the veracity of the Big Data. This research targets the utilization of the Fuzzy Bayesian process model to improve the quality of information in Big Data.

  10. An Integrative Architecture for a Sensor-Supported Trust Management System

    PubMed Central

    Trček, Denis

    2012-01-01

    Trust plays a key role not only in e-worlds and emerging pervasive computing environments, but also already for millennia in human societies. Trust management solutions that have being around now for some fifteen years were primarily developed for the above mentioned cyber environments and they are typically focused on artificial agents, sensors, etc. However, this paper presents extensions of a new methodology together with architecture for trust management support that is focused on humans and human-like agents. With this methodology and architecture sensors play a crucial role. The architecture presents an already deployable tool for multi and interdisciplinary research in various areas where humans are involved. It provides new ways to obtain an insight into dynamics and evolution of such structures, not only in pervasive computing environments, but also in other important areas like management and decision making support. PMID:23112628

  11. Distributed Accounting on the Grid

    NASA Technical Reports Server (NTRS)

    Thigpen, William; Hacker, Thomas J.; McGinnis, Laura F.; Athey, Brian D.

    2001-01-01

    By the late 1990s, the Internet was adequately equipped to move vast amounts of data between HPC (High Performance Computing) systems, and efforts were initiated to link together the national infrastructure of high performance computational and data storage resources together into a general computational utility 'grid', analogous to the national electrical power grid infrastructure. The purpose of the Computational grid is to provide dependable, consistent, pervasive, and inexpensive access to computational resources for the computing community in the form of a computing utility. This paper presents a fully distributed view of Grid usage accounting and a methodology for allocating Grid computational resources for use on a Grid computing system.

  12. What's "Smart" about Working from Home: Telework and the Sustainable Consumption of Distance in Ireland?

    ERIC Educational Resources Information Center

    Hynes, Michael

    2013-01-01

    The use of technology is pervasive in contemporary society, transforming lives and work environments. The internet and the availability of portable personal communication devices have resulted in immense societal change. Frequently held views of the relationship between individuals and technology are dominated by a production-centric perspective,…

  13. Digital Youth in Brick and Mortar Schools: Examining the Complex Interplay of Students, Technology, Education, and Change

    ERIC Educational Resources Information Center

    Peck, Craig; Hewitt, Kimberly Kappler; Mullen, Carol A.; Lashley, Carl A.; Eldridge, John A.; Douglas, Ty-Ron M. O.

    2015-01-01

    Context: The past decade has witnessed a sustained emphasis on information and communication technologies (ICT) in education, coupled with the rise of online social media and increasing pervasiveness of personal media devices. Research Question: Our research question asked: How has this changing context affected the educational experiences of…

  14. Integrative Technology-Enhanced Physical Education: An Exploratory Study with Elementary School Students

    ERIC Educational Resources Information Center

    Barbee, Stephanie S.

    2017-01-01

    Wearable technology has made a positive impact in the consumer industry with its focus on adult fitness. Devices and applications are pervasive, inexpensive and are in high demand. Our nation struggles with obesity and health concerns related to poor fitness. However, the research on such technology has been more focused on adults. Therefore, the…

  15. Mechanically flexible optically transparent silicon fabric with high thermal budget devices from bulk silicon (100)

    NASA Astrophysics Data System (ADS)

    Hussain, Muhammad M.; Rojas, Jhonathan P.; Torres Sevilla, Galo A.

    2013-05-01

    Today's information age is driven by silicon based electronics. For nearly four decades semiconductor industry has perfected the fabrication process of continuingly scaled transistor - heart of modern day electronics. In future, silicon industry will be more pervasive, whose application will range from ultra-mobile computation to bio-integrated medical electronics. Emergence of flexible electronics opens up interesting opportunities to expand the horizon of electronics industry. However, silicon - industry's darling material is rigid and brittle. Therefore, we report a generic batch fabrication process to convert nearly any silicon electronics into a flexible one without compromising its (i) performance; (ii) ultra-large-scale-integration complexity to integrate billions of transistors within small areas; (iii) state-of-the-art process compatibility, (iv) advanced materials used in modern semiconductor technology; (v) the most widely used and well-studied low-cost substrate mono-crystalline bulk silicon (100). In our process, we make trenches using anisotropic reactive ion etching (RIE) in the inactive areas (in between the devices) of a silicon substrate (after the devices have been fabricated following the regular CMOS process), followed by a dielectric based spacer formation to protect the sidewall of the trench and then performing an isotropic etch to create caves in silicon. When these caves meet with each other the top portion of the silicon with the devices is ready to be peeled off from the bottom silicon substrate. Release process does not need to use any external support. Released silicon fabric (25 μm thick) is mechanically flexible (5 mm bending radius) and the trenches make it semi-transparent (transparency of 7%).

  16. AI Techniques in a Context-Aware Ubiquitous Environment

    NASA Astrophysics Data System (ADS)

    Coppola, Paolo; Mea, Vincenzo Della; di Gaspero, Luca; Lomuscio, Raffaella; Mischis, Danny; Mizzaro, Stefano; Nazzi, Elena; Scagnetto, Ivan; Vassena, Luca

    Nowadays, the mobile computing paradigm and the widespread diffusion of mobile devices are quickly changing and replacing many common assumptions about software architectures and interaction/communication models. The environment, in particular, or more generally, the so-called user context is claiming a central role in everyday’s use of cellular phones, PDAs, etc. This is due to the huge amount of data “suggested” by the surrounding environment that can be helpful in many common tasks. For instance, the current context can help a search engine to refine the set of results in a useful way, providing the user with a more suitable and exploitable information. Moreover, we can take full advantage of this new data source by “pushing” active contents towards mobile devices, empowering the latter with new features (e.g., applications) that can allow the user to fruitfully interact with the current context. Following this vision, mobile devices become dynamic self-adapting tools, according to the user needs and the possibilities offered by the environment. The present work proposes MoBe: an approach for providing a basic infrastructure for pervasive context-aware applications on mobile devices, in which AI techniques (namely a principled combination of rule-based systems, Bayesian networks and ontologies) are applied to context inference. The aim is to devise a general inferential framework to make easier the development of context-aware applications by integrating the information coming from physical and logical sensors (e.g., position, agenda) and reasoning about this information in order to infer new and more abstract contexts.

  17. Interleaving Semantic Web Reasoning and Service Discovery to Enforce Context-Sensitive Security and Privacy Policies

    DTIC Science & Technology

    2005-07-01

    policies in pervasive computing environments. In this context, the owner of information sources (e.g. user, sensor, application, or organization...work in decentralized trust management and semantic web technologies . Section 3 introduces an Information Disclosure Agent architecture for...Norman Sadeh July 2005 CMU-ISRI-05-113 School of Computer Science, Carnegie Mellon University 5000 Forbes Avenue, Pittsburgh, PA, 15213

  18. A Petrochemical Primer.

    ERIC Educational Resources Information Center

    Martin, Amy

    1991-01-01

    Informs the reader of the pervasiveness of petrochemicals in everyday life. Discusses the petroleum-to-petrochemical transformation at the refinery and issues related to how petroleum products will be utilized for fuel or nonfuel needs such as lubricants, computers, and medicine in the future. (MDH)

  19. Ubiquitous Mobile Knowledge Construction in Collaborative Learning Environments

    PubMed Central

    Baloian, Nelson; Zurita, Gustavo

    2012-01-01

    Knowledge management is a critical activity for any organization. It has been said to be a differentiating factor and an important source of competitiveness if this knowledge is constructed and shared among its members, thus creating a learning organization. Knowledge construction is critical for any collaborative organizational learning environment. Nowadays workers must perform knowledge creation tasks while in motion, not just in static physical locations; therefore it is also required that knowledge construction activities be performed in ubiquitous scenarios, and supported by mobile and pervasive computational systems. These knowledge creation systems should help people in or outside organizations convert their tacit knowledge into explicit knowledge, thus supporting the knowledge construction process. Therefore in our understanding, we consider highly relevant that undergraduate university students learn about the knowledge construction process supported by mobile and ubiquitous computing. This has been a little explored issue in this field. This paper presents the design, implementation, and an evaluation of a system called MCKC for Mobile Collaborative Knowledge Construction, supporting collaborative face-to-face tacit knowledge construction and sharing in ubiquitous scenarios. The MCKC system can be used by undergraduate students to learn how to construct knowledge, allowing them anytime and anywhere to create, make explicit and share their knowledge with their co-learners, using visual metaphors, gestures and sketches to implement the human-computer interface of mobile devices (PDAs). PMID:22969333

  20. Ubiquitous mobile knowledge construction in collaborative learning environments.

    PubMed

    Baloian, Nelson; Zurita, Gustavo

    2012-01-01

    Knowledge management is a critical activity for any organization. It has been said to be a differentiating factor and an important source of competitiveness if this knowledge is constructed and shared among its members, thus creating a learning organization. Knowledge construction is critical for any collaborative organizational learning environment. Nowadays workers must perform knowledge creation tasks while in motion, not just in static physical locations; therefore it is also required that knowledge construction activities be performed in ubiquitous scenarios, and supported by mobile and pervasive computational systems. These knowledge creation systems should help people in or outside organizations convert their tacit knowledge into explicit knowledge, thus supporting the knowledge construction process. Therefore in our understanding, we consider highly relevant that undergraduate university students learn about the knowledge construction process supported by mobile and ubiquitous computing. This has been a little explored issue in this field. This paper presents the design, implementation, and an evaluation of a system called MCKC for Mobile Collaborative Knowledge Construction, supporting collaborative face-to-face tacit knowledge construction and sharing in ubiquitous scenarios. The MCKC system can be used by undergraduate students to learn how to construct knowledge, allowing them anytime and anywhere to create, make explicit and share their knowledge with their co-learners, using visual metaphors, gestures and sketches to implement the human-computer interface of mobile devices (PDAs).

  1. Bio-inspired Autonomic Structures: a middleware for Telecommunications Ecosystems

    NASA Astrophysics Data System (ADS)

    Manzalini, Antonio; Minerva, Roberto; Moiso, Corrado

    Today, people are making use of several devices for communications, for accessing multi-media content services, for data/information retrieving, for processing, computing, etc.: examples are laptops, PDAs, mobile phones, digital cameras, mp3 players, smart cards and smart appliances. One of the most attracting service scenarios for future Telecommunications and Internet is the one where people will be able to browse any object in the environment they live: communications, sensing and processing of data and services will be highly pervasive. In this vision, people, machines, artifacts and the surrounding space will create a kind of computational environment and, at the same time, the interfaces to the network resources. A challenging technological issue will be interconnection and management of heterogeneous systems and a huge amount of small devices tied together in networks of networks. Moreover, future network and service infrastructures should be able to provide Users and Application Developers (at different levels, e.g., residential Users but also SMEs, LEs, ASPs/Web2.0 Service roviders, ISPs, Content Providers, etc.) with the most appropriate "environment" according to their context and specific needs. Operators must be ready to manage such level of complication enabling their latforms with technological advanced allowing network and services self-supervision and self-adaptation capabilities. Autonomic software solutions, enhanced with innovative bio-inspired mechanisms and algorithms, are promising areas of long term research to face such challenges. This chapter proposes a bio-inspired autonomic middleware capable of leveraging the assets of the underlying network infrastructure whilst, at the same time, supporting the development of future Telecommunications and Internet Ecosystems.

  2. One-Time URL: A Proximity Security Mechanism between Internet of Things and Mobile Devices

    PubMed Central

    Solano, Antonio; Dormido, Raquel; Duro, Natividad; González, Víctor

    2016-01-01

    The aim of this paper is to determine the physical proximity of connected things when they are accessed from a smartphone. Links between connected things and mobile communication devices are temporarily created by means of dynamic URLs (uniform resource locators) which may be easily discovered with pervasive short-range radio frequency technologies available on smartphones. In addition, a multi cross domain silent logging mechanism to allow people to interact with their surrounding connected things from their mobile communication devices is presented. The proposed mechanisms are based in web standards technologies, evolving our social network of Internet of Things towards the so-called Web of Things. PMID:27754378

  3. Modeling Patterns of Activities using Activity Curves

    PubMed Central

    Dawadi, Prafulla N.; Cook, Diane J.; Schmitter-Edgecombe, Maureen

    2016-01-01

    Pervasive computing offers an unprecedented opportunity to unobtrusively monitor behavior and use the large amount of collected data to perform analysis of activity-based behavioral patterns. In this paper, we introduce the notion of an activity curve, which represents an abstraction of an individual’s normal daily routine based on automatically-recognized activities. We propose methods to detect changes in behavioral routines by comparing activity curves and use these changes to analyze the possibility of changes in cognitive or physical health. We demonstrate our model and evaluate our change detection approach using a longitudinal smart home sensor dataset collected from 18 smart homes with older adult residents. Finally, we demonstrate how big data-based pervasive analytics such as activity curve-based change detection can be used to perform functional health assessment. Our evaluation indicates that correlations do exist between behavior and health changes and that these changes can be automatically detected using smart homes, machine learning, and big data-based pervasive analytics. PMID:27346990

  4. Modeling Patterns of Activities using Activity Curves.

    PubMed

    Dawadi, Prafulla N; Cook, Diane J; Schmitter-Edgecombe, Maureen

    2016-06-01

    Pervasive computing offers an unprecedented opportunity to unobtrusively monitor behavior and use the large amount of collected data to perform analysis of activity-based behavioral patterns. In this paper, we introduce the notion of an activity curve , which represents an abstraction of an individual's normal daily routine based on automatically-recognized activities. We propose methods to detect changes in behavioral routines by comparing activity curves and use these changes to analyze the possibility of changes in cognitive or physical health. We demonstrate our model and evaluate our change detection approach using a longitudinal smart home sensor dataset collected from 18 smart homes with older adult residents. Finally, we demonstrate how big data-based pervasive analytics such as activity curve-based change detection can be used to perform functional health assessment. Our evaluation indicates that correlations do exist between behavior and health changes and that these changes can be automatically detected using smart homes, machine learning, and big data-based pervasive analytics.

  5. Framework of sensor-based monitoring for pervasive patient care.

    PubMed

    Triantafyllidis, Andreas K; Koutkias, Vassilis G; Chouvarda, Ioanna; Adami, Ilia; Kouroubali, Angelina; Maglaveras, Nicos

    2016-09-01

    Sensor-based health systems can often become difficult to use, extend and sustain. The authors propose a framework for designing sensor-based health monitoring systems aiming to provide extensible and usable monitoring services in the scope of pervasive patient care. The authors' approach relies on a distributed system for monitoring the patient health status anytime-anywhere and detecting potential health complications, for which healthcare professionals and patients are notified accordingly. Portable or wearable sensing devices measure the patient's physiological parameters, a smart mobile device collects and analyses the sensor data, a Medical Center system receives notifications on the detected health condition, and a Health Professional Platform is used by formal caregivers in order to review the patient condition and configure monitoring schemas. A Service-oriented architecture is utilised to provide extensible functional components and interoperable interactions among the diversified system components. The framework was applied within the REMOTE ambient-assisted living project in which a prototype system was developed, utilising Bluetooth to communicate with the sensors and Web services for data exchange. A scenario of using the REMOTE system and preliminary usability results show the applicability, usefulness and virtue of our approach.

  6. Framework of sensor-based monitoring for pervasive patient care

    PubMed Central

    Koutkias, Vassilis G.; Chouvarda, Ioanna; Adami, Ilia; Kouroubali, Angelina; Maglaveras, Nicos

    2016-01-01

    Sensor-based health systems can often become difficult to use, extend and sustain. The authors propose a framework for designing sensor-based health monitoring systems aiming to provide extensible and usable monitoring services in the scope of pervasive patient care. The authors’ approach relies on a distributed system for monitoring the patient health status anytime-anywhere and detecting potential health complications, for which healthcare professionals and patients are notified accordingly. Portable or wearable sensing devices measure the patient's physiological parameters, a smart mobile device collects and analyses the sensor data, a Medical Center system receives notifications on the detected health condition, and a Health Professional Platform is used by formal caregivers in order to review the patient condition and configure monitoring schemas. A Service-oriented architecture is utilised to provide extensible functional components and interoperable interactions among the diversified system components. The framework was applied within the REMOTE ambient-assisted living project in which a prototype system was developed, utilising Bluetooth to communicate with the sensors and Web services for data exchange. A scenario of using the REMOTE system and preliminary usability results show the applicability, usefulness and virtue of our approach. PMID:27733920

  7. Augmenting Trust Establishment in Dynamic Systems with Social Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lagesse, Brent J; Kumar, Mohan; Venkatesh, Svetha

    2010-01-01

    Social networking has recently flourished in popularity through the use of social websites. Pervasive computing resources have allowed people stay well-connected to each other through access to social networking resources. We take the position that utilizing information produced by relationships within social networks can assist in the establishment of trust for other pervasive computing applications. Furthermore, we describe how such a system can augment a sensor infrastructure used for event observation with information from mobile sensors (ie, mobile phones with cameras) controlled by potentially untrusted third parties. Pervasive computing systems are invisible systems, oriented around the user. As a result,more » many future pervasive systems are likely to include a social aspect to the system. The social communities that are developed in these systems can augment existing trust mechanisms with information about pre-trusted entities or entities to initially consider when beginning to establish trust. An example of such a system is the Collaborative Virtual Observation (CoVO) system fuses sensor information from disaparate sources in soft real-time to recreate a scene that provides observation of an event that has recently transpired. To accomplish this, CoVO must efficently access services whilst protecting the data from corruption from unknown remote nodes. CoVO combines dynamic service composition with virtual observation to utilize existing infrastructure with third party services available in the environment. Since these services are not under the control of the system, they may be unreliable or malicious. When an event of interest occurs, the given infrastructure (bus cameras, etc.) may not sufficiently cover the necessary information (be it in space, time, or sensor type). To enhance observation of the event, infrastructure is augmented with information from sensors in the environment that the infrastructure does not control. These sensors may be unreliable, uncooperative, or even malicious. Additionally, to execute queries in soft real-time, processing must be distributed to available systems in the environment. We propose to use information from social networks to satisfy these requirements. In this paper, we present our position that knowledge gained from social activities can be used to augment trust mechanisms in pervasive computing. The system uses social behavior of nodes to predict a subset that it wants to query for information. In this context, social behavior such as transit patterns and schedules (which can be used to determine if a queried node is likely to be reliable) or known relationships, such as a phone's address book, that can be used to determine networks of nodes that may also be able to assist in retrieving information. Neither implicit nor explicit relationships necessarily imply that the user trusts an entity, but rather will provide a starting place for establishing trust. The proposed framework utilizes social network information to assist in trust establishment when third-party sensors are used for sensing events.« less

  8. Low-level laser/light therapy for androgenetic alopecia.

    PubMed

    Gupta, Aditya K; Lyons, Danika C A; Abramovits, William

    2014-01-01

    Androgenetic alopecia (AGA) is a persistent and pervasive condition that affects men worldwide. Some common treatment options for AGA include hair prosthetics, oral and topical medications, and surgical hair restoration (SHR). Pharmaceutical and SHR treatments are associated with limitations including adverse side effects and significant financial burden. Low-level laser or light (LLL) devices offer alternative treatment options that are not typically associated with adverse side effects or significant costs. There are clinic- and home-based LLL devices. One home-based laser comb device has set a standard for others; however, this device requires time devoted to carefully moving the comb through the hair to allow laser penetration to the scalp. A novel helmet-like LLL device for hair growth has proven effective in preliminary trials and allows for hands-free use. Regardless, there are few clinical trials that have been conducted regarding LLL devices for AGA and results are mixed. Further research is required to establish the true efficacy of these devices for hair growth in comparison to existing alternative therapies.

  9. Pervasive sensing

    NASA Astrophysics Data System (ADS)

    Nagel, David J.

    2000-11-01

    The coordinated exploitation of modern communication, micro- sensor and computer technologies makes it possible to give global reach to our senses. Web-cameras for vision, web- microphones for hearing and web-'noses' for smelling, plus the abilities to sense many factors we cannot ordinarily perceive, are either available or will be soon. Applications include (1) determination of weather and environmental conditions on dense grids or over large areas, (2) monitoring of energy usage in buildings, (3) sensing the condition of hardware in electrical power distribution and information systems, (4) improving process control and other manufacturing, (5) development of intelligent terrestrial, marine, aeronautical and space transportation systems, (6) managing the continuum of routine security monitoring, diverse crises and military actions, and (7) medicine, notably the monitoring of the physiology and living conditions of individuals. Some of the emerging capabilities, such as the ability to measure remotely the conditions inside of people in real time, raise interesting social concerns centered on privacy issues. Methods for sensor data fusion and designs for human-computer interfaces are both crucial for the full realization of the potential of pervasive sensing. Computer-generated virtual reality, augmented with real-time sensor data, should be an effective means for presenting information from distributed sensors.

  10. A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks.

    PubMed

    Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N

    2015-12-01

    With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.

  11. A Pervasive Parallel Processing Framework for Data Visualization and Analysis at Extreme Scale

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma, Kwan-Liu

    Most of today’s visualization libraries and applications are based off of what is known today as the visualization pipeline. In the visualization pipeline model, algorithms are encapsulated as “filtering” components with inputs and outputs. These components can be combined by connecting the outputs of one filter to the inputs of another filter. The visualization pipeline model is popular because it provides a convenient abstraction that allows users to combine algorithms in powerful ways. Unfortunately, the visualization pipeline cannot run effectively on exascale computers. Experts agree that the exascale machine will comprise processors that contain many cores. Furthermore, physical limitations willmore » prevent data movement in and out of the chip (that is, between main memory and the processing cores) from keeping pace with improvements in overall compute performance. To use these processors to their fullest capability, it is essential to carefully consider memory access. This is where the visualization pipeline fails. Each filtering component in the visualization library is expected to take a data set in its entirety, perform some computation across all of the elements, and output the complete results. The process of iterating over all elements must be repeated in each filter, which is one of the worst possible ways to traverse memory when trying to maximize the number of executions per memory access. This project investigates a new type of visualization framework that exhibits a pervasive parallelism necessary to run on exascale machines. Our framework achieves this by defining algorithms in terms of functors, which are localized, stateless operations. Functors can be composited in much the same way as filters in the visualization pipeline. But, functors’ design allows them to be concurrently running on massive amounts of lightweight threads. Only with such fine-grained parallelism can we hope to fill the billions of threads we expect will be necessary for efficient computation on an exascale computer. This project concludes with a functional prototype containing pervasively parallel algorithms that perform demonstratively well on many-core processors. These algorithms are fundamental for performing data analysis and visualization at extreme scale.« less

  12. Science and Technology Undergraduate Students' Use of the Internet, Cell Phones and Social Networking Sites to Access Library Information

    ERIC Educational Resources Information Center

    Salisbury, Lutishoor; Laincz, Jozef; Smith, Jeremy J.

    2012-01-01

    Many academic libraries and publishers have developed mobile-optimized versions of their web sites and catalogs. Almost all database vendors and major journal publishers have provided a way to connect to their resources via the Internet and the mobile web. In light of this pervasive use of the Internet, mobile devices and social networking, this…

  13. Acceptable Use Policies in a Web 2.0 & Mobile Era: A Guide for School Districts

    ERIC Educational Resources Information Center

    Consortium for School Networking (NJ1), 2011

    2011-01-01

    Web 2.0 applications and mobile Internet devices have added new issues to the safety/access situation for schools. The purpose of this guide is to assist school districts in developing, rethinking, or revising Internet policies as a consequence of the emergence of Web 2.0, and the growing pervasiveness of smart phone use. The Consortium for School…

  14. Video and computer games: effect on children and implications for health education.

    PubMed

    Dorman, S M

    1997-04-01

    Video and computer-based games have assumed a prominent role in the culture of American children and adolescents. Given the pervasiveness of their influence, it is likely that these games may affect the health and well-being of children. This paper examines the health effects of these games on children, suggests criteria upon which parents and teachers may evaluate the games, and notes some implications for health educators.

  15. An Infrastructure for Multi-Level Secure Service-Oriented Architecture (MLS-SOA) Using the Multiple Single-Level Approach

    DTIC Science & Technology

    2009-12-17

    IEEE TDKE, 1996. 8( 1). 14. Garvey, T.D., The inference Problem for Computer Security. 1992, SRI International. 15. Chaum , D ., Blind Signatures for...Pervasive Computing Environments. IEEE Transactions on Vehicular Technology, 2006. 55(4). 17. Chaum , D ., Security without Identification: Transaction...Systems to make Big Brother Obsolete. Communications of the ACM 1985. 28(10). 18. Chaum , D ., Untraceable Electronic Mail, Return Addresses, and Digital

  16. Investigating the Randomness of Numbers

    ERIC Educational Resources Information Center

    Pendleton, Kenn L.

    2009-01-01

    The use of random numbers is pervasive in today's world. Random numbers have practical applications in such far-flung arenas as computer simulations, cryptography, gambling, the legal system, statistical sampling, and even the war on terrorism. Evaluating the randomness of extremely large samples is a complex, intricate process. However, the…

  17. Principled design for an integrated computational environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Disessa, A.A.

    Boxer is a computer language designed to be the base of an integrated computational environment providing a broad array of functionality -- from text editing to programming -- for naive and novice users. It stands in the line of Lisp inspired languages (Lisp, Logo, Scheme), but differs from these in achieving much of its understandability from pervasive use of a spatial metaphor reinforced through suitable graphics. This paper describes a set of learnability and understandability issues first and then uses them to motivate design decisions made concerning Boxer and the environment in which it is embedded.

  18. Screen Media and Young Children: Who Benefits?

    ERIC Educational Resources Information Center

    Cardany, Audrey Berger

    2010-01-01

    Since the airing of "Sesame Street" in 1985, television produced for children has expanded to more television shows and educational media that includes videos, DVDs, and computer products. Viewing screen media is pervasive in the environments of young children, and companies are designing products for our youngest viewers--infants and toddlers.…

  19. The Gamification of Learning

    ERIC Educational Resources Information Center

    Renaud, Christian; Wagoner, Bridgette

    2011-01-01

    The use of computer-based gaming in education is not a new phenomenon. Many educators nostalgically remember green Apple II monitors displaying the games Lemonade Stand and Oregon Trail in the early 1980s. Technology in schools has evolved considerably since then, and gaming has become pervasive within all demographic subgroups. Gaming within…

  20. Programmer/Analyst Guide for the Army Unit Resiliency Analysis (AURA) computer Simulation Model. Volume 1. AURA Methodology

    DTIC Science & Technology

    1990-10-01

    involving a heavy artillery barrage, the impact point output alone could consume upwards of 10,000 pages of computer paper. For this reason, AURA provides...but pervasive factor: the asset allocation model must be compatible with the mathematical behavior of the input data. Thus, for example, if assets are...described as expendable during repair or decontamination activities, it must have HOMELINKS which appear in the consuming repair SUBCHAINs

  1. Engineering Amorphous Systems, Using Global-to-Local Compilation

    NASA Astrophysics Data System (ADS)

    Nagpal, Radhika

    Emerging technologies are making it possible to assemble systems that incorporate myriad of information-processing units at almost no cost: smart materials, selfassembling structures, vast sensor networks, pervasive computing. How does one engineer robust and prespecified global behavior from the local interactions of immense numbers of unreliable parts? We discuss organizing principles and programming methodologies that have emerged from Amorphous Computing research, that allow us to compile a specification of global behavior into a robust program for local behavior.

  2. Vigil: Providing Trust for Enhanced Security in Pervasive Systems

    DTIC Science & Technology

    2005-01-01

    environment consisting of Bluetooth, Infrared, 802.11b and Ethernet. Vigil is the extension and culmination of our two previous projects: Centaurus [22] and...Centau- rus2 [36]. The main design goal of the Centaurus project was the development of a framework for building portals to services using various...types of mobile devices. Centaurus provides a uniform infrastructure for access to heterogeneous hardware and software components. It uses a language

  3. Smart phones: platform enabling modular, chemical, biological, and explosives sensing

    NASA Astrophysics Data System (ADS)

    Finch, Amethist S.; Coppock, Matthew; Bickford, Justin R.; Conn, Marvin A.; Proctor, Thomas J.; Stratis-Cullum, Dimitra N.

    2013-05-01

    Reliable, robust, and portable technologies are needed for the rapid identification and detection of chemical, biological, and explosive (CBE) materials. A key to addressing the persistent threat to U.S. troops in the current war on terror is the rapid detection and identification of the precursor materials used in development of improvised explosive devices, homemade explosives, and bio-warfare agents. However, a universal methodology for detection and prevention of CBE materials in the use of these devices has proven difficult. Herein, we discuss our efforts towards the development of a modular, robust, inexpensive, pervasive, archival, and compact platform (android based smart phone) enabling the rapid detection of these materials.

  4. An LDPC Decoder Architecture for Wireless Sensor Network Applications

    PubMed Central

    Giancarlo Biroli, Andrea Dario; Martina, Maurizio; Masera, Guido

    2012-01-01

    The pervasive use of wireless sensors in a growing spectrum of human activities reinforces the need for devices with low energy dissipation. In this work, coded communication between a couple of wireless sensor devices is considered as a method to reduce the dissipated energy per transmitted bit with respect to uncoded communication. Different Low Density Parity Check (LDPC) codes are considered to this purpose and post layout results are shown for a low-area low-energy decoder, which offers percentage energy savings with respect to the uncoded solution in the range of 40%–80%, depending on considered environment, distance and bit error rate. PMID:22438724

  5. An LDPC decoder architecture for wireless sensor network applications.

    PubMed

    Biroli, Andrea Dario Giancarlo; Martina, Maurizio; Masera, Guido

    2012-01-01

    The pervasive use of wireless sensors in a growing spectrum of human activities reinforces the need for devices with low energy dissipation. In this work, coded communication between a couple of wireless sensor devices is considered as a method to reduce the dissipated energy per transmitted bit with respect to uncoded communication. Different Low Density Parity Check (LDPC) codes are considered to this purpose and post layout results are shown for a low-area low-energy decoder, which offers percentage energy savings with respect to the uncoded solution in the range of 40%-80%, depending on considered environment, distance and bit error rate.

  6. Digital modulation and achievable information rates of thru-body haptic communications

    NASA Astrophysics Data System (ADS)

    Hanisch, Natalie; Pierobon, Massimiliano

    2017-05-01

    The ever increasing biocompatibility and pervasive nature of wearable and implantable devices demand novel sustainable solutions to realize their connectivity, which can impact broad application scenarios such as in the defense, biomedicine, and entertainment fields. Where wireless electromagnetic communications are facing challenges such as device miniaturization, energy scarcity, limited range, and possibility of interception, solutions not only inspired but also based on natural communication means might result into valid alternatives. In this paper, a communication paradigm where digital information is propagated through the nervous system is proposed and analyzed on the basis of achievable information rates. In particular, this paradigm is based on an analytical framework where the response of a system based on haptic (tactile) information transmission and ElectroEncephaloGraphy (EEG)-based reception is modeled and characterized. Computational neuroscience models of the somatosensory signal representation in the brain, coupled with models of the generation and propagation of somatosensory stimulation from skin mechanoreceptors, are employed in this paper to provide a proof-of-concept evaluation of achievable performance in encoding information bits into tactile stimulation, and decoding them from the recorded brain activity. Based on these models, the system is simulated and the resulting data are utilized to train a Support Vector Machine (SVM) classifier, which is finally used to provide a proof-of-concept validation of the system performance in terms of information rates against bit error probability at the reception.

  7. Mobile technology habits: patterns of association among device usage, intertemporal preference, impulse control, and reward sensitivity.

    PubMed

    Wilmer, Henry H; Chein, Jason M

    2016-10-01

    Mobile electronic devices are playing an increasingly pervasive role in our daily activities. Yet, there has been very little empirical research investigating how mobile technology habits might relate to individual differences in cognition and affect. The research presented in this paper provides evidence that heavier investment in mobile devices is correlated with a relatively weaker tendency to delay gratification (as measured by a delay discounting task) and a greater inclination toward impulsive behavior (i.e., weaker impulse control, assessed behaviorally and through self-report) but is not related to individual differences in sensitivity to reward. Analyses further demonstrated that individual variation in impulse control mediates the relationship between mobile technology usage and delay of gratification. Although based on correlational results, these findings lend some backing to concerns that increased use of portable electronic devices could have negative impacts on impulse control and the ability to appropriately valuate delayed rewards.

  8. A Wearable Respiratory Biofeedback System Based on Generalized Body Sensor Network

    PubMed Central

    Liu, Guan-Zheng; Huang, Bang-Yu

    2011-01-01

    Abstract Wearable medical devices have enabled unobtrusive monitoring of vital signs and emerging biofeedback services in a pervasive manner. This article describes a wearable respiratory biofeedback system based on a generalized body sensor network (BSN) platform. The compact BSN platform was tailored for the strong requirements of overall system optimizations. A waist-worn biofeedback device was designed using the BSN. Extensive bench tests have shown that the generalized BSN worked as intended. In-situ experiments with 22 subjects indicated that the biofeedback device was discreet, easy to wear, and capable of offering wearable respiratory trainings. Pilot studies on wearable training patterns and resultant heart rate variability suggested that paced respirations at abdominal level and with identical inhaling/exhaling ratio were more appropriate for decreasing sympathetic arousal and increasing parasympathetic activities. PMID:21545293

  9. Cloud@Home: A New Enhanced Computing Paradigm

    NASA Astrophysics Data System (ADS)

    Distefano, Salvatore; Cunsolo, Vincenzo D.; Puliafito, Antonio; Scarpa, Marco

    Cloud computing is a distributed computing paradigm that mixes aspects of Grid computing, ("… hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities" (Foster, 2002)) Internet Computing ("…a computing platform geographically distributed across the Internet" (Milenkovic et al., 2003)), Utility computing ("a collection of technologies and business practices that enables computing to be delivered seamlessly and reliably across multiple computers, ... available as needed and billed according to usage, much like water and electricity are today" (Ross & Westerman, 2004)) Autonomic computing ("computing systems that can manage themselves given high-level objectives from administrators" (Kephart & Chess, 2003)), Edge computing ("… provides a generic template facility for any type of application to spread its execution across a dedicated grid, balancing the load …" Davis, Parikh, & Weihl, 2004) and Green computing (a new frontier of Ethical computing1 starting from the assumption that in next future energy costs will be related to the environment pollution).

  10. Interprofessional education and social interaction: The use of automated external defibrillators in team-based basic life support.

    PubMed

    Onan, Arif; Simsek, Nurettin

    2017-04-01

    Automated external defibrillators are pervasive computing devices designed for the treatment and management of acute sudden cardiac arrest. This study aims to explain users' actual use behavior in teams formed by different professions taken after a short time span of interaction with automated external defibrillator. Before the intervention, all the participants were certified with the American Heart Association Basic Life Support for healthcare providers. A statistically significant difference was revealed in mean individual automated external defibrillator technical skills between uniprofessional and interprofessional groups. The technical automated external defibrillator team scores were greater for groups with interprofessional than for those with uniprofessional education. The nontechnical automated external defibrillator skills of interprofessional and uniprofessional teams revealed differences in advantage of interprofessional teams. Students positively accept automated external defibrillators if well-defined and validated training opportunities to use them expertly are available. Uniprofessional teams were successfully supported by their members and, thereby, used automated external defibrillator effectively. Furthermore, the interprofessional approach resulted in as much effective teamwork as the uniprofessional approach.

  11. Recognizing stationary and locomotion activities using combinational of spectral analysis with statistical descriptors features

    NASA Astrophysics Data System (ADS)

    Zainudin, M. N. Shah; Sulaiman, Md Nasir; Mustapha, Norwati; Perumal, Thinagaran

    2017-10-01

    Prior knowledge in pervasive computing recently garnered a lot of attention due to its high demand in various application domains. Human activity recognition (HAR) considered as the applications that are widely explored by the expertise that provides valuable information to the human. Accelerometer sensor-based approach is utilized as devices to undergo the research in HAR since their small in size and this sensor already build-in in the various type of smartphones. However, the existence of high inter-class similarities among the class tends to degrade the recognition performance. Hence, this work presents the method for activity recognition using our proposed features from combinational of spectral analysis with statistical descriptors that able to tackle the issue of differentiating stationary and locomotion activities. The noise signal is filtered using Fourier Transform before it will be extracted using two different groups of features, spectral frequency analysis, and statistical descriptors. Extracted signal later will be classified using random forest ensemble classifier models. The recognition results show the good accuracy performance for stationary and locomotion activities based on USC HAD datasets.

  12. Smart Dust--Friend or Foe?

    ERIC Educational Resources Information Center

    Roman, Harry T.

    2012-01-01

    Nanotechnology is now making it possible to create radically new tiny machines and sensors on par with the size of dust motes. This technology is rapidly progressing and will make profound impacts on the nation's global competitiveness. It promises to be a most pervasive technological advance, comparable to what computers did for an individual's…

  13. E-Learning Today: A Review of Research on Hypertext Comprehension

    ERIC Educational Resources Information Center

    Hinesley, Gail A.

    2007-01-01

    Use of hypertext is pervasive in education today--it is used for all online course delivery as well as many stand-alone delivery methods such as educational computer software and compact discs (CDs). This article will review Kintsch's Construction-Integration and Anderson's Adaptive Control of Thought-Rational (ACT-R) cognitive architectures and…

  14. Institutional Expansion: The Case of Grid Computing

    ERIC Educational Resources Information Center

    Kertcher, Zack

    2010-01-01

    Evolutionary and revolutionary approaches have dominated the study of scientific, technological and institutional change. Yet, being focused on change within a single field, these approaches have been mute about a third, pervasive process. This process is found in a variety of cases that range from open source software to the Monte Carlo method to…

  15. The Role of Technology in Teaching Languages for Specific Purposes Courses

    ERIC Educational Resources Information Center

    Arno-Macia, Elisabet

    2012-01-01

    Within the integration of technology into language education, special attention needs to be paid to languages for specific purposes (LSP), drawing on developments in computer-assisted language learning and applied linguistics, on the one hand, and on the pervasive use of technology in academic and professional communication, on the other. From a…

  16. Pedagogic Transformation, Student-Directed Design and Computational Thinking

    ERIC Educational Resources Information Center

    Vallance, Michael; Towndrow, Phillip A.

    2016-01-01

    In a world where technology has become pervasive in our lives, the notion of IT integration in education practice is losing its significance. It is now more appropriate to discuss transforming pedagogy where technology is not considered a tool anymore but part of what we are. To advance this hypothesis, an enterprising, student-directed approach…

  17. Wireless Sensor Node Data Gathering and Location Mapping

    DTIC Science & Technology

    2012-03-01

    adaptive two-phase approach to WiFi location sensing,” 4 th Int. Conf. on Pervasive Computing and Communications Workshops, Pisa, Italy, 2006, pp. 452...wrt.v24_micro_generic.bin, March 2010. [11] P. Asadoorian and L. Pesce, Linksys WRT54G Ultimate Hacking , Burlington, MA: Syngress, 2007, pp. 25. 32

  18. The Road to 24/7

    ERIC Educational Resources Information Center

    Briggs, Linda L.

    2006-01-01

    Wireless and mobile technologies are now everywhere, and 24/7 computing is as pervasive a term as the actual capability promises to be. Sometimes, in fact, the push toward mobile technologies can seem overwhelming. But every wireless project doesn't have to involve redesigning the network and investing in mega-dollars worth of hardware and…

  19. Is Texting Ruining Intimacy? Exploring Perceptions among Sexuality Students in Higher Education

    ERIC Educational Resources Information Center

    McGee, Michael J.

    2014-01-01

    In the context of researchers' and educators' concerns about the pervasive use of technology to communicate with one another, this study explored whether the frequency of emerging adults' computer-mediated communication (CMC) is correlated with their perceptions of intimacy, relationship, and sexual satisfaction. The sample included 298 young…

  20. Media Literacy: What, Why, and How?

    ERIC Educational Resources Information Center

    Grace, Donna J.

    2005-01-01

    Literacy has traditionally been associated with the printed word. But today, print literacy is not enough. Children and youth need to learn to "read" and interpret visual images as well. Film, television, videos, DVDs, computer games, and the Internet all hold a prominent and pervasive place in one's culture. Its presence in people's lives is only…

  1. Optimal Software Strategies in the Presence of Network Externalities

    ERIC Educational Resources Information Center

    Liu, Yipeng

    2009-01-01

    Network externalities or alternatively termed network effects are pervasive in computer software markets. While software vendors consider pricing strategies, they must also take into account the impact of network externalities on their sales. My main interest in this research is to describe a firm's strategies and behaviors in the presence of…

  2. Codifying a Next-Generation Education System: New York City iSchool

    ERIC Educational Resources Information Center

    Education Development Center, Inc, 2009

    2009-01-01

    The world outside schools is changing rapidly with the advances of technology and economic requirements for a 21st-century global citizenry. Today, technology has moved into one's everyday life and is becoming a pervasive part of how one works, learns, and plays. Similarly, networked communications and computer technology have transformed the…

  3. Transformation in the pharmaceutical industry--a systematic review of the literature.

    PubMed

    Shafiei, Nader; Ford, James L; Morecroft, Charles W; Lisboa, Paulo J; Taylor, Mark J; Mouzughi, Yusra

    2013-01-01

    The evolutionary development of pharmaceutical transformation was studied through systematic review of the literature. Fourteen triggers were identified that will affect the pharmaceutical business, regulatory science, and enabling technologies in future years. The relative importance ranking of the transformation triggers was computed based on their prevalence within the articles studied. The four main triggers with the strongest literature evidence were Fully Integrated Pharma Network, Personalized Medicine, Translational Research, and Pervasive Computing. The theoretical quality risks for each of the four main transformation triggers are examined, and the remaining ten triggers are described. The pharmaceutical industry is currently going through changes that affect the way it performs its research, manufacturing, and regulatory activities (this is termed pharmaceutical transformation). The impact of these changes on the approaches to quality risk management requires more understanding. In this paper, a comprehensive review of the academic, regulatory, and industry literature were used to identify 14 triggers that influence pharmaceutical transformation. The four main triggers, namely Fully Integrated Pharma Network, Personalized Medicine, Translational Research, and Pervasive Computing, were selected as the most important based on the strength of the evidence found during the literature review activity described in this paper. Theoretical quality risks for each of the four main transformation triggers are examined, and the remaining ten triggers are described.

  4. Smart Classroom: Bringing Pervasive Computing into Distance Learning

    NASA Astrophysics Data System (ADS)

    Shi, Yuanchun; Qin, Weijun; Suo, Yue; Xiao, Xin

    In recent years, distance learning has increasingly become one of themost important applications on the internet and is being discussed and studied by various universities, institutes and companies. The Web/Internet provides relatively easy ways to publish hyper-linked multimedia content for more audiences. Yet, we find that most of the courseware are simply shifted from textbook to HTML files. However, in ost cases the teacher's live instruction is very important for catching the attention and interest of the students. That's why Real-Time Interactive Virtual Classroom (RTIVC) always plays an indispensable role in distance learning, where teachers nd students located in different places can take part in the class synchronously through certain multimedia communication systems and obtain real-time and mediarich interactions using Pervasive Computing technologies [1]. The Classroom 2000 project [2] at GIT has been devoted to the automated capturing of the classroom experience. Likewise, the Smart Classroom project [3] at our institute is focused on Tele-education. Most currently deployed real-time Tele-education systems are desktop-based, in which the teacher's experience is totally different from teaching in a real classroom.

  5. Fault detection and isolation in motion monitoring system.

    PubMed

    Kim, Duk-Jin; Suk, Myoung Hoon; Prabhakaran, B

    2012-01-01

    Pervasive computing becomes very active research field these days. A watch that can trace human movement to record motion boundary as well as to study of finding social life pattern by one's localized visiting area. Pervasive computing also helps patient monitoring. A daily monitoring system helps longitudinal study of patient monitoring such as Alzheimer's and Parkinson's or obesity monitoring. Due to the nature of monitoring sensor (on-body wireless sensor), however, signal noise or faulty sensors errors can be present at any time. Many research works have addressed these problems any with a large amount of sensor deployment. In this paper, we present the faulty sensor detection and isolation using only two on-body sensors. We have been investigating three different types of sensor errors: the SHORT error, the CONSTANT error, and the NOISY SENSOR error (see more details on section V). Our experimental results show that the success rate of isolating faulty signals are an average of over 91.5% on fault type 1, over 92% on fault type 2, and over 99% on fault type 3 with the fault prior of 30% sensor errors.

  6. Mobile healthcare information management utilizing Cloud Computing and Android OS.

    PubMed

    Doukas, Charalampos; Pliakas, Thomas; Maglogiannis, Ilias

    2010-01-01

    Cloud Computing provides functionality for managing information data in a distributed, ubiquitous and pervasive manner supporting several platforms, systems and applications. This work presents the implementation of a mobile system that enables electronic healthcare data storage, update and retrieval using Cloud Computing. The mobile application is developed using Google's Android operating system and provides management of patient health records and medical images (supporting DICOM format and JPEG2000 coding). The developed system has been evaluated using the Amazon's S3 cloud service. This article summarizes the implementation details and presents initial results of the system in practice.

  7. Why I think Computational Physics has been the most valuable part of my undergraduate physics education

    NASA Astrophysics Data System (ADS)

    Parsons, Matthew

    2015-04-01

    Computational physics is a rich and vibrant field in its own right, but often not given the attention that it should receive in the typical undergraduate physics curriculum. It appears that the partisan theorist vs. experimentalist view is still pervasive in academia, or at least still portrayed to students, while in fact there is a continuous spectrum of opportunities in between these two extremes. As a case study, I'll give my perspective as a graduating physics student with examples of computational coursework at Drexel University and research opportunities that this experience has led to.

  8. An open and reconfigurable wireless sensor network for pervasive health monitoring.

    PubMed

    Triantafyllidis, A; Koutkias, V; Chouvarda, I; Maglaveras, N

    2008-01-01

    Sensor networks constitute the backbone for the construction of personalized monitoring systems. Up to now, several sensor networks have been proposed for diverse pervasive healthcare applications, which are however characterized by a significant lack of open architectures, resulting in closed, non-interoperable and difficult to extend solutions. In this context, we propose an open and reconfigurable wireless sensor network (WSN) for pervasive health monitoring, with particular emphasis in its easy extension with additional sensors and functionality by incorporating embedded intelligence mechanisms. We consider a generic WSN architecture comprised of diverse sensor nodes (with communication and processing capabilities) and a mobile base unit (MBU) operating as the gateway between the sensors and the medical personnel, formulating this way a body area network (BAN). The primary focus of this work is on the intra-BAN data communication issues, adopting SensorML as the data representation mean, including the encoding of the monitoring patterns and the functionality of the sensor network. In our prototype implementation two sensor nodes are emulated; one for heart rate monitoring and the other for blood glucose observations, while the MBU corresponds to a personal digital assistant (PDA) device. Java 2 Micro Edition (J2ME) is used to implement both the sensor nodes and the MBU components. Intra-BAN wireless communication relies on the Blue-tooth protocol. Via an adaptive user interface in the MBU, health professionals may specify the monitoring parameters of the WSN and define the monitoring patterns of interest in terms of rules. This work constitutes an essential step towards the construction of open, extensible, inter-operable and intelligent WSNs for pervasive health monitoring.

  9. Youth Screen Media Habits and Sleep: Sleep-Friendly Screen Behavior Recommendations for Clinicians, Educators, and Parents.

    PubMed

    Hale, Lauren; Kirschen, Gregory W; LeBourgeois, Monique K; Gradisar, Michael; Garrison, Michelle M; Montgomery-Downs, Hawley; Kirschen, Howard; McHale, Susan M; Chang, Anne-Marie; Buxton, Orfeu M

    2018-04-01

    With the widespread use of portable electronic devices and the normalization of screen media devices in the bedroom, insufficient sleep has become commonplace. In a recent literature review, 90% of included studies found an association between screen media use and delayed bedtime and/or decreased total sleep time. This pervasive phenomenon of pediatric sleep loss has widespread implications. There is a need for basic, translational, and clinical research examining the effects of screen media on sleep loss and health consequences in children and adolescents to educate and motivate clinicians, teachers, parents and youth themselves to foster healthy sleep habits. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Preparing Accounting Graduates for Digital Revolution: A Critical Review of Information Technology Competencies and Skills Development

    ERIC Educational Resources Information Center

    Pan, Gary; Seow, Poh-Sun

    2016-01-01

    The pervasiveness of information technology (IT) in businesses has altered the nature and economies of accounting activities. In particular, the emergence of cloud computing, eXtensible Business Reporting Language, and business analytics in recent years have transformed the way companies report financial performance and make business decisions. As…

  11. Multimodal and ubiquitous computing systems: supporting independent-living older users.

    PubMed

    Perry, Mark; Dowdall, Alan; Lines, Lorna; Hone, Kate

    2004-09-01

    We document the rationale and design of a multimodal interface to a pervasive/ubiquitous computing system that supports independent living by older people in their own homes. The Millennium Home system involves fitting a resident's home with sensors--these sensors can be used to trigger sequences of interaction with the resident to warn them about dangerous events, or to check if they need external help. We draw lessons from the design process and conclude the paper with implications for the design of multimodal interfaces to ubiquitous systems developed for the elderly and in healthcare, as well as for more general ubiquitous computing applications.

  12. Machine learning methods for classifying human physical activity from on-body accelerometers.

    PubMed

    Mannini, Andrea; Sabatini, Angelo Maria

    2010-01-01

    The use of on-body wearable sensors is widespread in several academic and industrial domains. Of great interest are their applications in ambulatory monitoring and pervasive computing systems; here, some quantitative analysis of human motion and its automatic classification are the main computational tasks to be pursued. In this paper, we discuss how human physical activity can be classified using on-body accelerometers, with a major emphasis devoted to the computational algorithms employed for this purpose. In particular, we motivate our current interest for classifiers based on Hidden Markov Models (HMMs). An example is illustrated and discussed by analysing a dataset of accelerometer time series.

  13. 77 FR 58576 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-21

    ... Devices, Portable Music and Data Processing Devices, Computers, and Components Thereof; Institution of... communication devices, portable music and data processing devices, computers, and components thereof by reason... certain wireless communication devices, portable music and data processing devices, computers, and...

  14. The MADE Reference Information Model for Interoperable Pervasive Telemedicine Systems.

    PubMed

    Fung, Nick L S; Jones, Valerie M; Hermens, Hermie J

    2017-03-23

    The main objective is to develop and validate a reference information model (RIM) to support semantic interoperability of pervasive telemedicine systems. The RIM is one component within a larger, computer-interpretable "MADE language" developed by the authors in the context of the MobiGuide project. To validate our RIM, we applied it to a clinical guideline for patients with gestational diabetes mellitus (GDM). The RIM is derived from a generic data flow model of disease management which comprises a network of four types of concurrent processes: Monitoring (M), Analysis (A), Decision (D) and Effectuation (E). This resulting MADE RIM, which was specified using the formal Vienna Development Method (VDM), includes six main, high-level data types representing measurements, observations, abstractions, action plans, action instructions and control instructions. The authors applied the MADE RIM to the complete GDM guideline and derived from it a domain information model (DIM) comprising 61 archetypes, specifically 1 measurement, 8 observation, 10 abstraction, 18 action plan, 3 action instruction and 21 control instruction archetypes. It was observed that there are six generic patterns for transforming different guideline elements into MADE archetypes, although a direct mapping does not exist in some cases. Most notable examples are notifications to the patient and/or clinician as well as decision conditions which pertain to specific stages in the therapy. The results provide evidence that the MADE RIM is suitable for modelling clinical data in the design of pervasive telemedicine systems. Together with the other components of the MADE language, the MADE RIM supports development of pervasive telemedicine systems that are interoperable and independent of particular clinical applications.

  15. Examining the Criterion-Related Validity of the Pervasive Developmental Disorder Behavior Inventory

    ERIC Educational Resources Information Center

    McMorris, Carly A.; Perry, Adrienne

    2015-01-01

    The Pervasive Developmental Disorder Behavior Inventory is a questionnaire designed to aid in the diagnosis of pervasive developmental disorders or autism spectrum disorders. The Pervasive Developmental Disorder Behavior Inventory assesses adaptive and maladaptive behaviors associated with pervasive developmental disorders and provides an…

  16. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Tests of pervasive poverty... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty is demonstrated by evidence that: (1...

  17. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Tests of pervasive poverty... ENTERPRISE COMMUNITIES: ROUND ONE DESIGNATIONS Area Requirements § 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the...

  18. Pervasive transcription: detecting functional RNAs in bacteria.

    PubMed

    Lybecker, Meghan; Bilusic, Ivana; Raghavan, Rahul

    2014-01-01

    Pervasive, or genome-wide, transcription has been reported in all domains of life. In bacteria, most pervasive transcription occurs antisense to protein-coding transcripts, although recently a new class of pervasive RNAs was identified that originates from within annotated genes. Initially considered to be non-functional transcriptional noise, pervasive transcription is increasingly being recognized as important in regulating gene expression. The function of pervasive transcription is an extensively debated question in the field of transcriptomics and regulatory RNA biology. Here, we highlight the most recent contributions addressing the purpose of pervasive transcription in bacteria and discuss their implications.

  19. Trusted measurement model based on multitenant behaviors.

    PubMed

    Ning, Zhen-Hu; Shen, Chang-Xiang; Zhao, Yong; Liang, Peng

    2014-01-01

    With a fast growing pervasive computing, especially cloud computing, the behaviour measurement is at the core and plays a vital role. A new behaviour measurement tailored for Multitenants in cloud computing is needed urgently to fundamentally establish trust relationship. Based on our previous research, we propose an improved trust relationship scheme which captures the world of cloud computing where multitenants share the same physical computing platform. Here, we first present the related work on multitenant behaviour; secondly, we give the scheme of behaviour measurement where decoupling of multitenants is taken into account; thirdly, we explicitly explain our decoupling algorithm for multitenants; fourthly, we introduce a new way of similarity calculation for deviation control, which fits the coupled multitenants under study well; lastly, we design the experiments to test our scheme.

  20. Trusted Measurement Model Based on Multitenant Behaviors

    PubMed Central

    Ning, Zhen-Hu; Shen, Chang-Xiang; Zhao, Yong; Liang, Peng

    2014-01-01

    With a fast growing pervasive computing, especially cloud computing, the behaviour measurement is at the core and plays a vital role. A new behaviour measurement tailored for Multitenants in cloud computing is needed urgently to fundamentally establish trust relationship. Based on our previous research, we propose an improved trust relationship scheme which captures the world of cloud computing where multitenants share the same physical computing platform. Here, we first present the related work on multitenant behaviour; secondly, we give the scheme of behaviour measurement where decoupling of multitenants is taken into account; thirdly, we explicitly explain our decoupling algorithm for multitenants; fourthly, we introduce a new way of similarity calculation for deviation control, which fits the coupled multitenants under study well; lastly, we design the experiments to test our scheme. PMID:24987731

  1. A Study of English Mobile Learning Applications at National Chengchi University

    ERIC Educational Resources Information Center

    Che, Pei-Chun; Lin, Han-Yi; Jang, Hung-Chin; Lien, Yao-Nan; Tsai, Tzu-Chieh

    2009-01-01

    The pervasive popularity of the Internet in the past decade has changed the way many students live and learn, in part, because modern technology has made it possible for learners to access Real-Time Multimedia information on the Internet, or research any topic of interest to them from virtually any computer anywhere in the world. Students can also…

  2. Designing Robust and Resilient Tactical MANETs

    DTIC Science & Technology

    2014-09-25

    Bounds on the Throughput Efficiency of Greedy Maximal Scheduling in Wireless Networks , IEEE/ACM Transactions on Networking , (06 2011): 0. doi: N... Wireless Sensor Networks and Effects of Long Range Dependant Data, Special IWSM Issue of Sequential Analysis, (11 2012): 0. doi: A. D. Dominguez...Bushnell, R. Poovendran. A Convex Optimization Approach for Clone Detection in Wireless Sensor Networks , Pervasive and Mobile Computing, (01 2012

  3. Comparing Learners' State Anxiety during Task-Based Interaction in Computer-Mediated and Face-to-Face Communication

    ERIC Educational Resources Information Center

    Baralt, Melissa; Gurzynski-Weiss, Laura

    2011-01-01

    The construct of anxiety is often believed to be the affective factor with the greatest potential to pervasively affect the learning process (Horwitz, 2001), and recent research has demonstrated that anxiety can mediate whether learners are able to notice feedback and subsequently produce output (Sheen, 2008). In order to reduce the negative…

  4. Confronting the Ubiquity of Electronic Communication and Social Media: Ethical and Legal Considerations for Psychoeducational Practice

    ERIC Educational Resources Information Center

    Demers, Joseph A.; Sullivan, Amanda L.

    2016-01-01

    Most U.S. children and adults use computers and the Internet on a daily basis. The pervasiveness of electronic communication in a variety of contexts, including home and school, raises ethical and legal concerns for school psychologists and those in related fields of practice, because of the risks to privacy and confidentiality, boundaries,…

  5. Grids: The Top Ten Questions

    DOE PAGES

    Schopf, Jennifer M.; Nitzberg, Bill

    2002-01-01

    The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A distributed infrastructure capable of sophisticated computational functions can bring many benefits to scientific work, but poses many challenges, both technical and socio-political. Technical challenges include having basic software tools, higher-level services, functioning and pervasive security, and standards, while socio-political issues include building a user community, adding incentives for sites to be part of a user-centric environment, and educating funding sources about the needs of this community. This paper details the areasmore » relating to Grid research that we feel still need to be addressed to fully leverage the advantages of the Grid.« less

  6. An element search ant colony technique for solving virtual machine placement problem

    NASA Astrophysics Data System (ADS)

    Srija, J.; Rani John, Rose; Kanaga, Grace Mary, Dr.

    2017-09-01

    The data centres in the cloud environment play a key role in providing infrastructure for ubiquitous computing, pervasive computing, mobile computing etc. This computing technique tries to utilize the available resources in order to provide services. Hence maintaining the resource utilization without wastage of power consumption has become a challenging task for the researchers. In this paper we propose the direct guidance ant colony system for effective mapping of virtual machines to the physical machine with maximal resource utilization and minimal power consumption. The proposed algorithm has been compared with the existing ant colony approach which is involved in solving virtual machine placement problem and thus the proposed algorithm proves to provide better result than the existing technique.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhuang, Shendong; Tang, Nujiang; Chen, Zhuo, E-mail: zchen@nju.edu.cn

    Solution-processed graphene quantum dots (GQDs) possess a moderate bandgap, which make them a promising candidate for optoelectronics devices. However, negative photoconductivity (NPC) and hysteresis that happen in the photoelectric conversion process could be harmful to performance of the GQDs-based devices. So far, their origins and relations have remained elusive. Here, we investigate experimentally the origins of the NPC and hysteresis in GQDs. By comparing the hysteresis and photoconductance of GQDs under different relative humidity conditions, we are able to demonstrate that NPC and hysteresis coexist in GQDs and both are attributed to the carrier trapping effect of surface adsorbed moisture.more » We also demonstrate that GQDs could exhibit positive photoconductivity with three-order-of-magnitude reduction of hysteresis after a drying process and a subsequent encapsulation. Considering the pervasive moisture adsorption, our results may pave the way for a commercialization of semiconducting graphene-based and diverse solution-based optoelectronic devices.« less

  8. An adaptable navigation strategy for Virtual Microscopy from mobile platforms.

    PubMed

    Corredor, Germán; Romero, Eduardo; Iregui, Marcela

    2015-04-01

    Real integration of Virtual Microscopy with the pathologist service workflow requires the design of adaptable strategies for any hospital service to interact with a set of Whole Slide Images. Nowadays, mobile devices have the actual potential of supporting an online pervasive network of specialists working together. However, such devices are still very limited. This article introduces a novel highly adaptable strategy for streaming and visualizing WSI from mobile devices. The presented approach effectively exploits and extends the granularity of the JPEG2000 standard and integrates it with different strategies to achieve a lossless, loosely-coupled, decoder and platform independent implementation, adaptable to any interaction model. The performance was evaluated by two expert pathologists interacting with a set of 20 virtual slides. The method efficiently uses the available device resources: the memory usage did not exceed a 7% of the device capacity while the decoding times were smaller than the 200 ms per Region of Interest, i.e., a window of 256×256 pixels. This model is easily adaptable to other medical imaging scenarios. Copyright © 2015 Elsevier Inc. All rights reserved.

  9. Chaotic mixing in three-dimensional microvascular networks fabricated by direct-write assembly.

    PubMed

    Therriault, Daniel; White, Scott R; Lewis, Jennifer A

    2003-04-01

    The creation of geometrically complex fluidic devices is a subject of broad fundamental and technological interest. Here, we demonstrate the fabrication of three-dimensional (3D) microvascular networks through direct-write assembly of a fugitive organic ink. This approach yields a pervasive network of smooth cylindrical channels (approximately 10-300 microm) with defined connectivity. Square-spiral towers, isolated within this vascular network, promote fluid mixing through chaotic advection. These vertical towers give rise to dramatic improvements in mixing relative to simple straight (1D) and square-wave (2D) channels while significantly reducing the device planar footprint. We envisage that 3D microvascular networks will provide an enabling platform for a wide array of fluidic-based applications.

  10. 78 FR 1247 - Certain Electronic Devices, Including Wireless Communication Devices, Tablet Computers, Media...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-08

    ... Wireless Communication Devices, Tablet Computers, Media Players, and Televisions, and Components Thereof... devices, including wireless communication devices, tablet computers, media players, and televisions, and... wireless communication devices, tablet computers, media players, and televisions, and components thereof...

  11. Emerging and Future Computing Paradigms and Their Impact on the Research, Training, and Design Environments of the Aerospace Workforce

    NASA Technical Reports Server (NTRS)

    Noor, Ahmed K. (Compiler)

    2003-01-01

    The document contains the proceedings of the training workshop on Emerging and Future Computing Paradigms and their impact on the Research, Training and Design Environments of the Aerospace Workforce. The workshop was held at NASA Langley Research Center, Hampton, Virginia, March 18 and 19, 2003. The workshop was jointly sponsored by Old Dominion University and NASA. Workshop attendees came from NASA, other government agencies, industry and universities. The objectives of the workshop were to a) provide broad overviews of the diverse activities related to new computing paradigms, including grid computing, pervasive computing, high-productivity computing, and the IBM-led autonomic computing; and b) identify future directions for research that have high potential for future aerospace workforce environments. The format of the workshop included twenty-one, half-hour overview-type presentations and three exhibits by vendors.

  12. 77 FR 51571 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-24

    ... Music and Data Processing Devices, Computers, and Components Thereof; Notice of Receipt of Complaint... complaint entitled Wireless Communication Devices, Portable Music and Data Processing Devices, Computers..., portable music and data processing devices, computers, and components thereof. The complaint names as...

  13. Ethical and regulatory challenges of research using pervasive sensing and other emerging technologies: IRB perspectives.

    PubMed

    Nebeker, Camille; Harlow, John; Espinoza Giacinto, Rebeca; Orozco-Linares, Rubi; Bloss, Cinnamon S; Weibel, Nadir

    2017-01-01

    Vast quantities of personal health information and private identifiable information are being created through mobile apps, wearable sensors, and social networks. While new strategies and tools for obtaining health data have expanded researchers' abilities to design and test personalized and adaptive health interventions, the deployment of pervasive sensing and computational techniques to gather research data is raising ethical challenges for Institutional Review Boards (IRBs) charged with protecting research participants. To explore experiences with, and perceptions about, technology-enabled research, and identify solutions for promoting responsible conduct of this research we conducted focus groups with human research protection program and IRB affiliates. Our findings outline the need for increased collaboration across stakeholders in terms of: (1) shared and dynamic resources that improve awareness of technologies and decrease potential threats to participant privacy and data confidentiality, and (2) development of appropriate and dynamic standards through collaboration with stakeholders in the research ethics community.

  14. Integrated wireless systems: The future has arrived (Keynote Address)

    NASA Astrophysics Data System (ADS)

    Rivoir, Roberto

    2005-06-01

    It is believed that we are just at the beginning with wireless, and that a new age is dawning for this breakthrough technology. Thanks to several years of industrial manufacturing in mass-market applications such as cellular phones, wireless technology has nowadays reached a level of maturity that, combined with other achievements arising from different fields, such as information technology, artificial intelligence, pervasive computing, science of new materials, and micro-electro-mechanical systems (MEMS), will enable the realization of a networked stream-flow of real-time information, that will accompany us in our daily life, in a total seamless, transparent fashion. As almost any application scenario will require the deployment of complex, miniaturized, almost "invisible" systems, operating with different wireless standards, hard technological challenges will have to be faced for designing and fabricating ultra-low-cost, reconfigurable, and multi-mode heterogeneous smart micro-devices. But ongoing, unending progresses on wireless technology keeps the promise of helping to solve important societal problems in the health-care, safety, security, industry, environment sectors, and in general opening the possibility for an improved quality of life at work, on travel, at home, practically "everywhere, anytime".

  15. Selective attention as a protagonist in contemporary workplace stress: implications for the interruption age.

    PubMed

    Tams, Stefan; Thatcher, Jason; Grover, Varun; Pak, Richard

    2015-01-01

    The ubiquity of instant messages and email notifications in contemporary work environments has opened a Pandora's Box. This box is filled with countless interruptions coming from laptops, smartphones, and other devices, all of which constantly call for employees' attention. In this interruption era, workplace stress is a pervasive problem. To examine this problem, the present study hypothesizes that the three-way interaction among the frequency with which interrupting stimuli appear, their salience, and employees' deficits in inhibiting attentional responses to them impacts mental workload perceptions, ultimately leading to stress. The study, further, probes a related form of self-efficacy as a potential suppressor of interruption-based stress. The study used a 2 (low vs. high frequency) × 2 (low vs. high salience) mixed model design. The 128 subjects completed a test of their inhibitory deficits and rated their mental workload perceptions and experiences of stress following a computer-based task. Inhibitory deficits and increased interruption salience can alter the perception of mental workload in contemporary work environments for the worse, but interruption self-efficacy can help offset any resulting interruption-based stress. This study extends the literatures on work interruptions as well as on stress and coping in the workplace.

  16. Preface to the special volume on the second Sandia Fracture Challenge

    DOE PAGES

    Kramer, Sharlotte Lorraine Bolyard; Boyce, Brad

    2016-01-01

    In this study, ductile failure of structural metals is a pervasive issue for applications such as automotive manufacturing, transportation infrastructures, munitions and armor, and energy generation. Experimental investigation of all relevant failure scenarios is intractable, requiring reliance on computation models. Our confidence in model predictions rests on unbiased assessments of the entire predictive capability, including the mathematical formulation, numerical implementation, calibration, and execution.

  17. Key Trends That Will Shape Army Installations of Tomorrow

    DTIC Science & Technology

    2013-01-01

    community college facilities, and the new international airport.187 In Bucks County, KIPC occupies a portion of the former U.S. Steel–Fairless Works...190 Federation of Canadian Municipalities, “Solid Waste as a Resource: Guide for Sustainable Communities ,” 2004. 191 For more information ...overseas oil. Information technology trends, such as pervasive computing and online community trends, may have a complex role in sustainable

  18. Pervasive mobile healthcare systems for chronic disease monitoring.

    PubMed

    Huzooree, Geshwaree; Kumar Khedo, Kavi; Joonas, Noorjehan

    2017-05-01

    Pervasive mobile healthcare system has the potential to improve healthcare and the quality of life of chronic disease patients through continuous monitoring. Recently, many articles related to pervasive mobile healthcare system focusing on health monitoring using wireless technologies have been published. The main aim of this review is to evaluate the state-of-the-art pervasive mobile healthcare systems to identify major technical requirements and design challenges associated with the realization of a pervasive mobile healthcare system. A systematic literature review was conducted over IEEE Xplore Digital Library to evaluate 20 pervasive mobile healthcare systems out of 683 articles from 2011 to 2016. The classification of the pervasive mobile healthcare systems and other important factors are discussed. Potential opportunities and challenges are pointed out for the further deployment of effective pervasive mobile healthcare systems. This article helps researchers in health informatics to have a holistic view toward understanding pervasive mobile healthcare systems and points out new technological trends and design challenges that researchers have to consider when designing such systems for better adoption, usability, and seamless integration.

  19. Extracting Depth From Motion Parallax in Real-World and Synthetic Displays

    NASA Technical Reports Server (NTRS)

    Hecht, Heiko; Kaiser, Mary K.; Aiken, William; Null, Cynthia H. (Technical Monitor)

    1994-01-01

    In psychophysical studies on human sensitivity to visual motion parallax (MP), the use of computer displays is pervasive. However, a number of potential problems are associated with such displays: cue conflicts arise when observers accommodate to the screen surface, and observer head and body movements are often not reflected in the displays. We investigated observers' sensitivity to depth information in MP (slant, depth order, relative depth) using various real-world displays and their computer-generated analogs. Angle judgments of real-world stimuli were consistently superior to judgments that were based on computer-generated stimuli. Similar results were found for perceived depth order and relative depth. Perceptual competence of observers tends to be underestimated in research that is based on computer generated displays. Such findings cannot be generalized to more realistic viewing situations.

  20. Computer Access. Tech Use Guide: Using Computer Technology.

    ERIC Educational Resources Information Center

    Council for Exceptional Children, Reston, VA. Center for Special Education Technology.

    One of nine brief guides for special educators on using computer technology, this guide focuses on access including adaptations in input devices, output devices, and computer interfaces. Low technology devices include "no-technology" devices (usually modifications to existing devices), simple switches, and multiple switches. High technology input…

  1. Pervasive healthcare: paving the way for a pervasive, user-centered and preventive healthcare model.

    PubMed

    Arnrich, B; Mayora, O; Bardram, J; Tröster, G

    2010-01-01

    The aging of the population creates pressure on the healthcare systems in various ways. A massive increase of chronic disease conditions and age-related illness are predicted as the dominant forces driving the future health care. The objective of this paper is to present future research demands in pervasive healthcare with the goal to meet the healthcare challenges by paving the way for a pervasive, user-centered and preventive healthcare model. This paper presents recent methodological approaches and proposes future research topics in three areas: i) pervasive, continuous and reliable long-term monitoring systems; ii) prevention through pervasive technology as a key element to maintain lifelong wellness; and iii) design and evaluation methods for ubiquitous, patient-centric technologies. Pervasive technology has been identified as a strong asset for achieving the vision of user-centered preventive healthcare. In order to make this vision a reality, new strategies for design, development and evaluation of technology have to find a common denominator and consequently interoperate. Moreover, the potential of pervasive healthcare technologies offers new opportunities beyond traditional disease treatment and may play a major role in prevention, e.g. motivate healthy behavior and disease prevention throughout all stages of life. In this sense, open challenges in future research have to be addressed such as the variability of health indicators between individuals and the manner in which relevant health indicators are provided to the users in order to maximize their motivation to mitigate or prevent unhealthy behaviors. Additionally, collecting evidence that pervasive technology improves health is seen as one of the toughest challenges. Promising approaches are recently introduced, such as "clinical proof-of-concept" and balanced observational studies. The paper concludes that pervasive healthcare will enable a paradigm shift from the established centralized healthcare model to a pervasive, user-centered and preventive overall lifestyle health management. In order to provide these new opportunities everywhere, anytime and to anyone, future research in the fields of pervasive sensing, pervasive prevention and evaluation of pervasive technology is inevitably needed.

  2. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be reasonably distributed throughout the entire nominated area...

  3. 21 CFR 868.1730 - Oxygen uptake computer.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Oxygen uptake computer. 868.1730 Section 868.1730...) MEDICAL DEVICES ANESTHESIOLOGY DEVICES Diagnostic Devices § 868.1730 Oxygen uptake computer. (a) Identification. An oxygen uptake computer is a device intended to compute the amount of oxygen consumed by a...

  4. 21 CFR 868.1730 - Oxygen uptake computer.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Oxygen uptake computer. 868.1730 Section 868.1730...) MEDICAL DEVICES ANESTHESIOLOGY DEVICES Diagnostic Devices § 868.1730 Oxygen uptake computer. (a) Identification. An oxygen uptake computer is a device intended to compute the amount of oxygen consumed by a...

  5. 21 CFR 868.1730 - Oxygen uptake computer.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 8 2014-04-01 2014-04-01 false Oxygen uptake computer. 868.1730 Section 868.1730...) MEDICAL DEVICES ANESTHESIOLOGY DEVICES Diagnostic Devices § 868.1730 Oxygen uptake computer. (a) Identification. An oxygen uptake computer is a device intended to compute the amount of oxygen consumed by a...

  6. 21 CFR 868.1730 - Oxygen uptake computer.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 8 2013-04-01 2013-04-01 false Oxygen uptake computer. 868.1730 Section 868.1730...) MEDICAL DEVICES ANESTHESIOLOGY DEVICES Diagnostic Devices § 868.1730 Oxygen uptake computer. (a) Identification. An oxygen uptake computer is a device intended to compute the amount of oxygen consumed by a...

  7. 21 CFR 868.1730 - Oxygen uptake computer.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 8 2012-04-01 2012-04-01 false Oxygen uptake computer. 868.1730 Section 868.1730...) MEDICAL DEVICES ANESTHESIOLOGY DEVICES Diagnostic Devices § 868.1730 Oxygen uptake computer. (a) Identification. An oxygen uptake computer is a device intended to compute the amount of oxygen consumed by a...

  8. Access Control to Information in Pervasive Computing Environments

    DTIC Science & Technology

    2005-08-01

    for foo’s public key. (Digital signatures are omitted.) indicate a set of location and time intervals. A service will return location information only...stands for foo’s public key. (Digital signatures are omitted.) it describes the resource to which access is granted. Currently, we allow only resources...information relationship. Alice’s location information is bun- dled in her personal information. (The digital signature is omitted.) We use extended

  9. Addressing Security Challenges in Pervasive Computing Applications

    DTIC Science & Technology

    2010-10-10

    Personalized Privacy for Location - Based Services ", Transactions on Data Privacy, 2(1), 2009. 22. Indrakshi Ray, Indrajit Ray and Sudip Chakraborty, "An...Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Query m-Invariance: Pre- venting Query Disclosures in Continuous Location - Based Services ", Proceedings...location information is used to provide better services. Often such applications need continuous location - based services (LBS) where the mobile object must

  10. Survey on fall detection and fall prevention using wearable and external sensors.

    PubMed

    Delahoz, Yueng Santiago; Labrador, Miguel Angel

    2014-10-22

    According to nihseniorhealth.gov (a website for older adults), falling represents a great threat as people get older, and providing mechanisms to detect and prevent falls is critical to improve people's lives. Over 1.6 million U.S. adults are treated for fall-related injuries in emergency rooms every year suffering fractures, loss of independence, and even death. It is clear then, that this problem must be addressed in a prompt manner, and the use of pervasive computing plays a key role to achieve this. Fall detection (FD) and fall prevention (FP) are research areas that have been active for over a decade, and they both strive for improving people's lives through the use of pervasive computing. This paper surveys the state of the art in FD and FP systems, including qualitative comparisons among various studies. It aims to serve as a point of reference for future research on the mentioned systems. A general description of FD and FP systems is provided, including the different types of sensors used in both approaches. Challenges and current solutions are presented and described in great detail. A 3-level taxonomy associated with the risk factors of a fall is proposed. Finally, cutting edge FD and FP systems are thoroughly reviewed and qualitatively compared, in terms of design issues and other parameters.

  11. 77 FR 26041 - Certain Computers and Computer Peripheral Devices and Components Thereof and Products Containing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    ... INTERNATIONAL TRADE COMMISSION [Inv. No. 337-TA-841] Certain Computers and Computer Peripheral... after importation of certain computers and computer peripheral devices and components thereof and... computers and computer peripheral devices and components thereof and products containing the same that...

  12. Reducing Listening-Related Stress in School-Aged Children with Autism Spectrum Disorder.

    PubMed

    Rance, Gary; Chisari, Donella; Saunders, Kerryn; Rault, Jean-Loup

    2017-07-01

    High levels of stress and anxiety are common in children with Autism Spectrum Disorder (ASD). Within this study of school-aged children (20 male, 6 female) we hypothesised that functional hearing deficits (also pervasive in ASD) could be ameliorated by auditory interventions and that, as a consequence, stress levels would be reduced. The use of Ear-Level Remote Microphone devices and Classroom Amplification systems resulted in significantly improved listening, communication and social interaction and a reduction in physiologic stress levels (salivary cortisol) in both one-on-one and group listening situations.

  13. Enhanced Low Dose Rate Sensitivity at Ultra-Low Dose Rates

    NASA Technical Reports Server (NTRS)

    Chen, Dakai; Pease, Ronald; Forney, James; Carts, Martin; Phan, Anthony; Cox, Stephen; Kruckmeyer, Kriby; Burns, Sam; Albarian, Rafi; Holcombe, Bruce; hide

    2011-01-01

    We have presented results of ultra-low dose rate irradiations (< or = 10 mrad(Si)/s) for a variety of radiation hardened and commercial linear bipolar devices. We observed low dose rate enhancement factors exceeding 1.5 in several parts. The worst case of dose rate enhancement resulted in functional failures, which occurred after 10 and 60 krad(Si), for devices irradiated at 0.5 and 10 mrad(Si)/s, respectively. Devices fabricated with radiation hardened processes and designs also displayed dose rate enhancement at below 10 mrad(Si)/s. Furthermore, the data indicated that these devices have not reached the damage saturation point. Therefore the degradation will likely continue to increase with increasing total dose, and the low dose rate enhancement will further magnify. The cases presented here, in addition to previous examples, illustrate the significance and pervasiveness of low dose rate enhancement at dose rates lower than 10 mrad(Si). These results present further challenges for radiation hardness assurance of bipolar linear circuits, and raise the question of whether the current standard test dose rate is conservative enough to bound degradations due to ELDRS.

  14. Design of a Customized Multipurpose Nano-Enabled Implantable System for In-Vivo Theranostics

    PubMed Central

    Juanola-Feliu, Esteve; Miribel-Català, Pere Ll.; Páez Avilés, Cristina; Colomer-Farrarons, Jordi; González-Piñero, Manel; Samitier, Josep

    2014-01-01

    The first part of this paper reviews the current development and key issues on implantable multi-sensor devices for in vivo theranostics. Afterwards, the authors propose an innovative biomedical multisensory system for in vivo biomarker monitoring that could be suitable for customized theranostics applications. At this point, findings suggest that cross-cutting Key Enabling Technologies (KETs) could improve the overall performance of the system given that the convergence of technologies in nanotechnology, biotechnology, micro&nanoelectronics and advanced materials permit the development of new medical devices of small dimensions, using biocompatible materials, and embedding reliable and targeted biosensors, high speed data communication, and even energy autonomy. Therefore, this article deals with new research and market challenges of implantable sensor devices, from the point of view of the pervasive system, and time-to-market. The remote clinical monitoring approach introduced in this paper could be based on an array of biosensors to extract information from the patient. A key contribution of the authors is that the general architecture introduced in this paper would require minor modifications for the final customized bio-implantable medical device. PMID:25325336

  15. Unbending the mind: or, commercialized leisure and the rhetoric of eighteenth-century diversion.

    PubMed

    Domingo, Darryl P

    2012-01-01

    This essay opens by asking why the formative period in the “commercialization of leisure” in England (c. 1690–1760) happens also to be the period during which intrusion, obstruction, and interruption first began to thrive as conspicuous rhetorical techniques in commercial literature. The essay answers this question through a series of close readings that reveal the complex reciprocity between what I call “cultural diversion” and “discursive diversion,” between those social amusements which provide relief from the serious concerns of daily life and those linguistic and textual devices which characteristically disrupt so much of the discourse of the late seventeenth and early eighteenth century—devices such as extravagant metaphors, rows of asterisked ellipses, and, most pervasively, digressions. Where modern discussion of such devices has tended to rely on the critical touch-stone of “self-consciousness,” this essay restores disruptive rhetoric to what I see as its original cultural context by demonstrating how frequently self-conscious authors associate the form and function of devices like digression with London’s “Reigning Diversions.”

  16. Dynamic Pervasive Storytelling in Long Lasting Learning Games

    ERIC Educational Resources Information Center

    Pløhn, Trygve; Louchart, Sandy; Aalberg, Trond

    2015-01-01

    Pervasive gaming is a reality-based gaming genre originating from alternative theatrical forms in which the performance becomes a part of the players' everyday life. In recent years much research has been done on pervasive gaming and its potential applications towards specific domains. Pervasive games have been effective with regards to…

  17. 78 FR 24775 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-26

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Commission Decision... importation of certain wireless communication devices, portable music and data processing devices, computers...

  18. 78 FR 12785 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-25

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Commission Decision... importation of certain wireless communication devices, portable music and data processing devices, computers...

  19. Brain-Computer Symbiosis

    PubMed Central

    Schalk, Gerwin

    2009-01-01

    The theoretical groundwork of the 1930’s and 1940’s and the technical advance of computers in the following decades provided the basis for dramatic increases in human efficiency. While computers continue to evolve, and we can still expect increasing benefits from their use, the interface between humans and computers has begun to present a serious impediment to full realization of the potential payoff. This article is about the theoretical and practical possibility that direct communication between the brain and the computer can be used to overcome this impediment by improving or augmenting conventional forms of human communication. It is about the opportunity that the limitations of our body’s input and output capacities can be overcome using direct interaction with the brain, and it discusses the assumptions, possible limitations, and implications of a technology that I anticipate will be a major source of pervasive changes in the coming decades. PMID:18310804

  20. 77 FR 52759 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-30

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Notice of... communication devices, portable music and data processing devices, computers and components thereof by reason of...

  1. 21 CFR 870.1425 - Programmable diagnostic computer.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 8 2013-04-01 2013-04-01 false Programmable diagnostic computer. 870.1425 Section... (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1425 Programmable diagnostic computer. (a) Identification. A programmable diagnostic computer is a device that can be...

  2. 21 CFR 870.1425 - Programmable diagnostic computer.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 8 2012-04-01 2012-04-01 false Programmable diagnostic computer. 870.1425 Section... (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1425 Programmable diagnostic computer. (a) Identification. A programmable diagnostic computer is a device that can be...

  3. 21 CFR 870.1425 - Programmable diagnostic computer.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 8 2014-04-01 2014-04-01 false Programmable diagnostic computer. 870.1425 Section... (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1425 Programmable diagnostic computer. (a) Identification. A programmable diagnostic computer is a device that can be...

  4. 21 CFR 870.1425 - Programmable diagnostic computer.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Programmable diagnostic computer. 870.1425 Section... (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1425 Programmable diagnostic computer. (a) Identification. A programmable diagnostic computer is a device that can be...

  5. 21 CFR 870.1425 - Programmable diagnostic computer.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Programmable diagnostic computer. 870.1425 Section... (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1425 Programmable diagnostic computer. (a) Identification. A programmable diagnostic computer is a device that can be...

  6. Statistical fingerprinting for malware detection and classification

    DOEpatents

    Prowell, Stacy J.; Rathgeb, Christopher T.

    2015-09-15

    A system detects malware in a computing architecture with an unknown pedigree. The system includes a first computing device having a known pedigree and operating free of malware. The first computing device executes a series of instrumented functions that, when executed, provide a statistical baseline that is representative of the time it takes the software application to run on a computing device having a known pedigree. A second computing device executes a second series of instrumented functions that, when executed, provides an actual time that is representative of the time the known software application runs on the second computing device. The system detects malware when there is a difference in execution times between the first and the second computing devices.

  7. On the usage of ultrasound computational models for decision making under ambiguity

    NASA Astrophysics Data System (ADS)

    Dib, Gerges; Sexton, Samuel; Prowant, Matthew; Crawford, Susan; Diaz, Aaron

    2018-04-01

    Computer modeling and simulation is becoming pervasive within the non-destructive evaluation (NDE) industry as a convenient tool for designing and assessing inspection techniques. This raises a pressing need for developing quantitative techniques for demonstrating the validity and applicability of the computational models. Computational models provide deterministic results based on deterministic and well-defined input, or stochastic results based on inputs defined by probability distributions. However, computational models cannot account for the effects of personnel, procedures, and equipment, resulting in ambiguity about the efficacy of inspections based on guidance from computational models only. In addition, ambiguity arises when model inputs, such as the representation of realistic cracks, cannot be defined deterministically, probabilistically, or by intervals. In this work, Pacific Northwest National Laboratory demonstrates the ability of computational models to represent field measurements under known variabilities, and quantify the differences using maximum amplitude and power spectrum density metrics. Sensitivity studies are also conducted to quantify the effects of different input parameters on the simulation results.

  8. Contact-induced crystallinity for high-performance soluble acene-based transistors and circuits

    NASA Astrophysics Data System (ADS)

    Gundlach, D. J.; Royer, J. E.; Park, S. K.; Subramanian, S.; Jurchescu, O. D.; Hamadani, B. H.; Moad, A. J.; Kline, R. J.; Teague, L. C.; Kirillov, O.; Richter, C. A.; Kushmerick, J. G.; Richter, L. J.; Parkin, S. R.; Jackson, T. N.; Anthony, J. E.

    2008-03-01

    The use of organic materials presents a tremendous opportunity to significantly impact the functionality and pervasiveness of large-area electronics. Commercialization of this technology requires reduction in manufacturing costs by exploiting inexpensive low-temperature deposition and patterning techniques, which typically lead to lower device performance. We report a low-cost approach to control the microstructure of solution-cast acene-based organic thin films through modification of interfacial chemistry. Chemically and selectively tailoring the source/drain contact interface is a novel route to initiating the crystallization of soluble organic semiconductors, leading to the growth on opposing contacts of crystalline films that extend into the transistor channel. This selective crystallization enables us to fabricate high-performance organic thin-film transistors and circuits, and to deterministically study the influence of the microstructure on the device characteristics. By connecting device fabrication to molecular design, we demonstrate that rapid film processing under ambient room conditions and high performance are not mutually exclusive.

  9. Gigahertz Electromagnetic Structures via Direct Ink Writing for Radio-Frequency Oscillator and Transmitter Applications.

    PubMed

    Zhou, Nanjia; Liu, Chengye; Lewis, Jennifer A; Ham, Donhee

    2017-04-01

    Radio-frequency (RF) electronics, which combine passive electromagnetic devices and active transistors to generate and process gigahertz (GHz) signals, provide a critical basis of ever-pervasive wireless networks. While transistors are best realized by top-down fabrication, relatively larger electromagnetic passives are within the reach of printing techniques. Here, direct writing of viscoelastic silver-nanoparticle inks is used to produce a broad array of RF passives operating up to 45 GHz. These include lumped devices such as inductors and capacitors, and wave-based devices such as transmission lines, their resonant networks, and antennas. Moreover, to demonstrate the utility of these printed RF passive structures in active RF electronic circuits, they are combined with discrete transistors to fabricate GHz self-sustained oscillators and synchronized oscillator arrays that provide RF references, and wireless transmitters clocked by the oscillators. This work demonstrates the synergy of direct ink writing and RF electronics for wireless applications. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. 77 FR 39498 - Guidances for Industry and Food and Drug Administration Staff: Computer-Assisted Detection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-03

    ...] Guidances for Industry and Food and Drug Administration Staff: Computer-Assisted Detection Devices Applied... Clinical Performance Assessment: Considerations for Computer-Assisted Detection Devices Applied to... guidance, entitled ``Computer-Assisted Detection Devices Applied to Radiology Images and Radiology Device...

  11. The role of architecture and ontology for interoperability.

    PubMed

    Blobel, Bernd; González, Carolina; Oemig, Frank; Lopéz, Diego; Nykänen, Pirkko; Ruotsalainen, Pekka

    2010-01-01

    Turning from organization-centric to process-controlled or even to personalized approaches, advanced healthcare settings have to meet special interoperability challenges. eHealth and pHealth solutions must assure interoperability between actors cooperating to achieve common business objectives. Hereby, the interoperability chain also includes individually tailored technical systems, but also sensors and actuators. For enabling corresponding pervasive computing and even autonomic computing, individualized systems have to be based on an architecture framework covering many domains, scientifically managed by specialized disciplines using their specific ontologies in a formalized way. Therefore, interoperability has to advance from a communication protocol to an architecture-centric approach mastering ontology coordination challenges.

  12. An Approach to Dynamic Service Management in Pervasive Computing Systems

    DTIC Science & Technology

    2005-01-01

    standard interface to them that is easily accessible by any user. This paper outlines the design of Centaurus , an infrastructure for presenting...based on Extensi- ble Markup Language (XML) for communication, giving the system a uniform and easily adaptable interface. Centaurus defines a...easy and automatic usage. This is the vision that guides our re- search on the Centaurus system. We define a SmartSpace as a dynamic environment that

  13. Analysis in Motion Initiative – Human Machine Intelligence

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Blaha, Leslie

    As computers and machines become more pervasive in our everyday lives, we are looking for ways for humans and machines to work more intelligently together. How can we help machines understand their users so the team can do smarter things together? The Analysis in Motion Initiative is advancing the science of human machine intelligence — creating human-machine teams that work better together to make correct, useful, and timely interpretations of data.

  14. Parametric Study of Beta-Endpoint Energy in Direct Energy Converters

    DTIC Science & Technology

    2007-01-01

    Circuits for Ultra-high Efficiency Micro- power Generators using Nickel-63 Radioisotope . Technical Digest, ISSCC, February 2006, 418– 19. 8. Lal, A...Zakar, E.; Dubey, M.; Lal, A. MEMS Radioisotope - powered Piezoelectric Power Generator. IEEE MEMS 2006, Istanbul, Turkey, January 2006, 94–97. 16... Power : A Radioisotope - powered Piezoelectric Generator. IEEE Pervasive Computing Jan-Mar 2005, 4 (1), 53–61. Lee, C.; Guo, H.; Radhakrishnan, S.; Lal, A

  15. Improving Mobile Infrastructure for Pervasive Personal Computing

    DTIC Science & Technology

    2007-11-01

    fulfillment of the requirements for the degree of Master of Science. Copyright c© 2007 Ajay Surie This research was supported by the National Science Foundation...NSF) under grant number CNS-0509004 and by the Army Research Office (ARO) through grant number DAAD19-02-1-0389 (“Perpetually Available and Secure...efforts my final project could not have been successful. Working with the members of my research group, Niraj Tolia, Benjamin Gilbert, Jan Harkes, Adam

  16. 75 FR 8399 - In the Matter of Certain Mobile Communications and Computer Devices and Components Thereof...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-24

    ... Communications and Computer Devices and Components Thereof; Notice of Investigation AGENCY: U.S. International... States after importation of certain mobile communications and computer devices and components thereof by... importation of certain mobile communications or computer devices or components thereof that infringe one or...

  17. The Measurement and Interpretation of Transformation Temperatures in Nitinol

    NASA Astrophysics Data System (ADS)

    Duerig, T. W.; Pelton, A. R.; Bhattacharya, K.

    2017-12-01

    A previous paper (Duerig and Bhattacharya in Shap Mem Superelasticity 1:153-161, 2015) introduced several engineering considerations surrounding the R-phase in Nitinol and highlighted a common, if not pervasive, misconception regarding the use of the term Af by the medical device industry. This paper brings additional data to bear on the issue and proposes more accurate terminology. Moreover, a variety of tools are used to establish the forward and reverse stress-temperature phase diagrams for a superelastic wire typical of that used in medical devices. Once established, the two most common methods of measuring transformation temperatures, Differential Scanning Calorimetry and Bend Free Recovery, are tested against the observed behavior. Light is also shed upon the origin of the Clausius-Clapeyron ratio (d σ/d T), the triple point, and why such large variations are reported in superelastic alloys.

  18. Pervasive Computing Technologies to Continuously Assess Alzheimer's Disease Progression and Intervention Efficacy.

    PubMed

    Lyons, Bayard E; Austin, Daniel; Seelye, Adriana; Petersen, Johanna; Yeargers, Jonathan; Riley, Thomas; Sharma, Nicole; Mattek, Nora; Wild, Katherine; Dodge, Hiroko; Kaye, Jeffrey A

    2015-01-01

    Traditionally, assessment of functional and cognitive status of individuals with dementia occurs in brief clinic visits during which time clinicians extract a snapshot of recent changes in individuals' health. Conventionally, this is done using various clinical assessment tools applied at the point of care and relies on patients' and caregivers' ability to accurately recall daily activity and trends in personal health. These practices suffer from the infrequency and generally short durations of visits. Since 2004, researchers at the Oregon Center for Aging and Technology (ORCATECH) at the Oregon Health and Science University have been working on developing technologies to transform this model. ORCATECH researchers have developed a system of continuous in-home monitoring using pervasive computing technologies that make it possible to more accurately track activities and behaviors and measure relevant intra-individual changes. We have installed a system of strategically placed sensors in over 480 homes and have been collecting data for up to 8 years. Using this continuous in-home monitoring system, ORCATECH researchers have collected data on multiple behaviors such as gait and mobility, sleep and activity patterns, medication adherence, and computer use. Patterns of intra-individual variation detected in each of these areas are used to predict outcomes such as low mood, loneliness, and cognitive function. These methods have the potential to improve the quality of patient health data and in turn patient care especially related to cognitive decline. Furthermore, the continuous real-world nature of the data may improve the efficiency and ecological validity of clinical intervention studies.

  19. A Pervasive Parallel Processing Framework for Data Visualization and Analysis at Extreme Scale

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moreland, Kenneth; Geveci, Berk

    2014-11-01

    The evolution of the computing world from teraflop to petaflop has been relatively effortless, with several of the existing programming models scaling effectively to the petascale. The migration to exascale, however, poses considerable challenges. All industry trends infer that the exascale machine will be built using processors containing hundreds to thousands of cores per chip. It can be inferred that efficient concurrency on exascale machines requires a massive amount of concurrent threads, each performing many operations on a localized piece of data. Currently, visualization libraries and applications are based off what is known as the visualization pipeline. In the pipelinemore » model, algorithms are encapsulated as filters with inputs and outputs. These filters are connected by setting the output of one component to the input of another. Parallelism in the visualization pipeline is achieved by replicating the pipeline for each processing thread. This works well for today’s distributed memory parallel computers but cannot be sustained when operating on processors with thousands of cores. Our project investigates a new visualization framework designed to exhibit the pervasive parallelism necessary for extreme scale machines. Our framework achieves this by defining algorithms in terms of worklets, which are localized stateless operations. Worklets are atomic operations that execute when invoked unlike filters, which execute when a pipeline request occurs. The worklet design allows execution on a massive amount of lightweight threads with minimal overhead. Only with such fine-grained parallelism can we hope to fill the billions of threads we expect will be necessary for efficient computation on an exascale machine.« less

  20. Pervasive Computing Technologies to Continuously Assess Alzheimer’s Disease Progression and Intervention Efficacy

    PubMed Central

    Lyons, Bayard E.; Austin, Daniel; Seelye, Adriana; Petersen, Johanna; Yeargers, Jonathan; Riley, Thomas; Sharma, Nicole; Mattek, Nora; Wild, Katherine; Dodge, Hiroko; Kaye, Jeffrey A.

    2015-01-01

    Traditionally, assessment of functional and cognitive status of individuals with dementia occurs in brief clinic visits during which time clinicians extract a snapshot of recent changes in individuals’ health. Conventionally, this is done using various clinical assessment tools applied at the point of care and relies on patients’ and caregivers’ ability to accurately recall daily activity and trends in personal health. These practices suffer from the infrequency and generally short durations of visits. Since 2004, researchers at the Oregon Center for Aging and Technology (ORCATECH) at the Oregon Health and Science University have been working on developing technologies to transform this model. ORCATECH researchers have developed a system of continuous in-home monitoring using pervasive computing technologies that make it possible to more accurately track activities and behaviors and measure relevant intra-individual changes. We have installed a system of strategically placed sensors in over 480 homes and have been collecting data for up to 8 years. Using this continuous in-home monitoring system, ORCATECH researchers have collected data on multiple behaviors such as gait and mobility, sleep and activity patterns, medication adherence, and computer use. Patterns of intra-individual variation detected in each of these areas are used to predict outcomes such as low mood, loneliness, and cognitive function. These methods have the potential to improve the quality of patient health data and in turn patient care especially related to cognitive decline. Furthermore, the continuous real-world nature of the data may improve the efficiency and ecological validity of clinical intervention studies. PMID:26113819

  1. Current state and future direction of computer systems at NASA Langley Research Center

    NASA Technical Reports Server (NTRS)

    Rogers, James L. (Editor); Tucker, Jerry H. (Editor)

    1992-01-01

    Computer systems have advanced at a rate unmatched by any other area of technology. As performance has dramatically increased there has been an equally dramatic reduction in cost. This constant cost performance improvement has precipitated the pervasiveness of computer systems into virtually all areas of technology. This improvement is due primarily to advances in microelectronics. Most people are now convinced that the new generation of supercomputers will be built using a large number (possibly thousands) of high performance microprocessors. Although the spectacular improvements in computer systems have come about because of these hardware advances, there has also been a steady improvement in software techniques. In an effort to understand how these hardware and software advances will effect research at NASA LaRC, the Computer Systems Technical Committee drafted this white paper to examine the current state and possible future directions of computer systems at the Center. This paper discusses selected important areas of computer systems including real-time systems, embedded systems, high performance computing, distributed computing networks, data acquisition systems, artificial intelligence, and visualization.

  2. 76 FR 41523 - In the Matter of Certain Mobile Communications and Computer Devices and Components Thereof...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-14

    ... Communications and Computer Devices and Components Thereof; Notice of Commission Determination Not To Review an... in its entirety Inv. No. 337-TA-704, Certain Mobile Communications and Computer Devices and... importation of certain mobile communications and computer devices and components thereof by reason of...

  3. Usability of a Low-Cost Head Tracking Computer Access Method following Stroke.

    PubMed

    Mah, Jasmine; Jutai, Jeffrey W; Finestone, Hillel; Mckee, Hilary; Carter, Melanie

    2015-01-01

    Assistive technology devices for computer access can facilitate social reintegration and promote independence for people who have had a stroke. This work describes the exploration of the usefulness and acceptability of a new computer access device called the Nouse™ (Nose-as-mouse). The device uses standard webcam and video recognition algorithms to map the movement of the user's nose to a computer cursor, thereby allowing hands-free computer operation. Ten participants receiving in- or outpatient stroke rehabilitation completed a series of standardized and everyday computer tasks using the Nouse™ and then completed a device usability questionnaire. Task completion rates were high (90%) for computer activities only in the absence of time constraints. Most of the participants were satisfied with ease of use (70%) and liked using the Nouse™ (60%), indicating they could resume most of their usual computer activities apart from word-processing using the device. The findings suggest that hands-free computer access devices like the Nouse™ may be an option for people who experience upper motor impairment caused by stroke and are highly motivated to resume personal computing. More research is necessary to further evaluate the effectiveness of this technology, especially in relation to other computer access assistive technology devices.

  4. Optimized Materials From First Principles Simulations: Are We There Yet?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Galli, G; Gygi, F

    2005-07-26

    In the past thirty years, the use of scientific computing has become pervasive in all disciplines: collection and interpretation of most experimental data is carried out using computers, and physical models in computable form, with various degrees of complexity and sophistication, are utilized in all fields of science. However, full prediction of physical and chemical phenomena based on the basic laws of Nature, using computer simulations, is a revolution still in the making, and it involves some formidable theoretical and computational challenges. We illustrate the progress and successes obtained in recent years in predicting fundamental properties of materials in condensedmore » phases and at the nanoscale, using ab-initio, quantum simulations. We also discuss open issues related to the validation of the approximate, first principles theories used in large scale simulations, and the resulting complex interplay between computation and experiment. Finally, we describe some applications, with focus on nanostructures and liquids, both at ambient and under extreme conditions.« less

  5. Power throttling of collections of computing elements

    DOEpatents

    Bellofatto, Ralph E [Ridgefield, CT; Coteus, Paul W [Yorktown Heights, NY; Crumley, Paul G [Yorktown Heights, NY; Gara, Alan G [Mount Kidsco, NY; Giampapa, Mark E [Irvington, NY; Gooding,; Thomas, M [Rochester, MN; Haring, Rudolf A [Cortlandt Manor, NY; Megerian, Mark G [Rochester, MN; Ohmacht, Martin [Yorktown Heights, NY; Reed, Don D [Mantorville, MN; Swetz, Richard A [Mahopac, NY; Takken, Todd [Brewster, NY

    2011-08-16

    An apparatus and method for controlling power usage in a computer includes a plurality of computers communicating with a local control device, and a power source supplying power to the local control device and the computer. A plurality of sensors communicate with the computer for ascertaining power usage of the computer, and a system control device communicates with the computer for controlling power usage of the computer.

  6. Wireless Adaptive Therapeutic TeleGaming in a Pervasive Computing Environment

    NASA Astrophysics Data System (ADS)

    Peters, James F.; Szturm, Tony; Borkowski, Maciej; Lockery, Dan; Ramanna, Sheela; Shay, Barbara

    This chapter introduces a wireless, pervasive computing approach to adaptive therapeutic telegaming considered in the context of near set theory. Near set theory provides a formal basis for observation, comparison and classification of perceptual granules. A perceptual granule is defined by a collection of objects that are graspable by the senses or by the mind. In the proposed pervasive computing approach to telegaming, a handicapped person (e.g., stroke patient with limited hand, finger, arm function) plays a video game by interacting with familiar instrumented objects such as cups, cutlery, soccer balls, nozzles, screw top-lids, spoons, so that the technology that makes therapeutic exercise game-playing possible is largely invisible (Archives of Physical Medicine and Rehabilitation 89:2213-2217, 2008). The basic approach to adaptive learning (AL) in the proposed telegaming environment is ethology-inspired and is quite different from the traditional approach to reinforcement learning. In biologically-inspired learning, organisms learn to achieve some goal by durable modification of behaviours in response to signals from the environment resulting from specific experiences (Animal Behavior, 1995). The term adaptive is used here in an ethological sense, where learning by an organism results from modifying behaviour in response to perceived changes in the environment. To instill adaptivity in a video game, it is assumed that learning by a video game is episodic. During an episode, the behaviour of a player is measured indirectly by tracking the occurrence of gaming events such as a hit or a miss of a target (e.g., hitting a moving ball with a game paddle). An ethogram provides a record of behaviour feature values that provide a basis a functional registry for handicapped players for gaming adaptivity. An important practical application of adaptive gaming is therapeutic rehabilitation exercise carried out in parallel with playing action video games. Enjoyable and engaging interactive gaming will motivate patients to complete the rehabilitation process. Adaptivity is seen as a way to make action games more accessible to those who have physical and cognitive impairments. The telegaming system connects to the internet and implements a feed-and-forward mechanism that transmits gaming session tables after each gaming session to a remote registry accessible to therapists and researchers. The contribution of this chapter is the introduction of a framework for wireless telegaming useful in therapeutic rehabilitation.

  7. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme.

    PubMed

    Zhu, Hui; Gao, Lijuan; Li, Hui

    2016-02-01

    With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users' personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users' query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users' queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs.

  8. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme

    PubMed Central

    Zhu, Hui; Gao, Lijuan; Li, Hui

    2016-01-01

    With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users’ personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users’ query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users’ queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs. PMID:26840319

  9. The Promises and Pitfalls of Digital Technology in Its Application to Alcohol Treatment

    PubMed Central

    Muench, Frederick

    2014-01-01

    Individuals seeking to change their alcohol use form a heterogeneous group with varied treatment goals—including moderation and abstinence—that therefore requires flexible treatment options. The availability of alcohol in the United States, and the pervasive social pressure to drink, warrant treatments that support individuals outside the treatment environment and that foster coping and self-regulation in the face of these demands. Emerging digital technologies show promise for helping both to hone therapies to clients’ individual needs and to support clients in settings beyond the clinic. In the broader health care arena, digital health technologies (DHTs) are transforming how health professionals assess, prevent, and treat both physical and mental health problems. DHTs include assessments and interventions delivered via computer, Internet, mobile phone, and wireless or wearable device technologies. The emerging literature examining within-treatment and mobile DHTs highlights an opportunity to create personalized alcohol treatments for every person seeking care. Despite the promises DHTs may hold, however, there still are many potential risks to using them and a number of challenges regarding how to integrate them into treatment successfully. This article will review the current and potential advantages of DHTs in alcohol treatment and the technological, personal, organizational, and systemic limitations of integrating various technology-based assessment and intervention programs into care. PMID:26259008

  10. Optimization of Diode Laser System to Treat Benign Prostate Hyperplasia Final Report CRADA No. TSB-1154-95

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    London, Richard A; Byrne, Mark

    Benign prostate hyperplasia (BPH) is a pervasive condition of enlargement of the male prostate gland which leads to several urinary difficulties ranging from hesitancy to incontinence to kidney dysfunction in severe cases. Currently the most common therapy is transurethral resection of the prostate (TURP) utilizing an electrosurgical device. Although TURP is largely successful, new BPH therapy methods are desired to reduce the cost and recovery time, improve the success rate, and reduce side effects. Recently, lasers have been introduced for this purpose. Indigo Medical Inc. is currently engaged in the development, testing, and preparation for sales of a new diodemore » laser based BPH therapy system. The development is based on laboratory experiments, animal studies, and a limited FDA-approved clinical trial in the US and in other countries. The addition of sophisticated numerical modeling, of the sort that has been highly developed at Lawrence Livermore National Laboratory, can greatly aid in the design of the system and treatment protocol. The benefits to DOE include the maintenance and advancement of numerical modeling expertise in radiation-matter interactions of the sort essential for the stockpile stewardship, inertial confinement fusion, and advanced manufacturing, and the push on advanced scientific computational methods, ultimately in areas such as 3-D transport.« less

  11. Data analysis and integration of environmental sensors to meet human needs

    NASA Astrophysics Data System (ADS)

    Santamaria, Amilcare Francesco; De Rango, Floriano; Barletta, Domenico; Falbo, Domenico; Imbrogno, Alessandro

    2014-05-01

    Nowadays one of the main task of technology is to make people's life simpler and easier. Ambient intelligence is an emerging discipline that brings intelligence to environments making them sensitive to us. This discipline has developed following the spread of sensors devices, sensor networks, pervasive computing and artificial intelligence. In this work, we attempt to enhance the Internet Of Things (loT) with intelligence and environments exploring various interactions between humans' beings and the environment they live in. In particular, the core of the system is composed of an automation system, which is made up with a domotic control unit and several sensors installed in the environment. The task of the sensors is to collect information from the environment and to send them to the control unit. Once the information is collected, the core combines them in order to infer the most accurate human needs. The knowledge of human needs and the current environment status compose the inputs of the intelligence block whose main goal is to find the right automations to satisfy human needs in a real time way. The system also provides a Speech Recognition service which allow users to interact with the system by their voice so human speech can be considered as additional input for smart automatisms.

  12. Pervasive and Non-Pervasive Conduct Problems in a Clinic Sample Aged 4-8 Years: Child, Family and Day-Care/School Factors

    ERIC Educational Resources Information Center

    Drugli, May Britt; Larsson, Bo; Clifford, Graham; Fossum, Sturla

    2007-01-01

    Differences between pervasive (home and day-care/school) versus non-pervasive (home only) conduct problems were examined in regard to various child, parent/family, and day-care/school characteristics in an outpatient clinic sample of 120 children aged 4-8 years. All children scored above the 90th percentile on the Eyberg Child Behavior Inventory…

  13. 78 FR 34669 - Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-10

    ..., Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... importing wireless communication devices, portable music and data processing devices, and tablet computers... certain electronic devices, including wireless communication devices, portable music and data processing...

  14. 'Designing Ambient Interactions - Pervasive Ergonomic Interfaces for Ageing Well' (DAI'10)

    NASA Astrophysics Data System (ADS)

    Geven, Arjan; Prost, Sebastian; Tscheligi, Manfred; Soldatos, John; Gonzalez, Mari Feli

    The workshop will focus on novel computer based interaction mechanisms and interfaces, which boost natural interactivity and obviate the need for conventional tedious interfaces. Such interfaces are increasingly used in ambient intelligence environments and related applications, including application boosting elderly cognitive support, cognitive rehabilitation and Ambient Assisted Living (AAL). The aim of the workshop is to provide insights on the technological underpinnings of such interfaces, along with tools and techniques for their design and evaluation.

  15. HPC Annual Report: Emulytics.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crussell, Jonathan; Boote, Jeffrey W.; Fritz, David Jakob

    Networked Information Technology systems play a key role supporting critical government, military, and private computer installations. Many of today's critical infrastructure systems have strong dependencies on secure information exchange among geographically dispersed facilities. As operations become increasingly dependent on the information exchange they also become targets for exploitation. The need to protect data and defend these systems from external attack has become increasingly vital while the nature of the threats has become sophisticated and pervasive making the challenges daunting. Enter Emulytics.

  16. Survey on Fall Detection and Fall Prevention Using Wearable and External Sensors

    PubMed Central

    Delahoz, Yueng Santiago; Labrador, Miguel Angel

    2014-01-01

    According to nihseniorhealth.gov (a website for older adults), falling represents a great threat as people get older, and providing mechanisms to detect and prevent falls is critical to improve people's lives. Over 1.6 million U.S. adults are treated for fall-related injuries in emergency rooms every year suffering fractures, loss of independence, and even death. It is clear then, that this problem must be addressed in a prompt manner, and the use of pervasive computing plays a key role to achieve this. Fall detection (FD) and fall prevention (FP) are research areas that have been active for over a decade, and they both strive for improving people's lives through the use of pervasive computing. This paper surveys the state of the art in FD and FP systems, including qualitative comparisons among various studies. It aims to serve as a point of reference for future research on the mentioned systems. A general description of FD and FP systems is provided, including the different types of sensors used in both approaches. Challenges and current solutions are presented and described in great detail. A 3-level taxonomy associated with the risk factors of a fall is proposed. Finally, cutting edge FD and FP systems are thoroughly reviewed and qualitatively compared, in terms of design issues and other parameters. PMID:25340452

  17. In vitro dosimetry of agglomerates

    NASA Astrophysics Data System (ADS)

    Hirsch, V.; Kinnear, C.; Rodriguez-Lorenzo, L.; Monnier, C. A.; Rothen-Rutishauser, B.; Balog, S.; Petri-Fink, A.

    2014-06-01

    Agglomeration of nanoparticles in biological fluids is a pervasive phenomenon that leads to difficulty in the interpretation of results from in vitro exposure, primarily due to differing particokinetics of agglomerates to nanoparticles. Therefore, well-defined small agglomerates were designed that possessed different particokinetic profiles, and their cellular uptake was compared to a computational model of dosimetry. The approach used here paves the way for a better understanding of the impact of agglomeration on the nanoparticle-cell interaction.Agglomeration of nanoparticles in biological fluids is a pervasive phenomenon that leads to difficulty in the interpretation of results from in vitro exposure, primarily due to differing particokinetics of agglomerates to nanoparticles. Therefore, well-defined small agglomerates were designed that possessed different particokinetic profiles, and their cellular uptake was compared to a computational model of dosimetry. The approach used here paves the way for a better understanding of the impact of agglomeration on the nanoparticle-cell interaction. Electronic supplementary information (ESI) available: ITC data for tiopronin/Au-NP interactions, agglomeration kinetics at different pHs for tiopronin-coated Au-NPs, UV-Vis spectra in water, PBS and DMEM and temporal correlation functions for single Au-NPs and corresponding agglomerates, calculation of diffusion and sedimentation parameters, modelling of relative cell uptake based on the ISDD model and cytotoxicity of single Au-NPs and their agglomerates, and synthesis and cell uptake of large spherical Au-NPs. See DOI: 10.1039/c4nr00460d

  18. Coseismic Damage Generation in Fault Zones by Successive High Strain Rate Loading Experiments

    NASA Astrophysics Data System (ADS)

    Aben, F. M.; Doan, M. L.; Renard, F.; Toussaint, R.; Reuschlé, T.; Gratier, J. P.

    2014-12-01

    Damage zones of active faults control both resistance to rupture and transport properties of the fault. Hence, knowing the rock damage's origin is important to constrain its properties. Here we study experimentally the damage generated by a succession of dynamic loadings, a process mimicking the stress history of a rock sample located next to an active fault. A propagating rupture generates high frequency stress perturbations next to its tip. This dynamic loading creates pervasive damage (pulverization), as multiple fractures initiate and grow simultaneously. Previous single loading experiments have shown a strain rate threshold for pulverization. Here, we focus on conditions below this threshold and the dynamic peak stress to constrain: 1) if there is dynamic fracturing at these conditions and 2) if successive loadings (cumulative seismic events) result in pervasive fracturing, effectively reducing the pulverization threshold to milder conditions. Monzonite samples were dynamically loaded (strain rate > 50 s-1) several times below the dynamic peak strength, using a Split Hopkinson Pressure Bar apparatus. Several quasi-static experiments were conducted as well (strain rate < 10-5-s). Samples loaded up to stresses above the quasi-static uniaxial compressive strength (qsUCS) systematically fragmented or pulverized after four successive loadings. We measured several damage proxies (P-wave velocity, porosity), that show a systematic increase in damage with each load. In addition, micro-computed tomography acquisition on several damage samples revealed the growth of a pervasive fracture network between ensuing loadings. Samples loaded dynamically below the qsUCS failed along one fracture after a variable amount of loadings and damage proxies do not show any a systematic trend. Our conclusions is that milder dynamic loading conditions, below the dynamic peak strength, result in pervasive dynamic fracturing. Also, successive loadings effectively lower the pulverization threshold of the rock. However, the peak loading stress must exceed the qsUCS of the rock, otherwise quasi-static fracturing occurs. Pulverized rocks found in the field are therefore witnesses of previous large earthquakes.

  19. High-performance computing for airborne applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Quinn, Heather M; Manuzzato, Andrea; Fairbanks, Tom

    2010-06-28

    Recently, there has been attempts to move common satellite tasks to unmanned aerial vehicles (UAVs). UAVs are significantly cheaper to buy than satellites and easier to deploy on an as-needed basis. The more benign radiation environment also allows for an aggressive adoption of state-of-the-art commercial computational devices, which increases the amount of data that can be collected. There are a number of commercial computing devices currently available that are well-suited to high-performance computing. These devices range from specialized computational devices, such as field-programmable gate arrays (FPGAs) and digital signal processors (DSPs), to traditional computing platforms, such as microprocessors. Even thoughmore » the radiation environment is relatively benign, these devices could be susceptible to single-event effects. In this paper, we will present radiation data for high-performance computing devices in a accelerated neutron environment. These devices include a multi-core digital signal processor, two field-programmable gate arrays, and a microprocessor. From these results, we found that all of these devices are suitable for many airplane environments without reliability problems.« less

  20. 77 FR 60720 - Certain Electronic Devices, Including Wireless Commmunication Devices, Portable Music and Data...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-794] Certain Electronic Devices, Including Wireless Commmunication Devices, Portable Music and Data Processing Devices, and Tablet Computers... communication devices, portable music and data processing devices, and tablet computers, imported by Apple Inc...

  1. Sensor sentinel computing device

    DOEpatents

    Damico, Joseph P.

    2016-08-02

    Technologies pertaining to authenticating data output by sensors in an industrial environment are described herein. A sensor sentinel computing device receives time-series data from a sensor by way of a wireline connection. The sensor sentinel computing device generates a validation signal that is a function of the time-series signal. The sensor sentinel computing device then transmits the validation signal to a programmable logic controller in the industrial environment.

  2. Withdrawal Study of Memantine in Pediatric Patients With Autism, Asperger's Disorder, or Pervasive Developmental Disorder Not Otherwise Specified Previously Treated With Memantine

    ClinicalTrials.gov

    2013-10-31

    Autism Spectrum Disorder (ASD); Autism; Autistic Disorder; Asperger's Disorder; Asperger's; Pediatric Autism; Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS); Pervasive Child Development Disorder

  3. A distributed framework for health information exchange using smartphone technologies.

    PubMed

    Abdulnabi, Mohamed; Al-Haiqi, Ahmed; Kiah, M L M; Zaidan, A A; Zaidan, B B; Hussain, Muzammil

    2017-05-01

    Nationwide health information exchange (NHIE) continues to be a persistent concern for government agencies, despite the many efforts and the conceived benefits of sharing patient data among healthcare providers. Difficulties in ensuring global connectivity, interoperability, and concerns on security have always hampered the government from successfully deploying NHIE. By looking at NHIE from a fresh perspective and bearing in mind the pervasiveness and power of modern mobile platforms, this paper proposes a new approach to NHIE that builds on the notion of consumer-mediated HIE, albeit without the focus on central health record banks. With the growing acceptance of smartphones as reliable, indispensable, and most personal devices, we suggest to leverage the concept of mobile personal health records (PHRs installed on smartphones) to the next level. We envision mPHRs that take the form of distributed storage units for health information, under the full control and direct possession of patients, who can have ready access to their personal data whenever needed. However, for the actual exchange of data with health information systems managed by healthcare providers, the latter have to be interoperable with patient-carried mPHRs. Computer industry has long ago solved a similar problem of interoperability between peripheral devices and operating systems. We borrow from that solution the idea of providing special interfaces between mPHRs and provider systems. This interface enables the two entities to communicate with no change to either end. The design and operation of the proposed approach is explained. Additional pointers on potential implementations are provided, and issues that pertain to any solution to implement NHIE are discussed. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. Interfacing External Quantum Devices to a Universal Quantum Computer

    PubMed Central

    Lagana, Antonio A.; Lohe, Max A.; von Smekal, Lorenz

    2011-01-01

    We present a scheme to use external quantum devices using the universal quantum computer previously constructed. We thereby show how the universal quantum computer can utilize networked quantum information resources to carry out local computations. Such information may come from specialized quantum devices or even from remote universal quantum computers. We show how to accomplish this by devising universal quantum computer programs that implement well known oracle based quantum algorithms, namely the Deutsch, Deutsch-Jozsa, and the Grover algorithms using external black-box quantum oracle devices. In the process, we demonstrate a method to map existing quantum algorithms onto the universal quantum computer. PMID:22216276

  5. Interfacing external quantum devices to a universal quantum computer.

    PubMed

    Lagana, Antonio A; Lohe, Max A; von Smekal, Lorenz

    2011-01-01

    We present a scheme to use external quantum devices using the universal quantum computer previously constructed. We thereby show how the universal quantum computer can utilize networked quantum information resources to carry out local computations. Such information may come from specialized quantum devices or even from remote universal quantum computers. We show how to accomplish this by devising universal quantum computer programs that implement well known oracle based quantum algorithms, namely the Deutsch, Deutsch-Jozsa, and the Grover algorithms using external black-box quantum oracle devices. In the process, we demonstrate a method to map existing quantum algorithms onto the universal quantum computer. © 2011 Lagana et al.

  6. A literature review of the effects of computer input device design on biomechanical loading and musculoskeletal outcomes during computer work.

    PubMed

    Bruno Garza, J L; Young, J G

    2015-01-01

    Extended use of conventional computer input devices is associated with negative musculoskeletal outcomes. While many alternative designs have been proposed, it is unclear whether these devices reduce biomechanical loading and musculoskeletal outcomes. To review studies describing and evaluating the biomechanical loading and musculoskeletal outcomes associated with conventional and alternative input devices. Included studies evaluated biomechanical loading and/or musculoskeletal outcomes of users' distal or proximal upper extremity regions associated with the operation of alternative input devices (pointing devices, mice, other devices) that could be used in a desktop personal computing environment during typical office work. Some alternative pointing device designs (e.g. rollerbar) were consistently associated with decreased biomechanical loading while other designs had inconsistent results across studies. Most alternative keyboards evaluated in the literature reduce biomechanical loading and musculoskeletal outcomes. Studies of other input devices (e.g. touchscreen and gestural controls) were rare, however, those reported to date indicate that these devices are currently unsuitable as replacements for traditional devices. Alternative input devices that reduce biomechanical loading may make better choices for preventing or alleviating musculoskeletal outcomes during computer use, however, it is unclear whether many existing designs are effective.

  7. A Security Architecture Based on Trust Management for Pervasive Computing Systems

    DTIC Science & Technology

    2005-01-01

    SmartSpace framework, we extended the C2 [16] ar- chitecture, which in turn is based on the Centaurus [10] model. In Centaurus a Client can access...the services provided by the nearest Centaurus Service Manager (SM) via some short-range communi- cation. The SM acts as an active proxy by executing...The In the Centaurus project [10], the main design goal is the development of a framework for building portals to services using various types of

  8. NEXUS - Resilient Intelligent Middleware

    NASA Astrophysics Data System (ADS)

    Kaveh, N.; Hercock, R. Ghanea

    Service-oriented computing, a composition of distributed-object computing, component-based, and Web-based concepts, is becoming the widespread choice for developing dynamic heterogeneous software assets available as services across a network. One of the major strengths of service-oriented technologies is the high abstraction layer and large granularity level at which software assets are viewed compared to traditional object-oriented technologies. Collaboration through encapsulated and separately defined service interfaces creates a service-oriented environment, whereby multiple services can be linked together through their interfaces to compose a functional system. This approach enables better integration of legacy and non-legacy services, via wrapper interfaces, and allows for service composition at a more abstract level especially in cases such as vertical market stacks. The heterogeneous nature of service-oriented technologies and the granularity of their software components makes them a suitable computing model in the pervasive domain.

  9. Towards Scalable Graph Computation on Mobile Devices.

    PubMed

    Chen, Yiqi; Lin, Zhiyuan; Pienta, Robert; Kahng, Minsuk; Chau, Duen Horng

    2014-10-01

    Mobile devices have become increasingly central to our everyday activities, due to their portability, multi-touch capabilities, and ever-improving computational power. Such attractive features have spurred research interest in leveraging mobile devices for computation. We explore a novel approach that aims to use a single mobile device to perform scalable graph computation on large graphs that do not fit in the device's limited main memory, opening up the possibility of performing on-device analysis of large datasets, without relying on the cloud. Based on the familiar memory mapping capability provided by today's mobile operating systems, our approach to scale up computation is powerful and intentionally kept simple to maximize its applicability across the iOS and Android platforms. Our experiments demonstrate that an iPad mini can perform fast computation on large real graphs with as many as 272 million edges (Google+ social graph), at a speed that is only a few times slower than a 13″ Macbook Pro. Through creating a real world iOS app with this technique, we demonstrate the strong potential application for scalable graph computation on a single mobile device using our approach.

  10. Towards Scalable Graph Computation on Mobile Devices

    PubMed Central

    Chen, Yiqi; Lin, Zhiyuan; Pienta, Robert; Kahng, Minsuk; Chau, Duen Horng

    2015-01-01

    Mobile devices have become increasingly central to our everyday activities, due to their portability, multi-touch capabilities, and ever-improving computational power. Such attractive features have spurred research interest in leveraging mobile devices for computation. We explore a novel approach that aims to use a single mobile device to perform scalable graph computation on large graphs that do not fit in the device's limited main memory, opening up the possibility of performing on-device analysis of large datasets, without relying on the cloud. Based on the familiar memory mapping capability provided by today's mobile operating systems, our approach to scale up computation is powerful and intentionally kept simple to maximize its applicability across the iOS and Android platforms. Our experiments demonstrate that an iPad mini can perform fast computation on large real graphs with as many as 272 million edges (Google+ social graph), at a speed that is only a few times slower than a 13″ Macbook Pro. Through creating a real world iOS app with this technique, we demonstrate the strong potential application for scalable graph computation on a single mobile device using our approach. PMID:25859564

  11. Materials requirements for optical processing and computing devices

    NASA Technical Reports Server (NTRS)

    Tanguay, A. R., Jr.

    1985-01-01

    Devices for optical processing and computing systems are discussed, with emphasis on the materials requirements imposed by functional constraints. Generalized optical processing and computing systems are described in order to identify principal categories of requisite components for complete system implementation. Three principal device categories are selected for analysis in some detail: spatial light modulators, volume holographic optical elements, and bistable optical devices. The implications for optical processing and computing systems of the materials requirements identified for these device categories are described, and directions for future research are proposed.

  12. Pruning a decision tree for selecting computer-related assistive devices for people with disabilities.

    PubMed

    Chi, Chia-Fen; Tseng, Li-Kai; Jang, Yuh

    2012-07-01

    Many disabled individuals lack extensive knowledge about assistive technology, which could help them use computers. In 1997, Denis Anson developed a decision tree of 49 evaluative questions designed to evaluate the functional capabilities of the disabled user and choose an appropriate combination of assistive devices, from a selection of 26, that enable the individual to use a computer. In general, occupational therapists guide the disabled users through this process. They often have to go over repetitive questions in order to find an appropriate device. A disabled user may require an alphanumeric entry device, a pointing device, an output device, a performance enhancement device, or some combination of these. Therefore, the current research eliminates redundant questions and divides Anson's decision tree into multiple independent subtrees to meet the actual demand of computer users with disabilities. The modified decision tree was tested by six disabled users to prove it can determine a complete set of assistive devices with a smaller number of evaluative questions. The means to insert new categories of computer-related assistive devices was included to ensure the decision tree can be expanded and updated. The current decision tree can help the disabled users and assistive technology practitioners to find appropriate computer-related assistive devices that meet with clients' individual needs in an efficient manner.

  13. Fog Computing and Edge Computing Architectures for Processing Data From Diabetes Devices Connected to the Medical Internet of Things.

    PubMed

    Klonoff, David C

    2017-07-01

    The Internet of Things (IoT) is generating an immense volume of data. With cloud computing, medical sensor and actuator data can be stored and analyzed remotely by distributed servers. The results can then be delivered via the Internet. The number of devices in IoT includes such wireless diabetes devices as blood glucose monitors, continuous glucose monitors, insulin pens, insulin pumps, and closed-loop systems. The cloud model for data storage and analysis is increasingly unable to process the data avalanche, and processing is being pushed out to the edge of the network closer to where the data-generating devices are. Fog computing and edge computing are two architectures for data handling that can offload data from the cloud, process it nearby the patient, and transmit information machine-to-machine or machine-to-human in milliseconds or seconds. Sensor data can be processed near the sensing and actuating devices with fog computing (with local nodes) and with edge computing (within the sensing devices). Compared to cloud computing, fog computing and edge computing offer five advantages: (1) greater data transmission speed, (2) less dependence on limited bandwidths, (3) greater privacy and security, (4) greater control over data generated in foreign countries where laws may limit use or permit unwanted governmental access, and (5) lower costs because more sensor-derived data are used locally and less data are transmitted remotely. Connected diabetes devices almost all use fog computing or edge computing because diabetes patients require a very rapid response to sensor input and cannot tolerate delays for cloud computing.

  14. Teaching and Learning with Mobile Computing Devices: Case Study in K-12 Classrooms

    ERIC Educational Resources Information Center

    Grant, Michael M.; Tamim, Suha; Brown, Dorian B.; Sweeney, Joseph P.; Ferguson, Fatima K.; Jones, Lakavious B.

    2015-01-01

    While ownership of mobile computing devices, such as cellphones, smartphones, and tablet computers, has been rapid, the adoption of these devices in K-12 classrooms has been measured. Some schools and individual teachers have integrated mobile devices to support teaching and learning. The purpose of this qualitative research was to describe the…

  15. On Emulation of Flueric Devices in Excitable Chemical Medium

    PubMed Central

    Adamatzky, Andrew

    2016-01-01

    Flueric devices are fluidic devices without moving parts. Fluidic devices use fluid as a medium for information transfer and computation. A Belousov-Zhabotinsky (BZ) medium is a thin-layer spatially extended excitable chemical medium which exhibits travelling excitation wave-fronts. The excitation wave-fronts transfer information. Flueric devices compute via jets interaction. BZ devices compute via excitation wave-fronts interaction. In numerical model of BZ medium we show that functions of key flueric devices are implemented in the excitable chemical system: signal generator, and, xor, not and nor Boolean gates, delay elements, diodes and sensors. Flueric devices have been widely used in industry since late 1960s and are still employed in automotive and aircraft technologies. Implementation of analog of the flueric devices in the excitable chemical systems opens doors to further applications of excitation wave-based unconventional computing in soft robotics, embedded organic electronics and living technologies. PMID:27997561

  16. On Emulation of Flueric Devices in Excitable Chemical Medium.

    PubMed

    Adamatzky, Andrew

    2016-01-01

    Flueric devices are fluidic devices without moving parts. Fluidic devices use fluid as a medium for information transfer and computation. A Belousov-Zhabotinsky (BZ) medium is a thin-layer spatially extended excitable chemical medium which exhibits travelling excitation wave-fronts. The excitation wave-fronts transfer information. Flueric devices compute via jets interaction. BZ devices compute via excitation wave-fronts interaction. In numerical model of BZ medium we show that functions of key flueric devices are implemented in the excitable chemical system: signal generator, and, xor, not and nor Boolean gates, delay elements, diodes and sensors. Flueric devices have been widely used in industry since late 1960s and are still employed in automotive and aircraft technologies. Implementation of analog of the flueric devices in the excitable chemical systems opens doors to further applications of excitation wave-based unconventional computing in soft robotics, embedded organic electronics and living technologies.

  17. Computational and experimental studies of LEBUs at high device Reynolds numbers

    NASA Technical Reports Server (NTRS)

    Bertelrud, Arild; Watson, R. D.

    1988-01-01

    The present paper summarizes computational and experimental studies for large-eddy breakup devices (LEBUs). LEBU optimization (using a computational approach considering compressibility, Reynolds number, and the unsteadiness of the flow) and experiments with LEBUs at high Reynolds numbers in flight are discussed. The measurements include streamwise as well as spanwise distributions of local skin friction. The unsteady flows around the LEBU devices and far downstream are characterized by strain-gage measurements on the devices and hot-wire readings downstream. Computations are made with available time-averaged and quasi-stationary techniques to find suitable device profiles with minimum drag.

  18. Minimizing the Pervasiveness of Women's Personal Experiences of Gender Discrimination

    ERIC Educational Resources Information Center

    Foster, Mindi D.; Jackson, Lydia C.; Hartmann, Ryan; Woulfe, Shannon

    2004-01-01

    Given the Rejection-Identification Model (Branscombe, Schmitt, & Harvey, 1999), which shows that perceiving discrimination to be pervasive is a negative experience, it was suggested that there would be conditions under which women would instead minimize the pervasiveness of discrimination. Study 1 (N= 91) showed that when women envisioned…

  19. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 1 2011-01-01 2011-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...

  20. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 1 2014-01-01 2014-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...

  1. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 1 2013-01-01 2013-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...

  2. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...

  3. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...

  4. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...

  5. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...

  6. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 1 2012-01-01 2012-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...

  7. System for simultaneously loading program to master computer memory devices and corresponding slave computer memory devices

    NASA Technical Reports Server (NTRS)

    Hall, William A. (Inventor)

    1993-01-01

    A bus programmable slave module card for use in a computer control system is disclosed which comprises a master computer and one or more slave computer modules interfacing by means of a bus. Each slave module includes its own microprocessor, memory, and control program for acting as a single loop controller. The slave card includes a plurality of memory means (S1, S2...) corresponding to a like plurality of memory devices (C1, C2...) in the master computer, for each slave memory means its own communication lines connectable through the bus with memory communication lines of an associated memory device in the master computer, and a one-way electronic door which is switchable to either a closed condition or a one-way open condition. With the door closed, communication lines between master computer memory (C1, C2...) and slave memory (S1, S2...) are blocked. In the one-way open condition invention, the memory communication lines or each slave memory means (S1, S2...) connect with the memory communication lines of its associated memory device (C1, C2...) in the master computer, and the memory devices (C1, C2...) of the master computer and slave card are electrically parallel such that information seen by the master's memory is also seen by the slave's memory. The slave card is also connectable to a switch for electronically removing the slave microprocessor from the system. With the master computer and the slave card in programming mode relationship, and the slave microprocessor electronically removed from the system, loading a program in the memory devices (C1, C2...) of the master accomplishes a parallel loading into the memory devices (S1, S2...) of the slave.

  8. High performance MPEG-audio decoder IC

    NASA Technical Reports Server (NTRS)

    Thorn, M.; Benbassat, G.; Cyr, K.; Li, S.; Gill, M.; Kam, D.; Walker, K.; Look, P.; Eldridge, C.; Ng, P.

    1993-01-01

    The emerging digital audio and video compression technology brings both an opportunity and a new challenge to IC design. The pervasive application of compression technology to consumer electronics will require high volume, low cost IC's and fast time to market of the prototypes and production units. At the same time, the algorithms used in the compression technology result in complex VLSI IC's. The conflicting challenges of algorithm complexity, low cost, and fast time to market have an impact on device architecture and design methodology. The work presented in this paper is about the design of a dedicated, high precision, Motion Picture Expert Group (MPEG) audio decoder.

  9. Cyberbullying: implications for the psychiatric nurse practitioner.

    PubMed

    Carpenter, Lindsey M; Hubbard, Grace B

    2014-08-01

    The purpose of this article is to inform and educate psychiatric nurse practitioners about the pervasiveness of the rapidly increasing problem of cyberbullying. As more children and adolescents obtain access to the Internet, mobile devices, and social networking sites, the exposure to bullying in the virtual format increases. Cyberbullying is a growing public health concern and can affect mental health and school performance. Cyberbullying often results in a range of psychiatric symptoms and has been linked to suicide attempts and completions. The psychiatric nurse practitioner is uniquely prepared to provide a range of interventions for patients, families, and communities who have experienced cyberbullying. © 2014 Wiley Periodicals, Inc.

  10. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    NASA Astrophysics Data System (ADS)

    Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan

    2017-08-01

    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.

  11. Manycore Performance-Portability: Kokkos Multidimensional Array Library

    DOE PAGES

    Edwards, H. Carter; Sunderland, Daniel; Porter, Vicki; ...

    2012-01-01

    Large, complex scientific and engineering application code have a significant investment in computational kernels to implement their mathematical models. Porting these computational kernels to the collection of modern manycore accelerator devices is a major challenge in that these devices have diverse programming models, application programming interfaces (APIs), and performance requirements. The Kokkos Array programming model provides library-based approach to implement computational kernels that are performance-portable to CPU-multicore and GPGPU accelerator devices. This programming model is based upon three fundamental concepts: (1) manycore compute devices each with its own memory space, (2) data parallel kernels and (3) multidimensional arrays. Kernel executionmore » performance is, especially for NVIDIA® devices, extremely dependent on data access patterns. Optimal data access pattern can be different for different manycore devices – potentially leading to different implementations of computational kernels specialized for different devices. The Kokkos Array programming model supports performance-portable kernels by (1) separating data access patterns from computational kernels through a multidimensional array API and (2) introduce device-specific data access mappings when a kernel is compiled. An implementation of Kokkos Array is available through Trilinos [Trilinos website, http://trilinos.sandia.gov/, August 2011].« less

  12. 77 FR 32996 - Certain Handheld Electronic Computing Devices, Related Software, and Components Thereof...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-04

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-769] Certain Handheld Electronic Computing Devices, Related Software, and Components Thereof; Termination of the Investigation Based on... electronic computing devices, related software, and components thereof by reason of infringement of certain...

  13. Energy efficient hybrid computing systems using spin devices

    NASA Astrophysics Data System (ADS)

    Sharad, Mrigank

    Emerging spin-devices like magnetic tunnel junctions (MTJ's), spin-valves and domain wall magnets (DWM) have opened new avenues for spin-based logic design. This work explored potential computing applications which can exploit such devices for higher energy-efficiency and performance. The proposed applications involve hybrid design schemes, where charge-based devices supplement the spin-devices, to gain large benefits at the system level. As an example, lateral spin valves (LSV) involve switching of nanomagnets using spin-polarized current injection through a metallic channel such as Cu. Such spin-torque based devices possess several interesting properties that can be exploited for ultra-low power computation. Analog characteristic of spin current facilitate non-Boolean computation like majority evaluation that can be used to model a neuron. The magneto-metallic neurons can operate at ultra-low terminal voltage of ˜20mV, thereby resulting in small computation power. Moreover, since nano-magnets inherently act as memory elements, these devices can facilitate integration of logic and memory in interesting ways. The spin based neurons can be integrated with CMOS and other emerging devices leading to different classes of neuromorphic/non-Von-Neumann architectures. The spin-based designs involve `mixed-mode' processing and hence can provide very compact and ultra-low energy solutions for complex computation blocks, both digital as well as analog. Such low-power, hybrid designs can be suitable for various data processing applications like cognitive computing, associative memory, and currentmode on-chip global interconnects. Simulation results for these applications based on device-circuit co-simulation framework predict more than ˜100x improvement in computation energy as compared to state of the art CMOS design, for optimal spin-device parameters.

  14. Using Instructional Pervasive Game for School Children's Cultural Learning

    ERIC Educational Resources Information Center

    Chen, Cheng-Ping; Shih, Ju-Ling; Ma, Yi-Chun

    2014-01-01

    In the past ten years, mobile learning (m-learning) has created a new learning environment that enables learners, through active learning aids. Instructional pervasive gaming (IPG) seems to be an innovative way introduced to enhance m-learning. This study employed a theoretical IPG model to construct a cultural-based pervasive game. Individual and…

  15. On Designing a Pervasive Mobile Learning Platform

    ERIC Educational Resources Information Center

    Laine, Teemu H.; Vinni, Mikko; Sedano, Carolina Islas; Joy, Mike

    2010-01-01

    This article presents the features, design and architecture of the Myst pervasive game platform that has been applied in creating pervasive mobile learning games in various contexts such as science festivals and museums in Finland. Based on our experiences with the development, we draw a set of design principles for creating successfully a…

  16. Architecture of a wireless Personal Assistant for telemedical diabetes care.

    PubMed

    García-Sáez, Gema; Hernando, M Elena; Martínez-Sarriegui, Iñaki; Rigla, Mercedes; Torralba, Verónica; Brugués, Eulalia; de Leiva, Alberto; Gómez, Enrique J

    2009-06-01

    Advanced information technologies joined to the increasing use of continuous medical devices for monitoring and treatment, have made possible the definition of a new telemedical diabetes care scenario based on a hand-held Personal Assistant (PA). This paper describes the architecture, functionality and implementation of the PA, which communicates different medical devices in a personal wireless network. The PA is a mobile system for patients with diabetes connected to a telemedical center. The software design follows a modular approach to make the integration of medical devices or new functionalities independent from the rest of its components. Physicians can remotely control medical devices from the telemedicine server through the integration of the Common Object Request Broker Architecture (CORBA) and mobile GPRS communications. Data about PA modules' usage and patients' behavior evaluation come from a pervasive tracing system implemented into the PA. The PA architecture has been technically validated with commercially available medical devices during a clinical experiment for ambulatory monitoring and expert feedback through telemedicine. The clinical experiment has allowed defining patients' patterns of usage and preferred scenarios and it has proved the Personal Assistant's feasibility. The patients showed high acceptability and interest in the system as recorded in the usability and utility questionnaires. Future work will be devoted to the validation of the system with automatic control strategies from the telemedical center as well as with closed-loop control algorithms.

  17. Health-enabling technologies for pervasive health care: on services and ICT architecture paradigms.

    PubMed

    Haux, Reinhold; Howe, Jurgen; Marschollek, Michael; Plischke, Maik; Wolf, Klaus-Hendrik

    2008-06-01

    Progress in information and communication technologies (ICT) is providing new opportunities for pervasive health care services in aging societies. To identify starting points of health-enabling technologies for pervasive health care. To describe typical services of and contemporary ICT architecture paradigms for pervasive health care. Summarizing outcomes of literature analyses and results from own research projects in this field. Basic functions for pervasive health care with respect to home care comprise emergency detection and alarm, disease management, as well as health status feedback and advice. These functions are complemented by optional (non-health care) functions. Four major paradigms for contemporary ICT architectures are person-centered ICT architectures, home-centered ICT architectures, telehealth service-centered ICT architectures and health care institution-centered ICT architectures. Health-enabling technologies may lead to both new ways of living and new ways of health care. Both ways are interwoven. This has to be considered for appropriate ICT architectures of sensor-enhanced health information systems. IMIA, the International Medical Informatics Association, may be an appropriate forum for interdisciplinary research exchange on health-enabling technologies for pervasive health care.

  18. A pervasive parallel framework for visualization: final report for FWP 10-014707

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moreland, Kenneth D.

    2014-01-01

    We are on the threshold of a transformative change in the basic architecture of highperformance computing. The use of accelerator processors, characterized by large core counts, shared but asymmetrical memory, and heavy thread loading, is quickly becoming the norm in high performance computing. These accelerators represent significant challenges in updating our existing base of software. An intrinsic problem with this transition is a fundamental programming shift from message passing processes to much more fine thread scheduling with memory sharing. Another problem is the lack of stability in accelerator implementation; processor and compiler technology is currently changing rapidly. This report documentsmore » the results of our three-year ASCR project to address these challenges. Our project includes the development of the Dax toolkit, which contains the beginnings of new algorithms for a new generation of computers and the underlying infrastructure to rapidly prototype and build further algorithms as necessary.« less

  19. Generating and executing programs for a floating point single instruction multiple data instruction set architecture

    DOEpatents

    Gschwind, Michael K

    2013-04-16

    Mechanisms for generating and executing programs for a floating point (FP) only single instruction multiple data (SIMD) instruction set architecture (ISA) are provided. A computer program product comprising a computer recordable medium having a computer readable program recorded thereon is provided. The computer readable program, when executed on a computing device, causes the computing device to receive one or more instructions and execute the one or more instructions using logic in an execution unit of the computing device. The logic implements a floating point (FP) only single instruction multiple data (SIMD) instruction set architecture (ISA), based on data stored in a vector register file of the computing device. The vector register file is configured to store both scalar and floating point values as vectors having a plurality of vector elements.

  20. Local rollback for fault-tolerance in parallel computing systems

    DOEpatents

    Blumrich, Matthias A [Yorktown Heights, NY; Chen, Dong [Yorktown Heights, NY; Gara, Alan [Yorktown Heights, NY; Giampapa, Mark E [Yorktown Heights, NY; Heidelberger, Philip [Yorktown Heights, NY; Ohmacht, Martin [Yorktown Heights, NY; Steinmacher-Burow, Burkhard [Boeblingen, DE; Sugavanam, Krishnan [Yorktown Heights, NY

    2012-01-24

    A control logic device performs a local rollback in a parallel super computing system. The super computing system includes at least one cache memory device. The control logic device determines a local rollback interval. The control logic device runs at least one instruction in the local rollback interval. The control logic device evaluates whether an unrecoverable condition occurs while running the at least one instruction during the local rollback interval. The control logic device checks whether an error occurs during the local rollback. The control logic device restarts the local rollback interval if the error occurs and the unrecoverable condition does not occur during the local rollback interval.

  1. A pervasive visual-haptic framework for virtual delivery training.

    PubMed

    Abate, Andrea F; Acampora, Giovanni; Loia, Vincenzo; Ricciardi, Stefano; Vasilakos, Athanasios V

    2010-03-01

    Thanks to the advances of voltage regulator (VR) technologies and haptic systems, virtual simulators are increasingly becoming a viable alternative to physical simulators in medicine and surgery, though many challenges still remain. In this study, a pervasive visual-haptic framework aimed to the training of obstetricians and midwives to vaginal delivery is described. The haptic feedback is provided by means of two hand-based haptic devices able to reproduce force-feedbacks on fingers and arms, thus enabling a much more realistic manipulation respect to stylus-based solutions. The interactive simulation is not solely driven by an approximated model of complex forces and physical constraints but, instead, is approached by a formal modeling of the whole labor and of the assistance/intervention procedures performed by means of a timed automata network and applied to a parametrical 3-D model of the anatomy, able to mimic a wide range of configurations. This novel methodology is able to represent not only the sequence of the main events associated to either a spontaneous or to an operative childbirth process, but also to help in validating the manual intervention as the actions performed by the user during the simulation are evaluated according to established medical guidelines. A discussion on the first results as well as on the challenges still unaddressed is included.

  2. Framework model and principles for trusted information sharing in pervasive health.

    PubMed

    Ruotsalainen, Pekka; Blobel, Bernd; Nykänen, Pirkko; Seppälä, Antto; Sorvari, Hannu

    2011-01-01

    Trustfulness (i.e. health and wellness information is processed ethically, and privacy is guaranteed) is one of the cornerstones for future Personal Health Systems, ubiquitous healthcare and pervasive health. Trust in today's healthcare is organizational, static and predefined. Pervasive health takes place in an open and untrusted information space where person's lifelong health and wellness information together with contextual data are dynamically collected and used by many stakeholders. This generates new threats that do not exist in today's eHealth systems. Our analysis shows that the way security and trust are implemented in today's healthcare cannot guarantee information autonomy and trustfulness in pervasive health. Based on a framework model of pervasive health and risks analysis of ubiquitous information space, we have formulated principles which enable trusted information sharing in pervasive health. Principles imply that the data subject should have the right to dynamically verify trust and to control the use of her health information, as well as the right to set situation based context-aware personal policies. Data collectors and processors have responsibilities including transparency of information processing, and openness of interests, policies and environmental features. Our principles create a base for successful management of privacy and information autonomy in pervasive health. They also imply that it is necessary to create new data models for personal health information and new architectures which support situation depending trust and privacy management.

  3. 77 FR 27078 - Certain Electronic Devices, Including Mobile Phones and Tablet Computers, and Components Thereof...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-08

    ... Phones and Tablet Computers, and Components Thereof; Notice of Receipt of Complaint; Solicitation of... entitled Certain Electronic Devices, Including Mobile Phones and Tablet Computers, and Components Thereof... the United States after importation of certain electronic devices, including mobile phones and tablet...

  4. Computation offloading for real-time health-monitoring devices.

    PubMed

    Kalantarian, Haik; Sideris, Costas; Tuan Le; Hosseini, Anahita; Sarrafzadeh, Majid

    2016-08-01

    Among the major challenges in the development of real-time wearable health monitoring systems is to optimize battery life. One of the major techniques with which this objective can be achieved is computation offloading, in which portions of computation can be partitioned between the device and other resources such as a server or cloud. In this paper, we describe a novel dynamic computation offloading scheme for real-time wearable health monitoring devices that adjusts the partitioning of data between the wearable device and mobile application as a function of desired classification accuracy.

  5. Test Review: Siegel, B. (2004). "Pervasive Developmental Disorder Screening Test--II (PDDST-II)." San Antonio, TX: Harcourt

    ERIC Educational Resources Information Center

    Montgomery, Janine M.; Duncan, C. Randy; Francis, Garnett C.

    2007-01-01

    The "Pervasive Developmental Disorder Screening Test-II (PDDST-II)--Early Childhood Screener for Autistic Spectrum Disorders" is a clinical screening tool for pervasive developmental disorders (PDD) or autism spectrum disorders (ASD) designed for use by nonspecialist clinicians. It was designed to differentiate children as young as 18 months who…

  6. A distributed air index based on maximum boundary rectangle over grid-cells for wireless non-flat spatial data broadcast.

    PubMed

    Im, Seokjin; Choi, JinTak

    2014-06-17

    In the pervasive computing environment using smart devices equipped with various sensors, a wireless data broadcasting system for spatial data items is a natural way to efficiently provide a location dependent information service, regardless of the number of clients. A non-flat wireless broadcast system can support the clients in accessing quickly their preferred data items by disseminating the preferred data items more frequently than regular data on the wireless channel. To efficiently support the processing of spatial window queries in a non-flat wireless data broadcasting system, we propose a distributed air index based on a maximum boundary rectangle (MaxBR) over grid-cells (abbreviated DAIM), which uses MaxBRs for filtering out hot data items on the wireless channel. Unlike the existing index that repeats regular data items in close proximity to hot items at same frequency as hot data items in a broadcast cycle, DAIM makes it possible to repeat only hot data items in a cycle and reduces the length of the broadcast cycle. Consequently, DAIM helps the clients access the desired items quickly, improves the access time, and reduces energy consumption. In addition, a MaxBR helps the clients decide whether they have to access regular data items or not. Simulation studies show the proposed DAIM outperforms existing schemes with respect to the access time and energy consumption.

  7. Classifying obstructive sleep apnea using smartphones.

    PubMed

    Al-Mardini, Mamoun; Aloul, Fadi; Sagahyroon, Assim; Al-Husseini, Luai

    2014-12-01

    Obstructive sleep apnea (OSA) is a serious sleep disorder which is characterized by frequent obstruction of the upper airway, often resulting in oxygen desaturation. The serious negative impact of OSA on human health makes monitoring and diagnosing it a necessity. Currently, polysomnography is considered the gold standard for diagnosing OSA, which requires an expensive attended overnight stay at a hospital with considerable wiring between the human body and the system. In this paper, we implement a reliable, comfortable, inexpensive, and easily available portable device that allows users to apply the OSA test at home without the need for attended overnight tests. The design takes advantage of a smatrphone's built-in sensors, pervasiveness, computational capabilities, and user-friendly interface to screen OSA. We use three main sensors to extract physiological signals from patients which are (1) an oximeter to measure the oxygen level, (2) a microphone to record the respiratory effort, and (3) an accelerometer to detect the body's movement. Finally, we examine our system's ability to screen the disease as compared to the gold standard by testing it on 15 samples. The results showed that 100% of patients were correctly identified as having the disease, and 85.7% of patients were correctly identified as not having the disease. These preliminary results demonstrate the effectiveness of the developed system when compared to the gold standard and emphasize the important role of smartphones in healthcare. Copyright © 2014 Elsevier Inc. All rights reserved.

  8. Physarum machines: encapsulating reaction-diffusion to compute spanning tree

    NASA Astrophysics Data System (ADS)

    Adamatzky, Andrew

    2007-12-01

    The Physarum machine is a biological computing device, which employs plasmodium of Physarum polycephalum as an unconventional computing substrate. A reaction-diffusion computer is a chemical computing device that computes by propagating diffusive or excitation wave fronts. Reaction-diffusion computers, despite being computationally universal machines, are unable to construct certain classes of proximity graphs without the assistance of an external computing device. I demonstrate that the problem can be solved if the reaction-diffusion system is enclosed in a membrane with few ‘growth points’, sites guiding the pattern propagation. Experimental approximation of spanning trees by P. polycephalum slime mold demonstrates the feasibility of the approach. Findings provided advance theory of reaction-diffusion computation by enriching it with ideas of slime mold computation.

  9. 75 FR 68619 - In the Matter of Certain Wireless Communication Devices, Portable Music and Data Processing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-08

    ... Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Notice of... within the United States after importation of certain wireless communication devices, portable music and... music and data processing devices, computers and components thereof that infringe one or more of claim...

  10. REVIEW: Widespread access to predictive models in the motor system: a short review

    NASA Astrophysics Data System (ADS)

    Davidson, Paul R.; Wolpert, Daniel M.

    2005-09-01

    Recent behavioural and computational studies suggest that access to internal predictive models of arm and object dynamics is widespread in the sensorimotor system. Several systems, including those responsible for oculomotor and skeletomotor control, perceptual processing, postural control and mental imagery, are able to access predictions of the motion of the arm. A capacity to make and use predictions of object dynamics is similarly widespread. Here, we review recent studies looking at the predictive capacity of the central nervous system which reveal pervasive access to forward models of the environment.

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Oberkampf, William Louis; Tucker, W. Troy; Zhang, Jianzhong

    This report summarizes methods to incorporate information (or lack of information) about inter-variable dependence into risk assessments that use Dempster-Shafer theory or probability bounds analysis to address epistemic and aleatory uncertainty. The report reviews techniques for simulating correlated variates for a given correlation measure and dependence model, computation of bounds on distribution functions under a specified dependence model, formulation of parametric and empirical dependence models, and bounding approaches that can be used when information about the intervariable dependence is incomplete. The report also reviews several of the most pervasive and dangerous myths among risk analysts about dependence in probabilistic models.

  12. A powered vascular staple for the application of segmental bronchial closure in thoracoscopic anatomic segmentectomy.

    PubMed

    Kuroda, Hiroaki; Yoshida, Tatsuya; Sakao, Yukinori

    2017-12-01

    We used the powered vascular staple (PVS) instead of the conventional staple technique [the utilization of the powered linier cutter (PLC)] or ligation for total 23 segmental or subsegmental bronchi with less than 10 mm in the bronchial luminal size on computed tomography (CT) in thoracoscopic segmentectomy. Our results suggested that the availability of the PVS represents a novel advance in the armamentarium and may have a possibility of being pervasive widely however, more observative periods and further sample accumulation are needed.

  13. No Pervasive Computing Without Intelligent Systems

    NASA Astrophysics Data System (ADS)

    Thompson, S. G.; Azvine, B.

    It is interesting to think about the technologies that have become part of our everyday lives and compare their invention and development with those that have fallen by the wayside. Examples of failed technologies such as electrical cars and satellite mobile telephones are not uncommon, but more interestingly numerous other technologies such as instant messaging, text messaging, and b2c eCommerce have moved through the cycle of initial rejection, adoptionby a new user community, and adaptation to its needs, despite the early scepticism of many users and commentators.

  14. Intrinsic neuromodulation: altering neuronal circuits from within.

    PubMed

    Katz, P S; Frost, W N

    1996-02-01

    There are two sources of neuromodulation for neuronal circuits: extrinsic inputs and intrinsic components of the circuits themselves. Extrinsic neuromodulation is known to be pervasive in nervous systems, but intrinsic neuromodulation is less recognized, despite the fact that it has now been demonstrated in sensory and neuromuscular circuits and in central pattern generators. By its nature, intrinsic neuromodulation produces local changes in neuronal computation, whereas extrinsic neuromodulation can cause global changes, often affecting many circuits simultaneously. Studies in a number of systems are defining the different properties of these two forms of neuromodulation.

  15. Vehicle Lightweighting: Challenges and Opportunities with Aluminum

    NASA Astrophysics Data System (ADS)

    Sachdev, Anil K.; Mishra, Raja K.; Mahato, Anirban; Alpas, Ahmet

    Rising energy costs, consumer preferences and regulations drive requirements for fuel economy, performance, comfort, safety and cost of future automobiles. These conflicting situations offer challenges for vehicle lightweighting, for which aluminum applications are key. This paper describes product design needs and materials and process development opportunities driven by theoretical, experimental and modeling tools in the area of sheet and castings. Computational tools and novel experimental techniques used in their development are described. The paper concludes with challenges that lie ahead for pervasive use of aluminum and the necessary fundamental R&D that is still needed.

  16. Forecasting Occurrences of Activities.

    PubMed

    Minor, Bryan; Cook, Diane J

    2017-07-01

    While activity recognition has been shown to be valuable for pervasive computing applications, less work has focused on techniques for forecasting the future occurrence of activities. We present an activity forecasting method to predict the time that will elapse until a target activity occurs. This method generates an activity forecast using a regression tree classifier and offers an advantage over sequence prediction methods in that it can predict expected time until an activity occurs. We evaluate this algorithm on real-world smart home datasets and provide evidence that our proposed approach is most effective at predicting activity timings.

  17. Algebraic properties of automata associated to Petri nets and applications to computation in biological systems.

    PubMed

    Egri-Nagy, Attila; Nehaniv, Chrystopher L

    2008-01-01

    Biochemical and genetic regulatory networks are often modeled by Petri nets. We study the algebraic structure of the computations carried out by Petri nets from the viewpoint of algebraic automata theory. Petri nets comprise a formalized graphical modeling language, often used to describe computation occurring within biochemical and genetic regulatory networks, but the semantics may be interpreted in different ways in the realm of automata. Therefore, there are several different ways to turn a Petri net into a state-transition automaton. Here, we systematically investigate different conversion methods and describe cases where they may yield radically different algebraic structures. We focus on the existence of group components of the corresponding transformation semigroups, as these reflect symmetries of the computation occurring within the biological system under study. Results are illustrated by applications to the Petri net modelling of intermediary metabolism. Petri nets with inhibition are shown to be computationally rich, regardless of the particular interpretation method. Along these lines we provide a mathematical argument suggesting a reason for the apparent all-pervasiveness of inhibitory connections in living systems.

  18. Processing Device for High-Speed Execution of an Xrisc Computer Program

    NASA Technical Reports Server (NTRS)

    Ng, Tak-Kwong (Inventor); Mills, Carl S. (Inventor)

    2016-01-01

    A processing device for high-speed execution of a computer program is provided. A memory module may store one or more computer programs. A sequencer may select one of the computer programs and controls execution of the selected program. A register module may store intermediate values associated with a current calculation set, a set of output values associated with a previous calculation set, and a set of input values associated with a subsequent calculation set. An external interface may receive the set of input values from a computing device and provides the set of output values to the computing device. A computation interface may provide a set of operands for computation during processing of the current calculation set. The set of input values are loaded into the register and the set of output values are unloaded from the register in parallel with processing of the current calculation set.

  19. Multi-input and binary reproducible, high bandwidth floating point adder in a collective network

    DOEpatents

    Chen, Dong; Eisley, Noel A.; Heidelberger, Philip; Steinmacher-Burow, Burkhard

    2016-11-15

    To add floating point numbers in a parallel computing system, a collective logic device receives the floating point numbers from computing nodes. The collective logic devices converts the floating point numbers to integer numbers. The collective logic device adds the integer numbers and generating a summation of the integer numbers. The collective logic device converts the summation to a floating point number. The collective logic device performs the receiving, the converting the floating point numbers, the adding, the generating and the converting the summation in one pass. One pass indicates that the computing nodes send inputs only once to the collective logic device and receive outputs only once from the collective logic device.

  20. A Learning Outcome-Oriented Approach towards Classifying Pervasive Games for Learning Using Game Design Patterns and Contextual Information

    ERIC Educational Resources Information Center

    Schmitz, Birgit; Klemke, Roland; Specht, Marcus

    2013-01-01

    Mobile and in particular pervasive games are a strong component of future scenarios for teaching and learning. Based on results from a previous review of practical papers, this work explores the educational potential of pervasive games for learning by analysing underlying game mechanisms. In order to determine and classify cognitive and affective…

  1. A Formalisation of Adaptable Pervasive Flows

    NASA Astrophysics Data System (ADS)

    Bucchiarone, Antonio; Lafuente, Alberto Lluch; Marconi, Annapaola; Pistore, Marco

    Adaptable Pervasive Flows is a novel workflow-based paradigm for the design and execution of pervasive applications, where dynamic workflows situated in the real world are able to modify their execution in order to adapt to changes in their environment. In this paper, we study a formalisation of such flows by means of a formal flow language. More precisely, we define APFoL (Adaptable Pervasive Flow Language) and formalise its textual notation by encoding it in Blite, a formalisation of WS-BPEL. The encoding in Blite equips the language with a formal semantics and enables the use of automated verification techniques. We illustrate the approach with an example of a Warehouse Case Study.

  2. Creation and use of a survey instrument for comparing mobile computing devices.

    PubMed

    Macri, Jennifer M; Lee, Paul P; Silvey, Garry M; Lobach, David F

    2005-01-01

    Both personal digital assistants (PDAs) and tablet computers have emerged to facilitate data collection at the point of care. However, little research has been reported comparing these mobile computing devices in specific care settings. In this study we present an approach for comparing functionally identical applications on a Palm operating system-based PDA and a Windows-based tablet computer for point-of-care documentation of clinical observations by eye care professionals when caring for patients with diabetes. Eye-care professionals compared the devices through focus group sessions and through validated usability surveys. This poster describes the development and use of the survey instrument used for comparing mobile computing devices.

  3. Computational Hemodynamics Involving Artificial Devices

    NASA Technical Reports Server (NTRS)

    Kwak, Dochan; Kiris, Cetin; Feiereisen, William (Technical Monitor)

    2001-01-01

    This paper reports the progress being made towards developing complete blood flow simulation capability in human, especially, in the presence of artificial devices such as valves and ventricular assist devices. Devices modeling poses unique challenges different from computing the blood flow in natural hearts and arteries. There are many elements needed such as flow solvers, geometry modeling including flexible walls, moving boundary procedures and physiological characterization of blood. As a first step, computational technology developed for aerospace applications was extended in the recent past to the analysis and development of mechanical devices. The blood flow in these devices is practically incompressible and Newtonian, and thus various incompressible Navier-Stokes solution procedures can be selected depending on the choice of formulations, variables and numerical schemes. Two primitive variable formulations used are discussed as well as the overset grid approach to handle complex moving geometry. This procedure has been applied to several artificial devices. Among these, recent progress made in developing DeBakey axial flow blood pump will be presented from computational point of view. Computational and clinical issues will be discussed in detail as well as additional work needed.

  4. Boolean and brain-inspired computing using spin-transfer torque devices

    NASA Astrophysics Data System (ADS)

    Fan, Deliang

    Several completely new approaches (such as spintronic, carbon nanotube, graphene, TFETs, etc.) to information processing and data storage technologies are emerging to address the time frame beyond current Complementary Metal-Oxide-Semiconductor (CMOS) roadmap. The high speed magnetization switching of a nano-magnet due to current induced spin-transfer torque (STT) have been demonstrated in recent experiments. Such STT devices can be explored in compact, low power memory and logic design. In order to truly leverage STT devices based computing, researchers require a re-think of circuit, architecture, and computing model, since the STT devices are unlikely to be drop-in replacements for CMOS. The potential of STT devices based computing will be best realized by considering new computing models that are inherently suited to the characteristics of STT devices, and new applications that are enabled by their unique capabilities, thereby attaining performance that CMOS cannot achieve. The goal of this research is to conduct synergistic exploration in architecture, circuit and device levels for Boolean and brain-inspired computing using nanoscale STT devices. Specifically, we first show that the non-volatile STT devices can be used in designing configurable Boolean logic blocks. We propose a spin-memristor threshold logic (SMTL) gate design, where memristive cross-bar array is used to perform current mode summation of binary inputs and the low power current mode spintronic threshold device carries out the energy efficient threshold operation. Next, for brain-inspired computing, we have exploited different spin-transfer torque device structures that can implement the hard-limiting and soft-limiting artificial neuron transfer functions respectively. We apply such STT based neuron (or 'spin-neuron') in various neural network architectures, such as hierarchical temporal memory and feed-forward neural network, for performing "human-like" cognitive computing, which show more than two orders of lower energy consumption compared to state of the art CMOS implementation. Finally, we show the dynamics of injection locked Spin Hall Effect Spin-Torque Oscillator (SHE-STO) cluster can be exploited as a robust multi-dimensional distance metric for associative computing, image/ video analysis, etc. Our simulation results show that the proposed system architecture with injection locked SHE-STOs and the associated CMOS interface circuits can be suitable for robust and energy efficient associative computing and pattern matching.

  5. Pervasive Transcription of a Herpesvirus Genome Generates Functionally Important RNAs

    PubMed Central

    Canny, Susan P.; Reese, Tiffany A.; Johnson, L. Steven; Zhang, Xin; Kambal, Amal; Duan, Erning; Liu, Catherine Y.; Virgin, Herbert W.

    2014-01-01

    ABSTRACT Pervasive transcription is observed in a wide range of organisms, including humans, mice, and viruses, but the functional significance of the resulting transcripts remains uncertain. Current genetic approaches are often limited by their emphasis on protein-coding open reading frames (ORFs). We previously identified extensive pervasive transcription from the murine gammaherpesvirus 68 (MHV68) genome outside known ORFs and antisense to known genes (termed expressed genomic regions [EGRs]). Similar antisense transcripts have been identified in many other herpesviruses, including Kaposi’s sarcoma-associated herpesvirus and human and murine cytomegalovirus. Despite their prevalence, whether these RNAs have any functional importance in the viral life cycle is unknown, and one interpretation is that these are merely “noise” generated by functionally unimportant transcriptional events. To determine whether pervasive transcription of a herpesvirus genome generates RNA molecules that are functionally important, we used a strand-specific functional approach to target transcripts from thirteen EGRs in MHV68. We found that targeting transcripts from six EGRs reduced viral protein expression, proving that pervasive transcription can generate functionally important RNAs. We characterized transcripts emanating from EGRs 26 and 27 in detail using several methods, including RNA sequencing, and identified several novel polyadenylated transcripts that were enriched in the nuclei of infected cells. These data provide the first evidence of the functional importance of regions of pervasive transcription emanating from MHV68 EGRs. Therefore, studies utilizing mutation of a herpesvirus genome must account for possible effects on RNAs generated by pervasive transcription. PMID:24618256

  6. 77 FR 28621 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-15

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Notice of Request for Statements on the Public Interest AGENCY: U.S. International Trade Commission. ACTION: Notice...

  7. 77 FR 65580 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-29

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-856] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers, and Components Thereof AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY: Notice is hereby given that the U.S. International...

  8. MEMS sensor technologies for human centred applications in healthcare, physical activities, safety and environmental sensing: a review on research activities in Italy.

    PubMed

    Ciuti, Gastone; Ricotti, Leonardo; Menciassi, Arianna; Dario, Paolo

    2015-03-17

    Over the past few decades the increased level of public awareness concerning healthcare, physical activities, safety and environmental sensing has created an emerging need for smart sensor technologies and monitoring devices able to sense, classify, and provide feedbacks to users' health status and physical activities, as well as to evaluate environmental and safety conditions in a pervasive, accurate and reliable fashion. Monitoring and precisely quantifying users' physical activity with inertial measurement unit-based devices, for instance, has also proven to be important in health management of patients affected by chronic diseases, e.g., Parkinson's disease, many of which are becoming highly prevalent in Italy and in the Western world. This review paper will focus on MEMS sensor technologies developed in Italy in the last three years describing research achievements for healthcare and physical activity, safety and environmental sensing, in addition to smart systems integration. Innovative and smart integrated solutions for sensing devices, pursued and implemented in Italian research centres, will be highlighted, together with specific applications of such technologies. Finally, the paper will depict the future perspective of sensor technologies and corresponding exploitation opportunities, again with a specific focus on Italy.

  9. Oxide nanostructures through self-assembly

    NASA Astrophysics Data System (ADS)

    Aggarwal, S.; Ogale, S. B.; Ganpule, C. S.; Shinde, S. R.; Novikov, V. A.; Monga, A. P.; Burr, M. R.; Ramesh, R.; Ballarotto, V.; Williams, E. D.

    2001-03-01

    A prominent theme in inorganic materials research is the creation of uniformly flat thin films and heterostructures over large wafers, which can subsequently be lithographically processed into functional devices. This letter proposes an approach that will lead to thin film topographies that are directly counter to the above-mentioned philosophy. Recent years have witnessed considerable research activity in the area of self-assembly of materials, stimulated by observations of self-organized behavior in biological systems. We have fabricated uniform arrays of nonplanar surface features by a spontaneous assembly process involving the oxidation of simple metals, especially under constrained conditions on a variety of substrates, including glass and Si. In this letter we demonstrate the pervasiveness of this process through examples involving the oxidation of Pd, Cu, Fe, and In. The feature sizes can be controlled through the grain size and thickness of the starting metal thin film. Finally, we demonstrate how such submicron scale arrays can serve as templates for the design and development of self-assembled, nanoelectronic devices.

  10. Smart TV-Smartphone Multiscreen Interactive Middleware for Public Displays.

    PubMed

    Martinez-Pabon, Francisco; Caicedo-Guerrero, Jaime; Ibarra-Samboni, Jhon Jairo; Ramirez-Gonzalez, Gustavo; Hernández-Leo, Davinia

    2015-01-01

    A new generation of public displays demands high interactive and multiscreen features to enrich people's experience in new pervasive environments. Traditionally, research on public display interaction has involved mobile devices as the main characters during the use of personal area network technologies such as Bluetooth or NFC. However, the emergent Smart TV model arises as an interesting alternative for the implementation of a new generation of public displays. This is due to its intrinsic connection capabilities with surrounding devices like smartphones or tablets. Nonetheless, the different approaches proposed by the most important vendors are still underdeveloped to support multiscreen and interaction capabilities for modern public displays, because most of them are intended for domestic environments. This research proposes multiscreen interactive middleware for public displays, which was developed from the principles of a loosely coupled interaction model, simplicity, stability, concurrency, low latency, and the usage of open standards and technologies. Moreover, a validation prototype is proposed in one of the most interesting public display scenarios: the advertising.

  11. Photonics on the Mission to Mars

    NASA Technical Reports Server (NTRS)

    Watson, Michael D.

    2013-01-01

    Human missions to Mars present some unique challenges for photonics devices. These devices will have exposure to many different space environments. During assembly they will be exposed to the Earth orbiting environment. Upon departure they will need to function through the Earth's Van Allen Radiation Belt. While the general interplanetary environment is less challenging than the radiation belt, they will operate in this environment for 18 months, subject to sudden saturation from solar flares. These components must continue to function properly through these saturation events presenting quite a challenge to photonic components, both optical and electronic. At Mars, the orbital environment is more benign than the Earth's. Components used as part of the landing vehicles must also deal with the pervasive dust environment for 3 - 6 months. These assembly and mission execution environments provide every form of space environmental challenges to photonic components. This paper will briefly discuss each environment and the expectations on the components for successful operation over the life of the mission.

  12. Smart TV-Smartphone Multiscreen Interactive Middleware for Public Displays

    PubMed Central

    Martinez-Pabon, Francisco; Caicedo-Guerrero, Jaime; Ibarra-Samboni, Jhon Jairo; Ramirez-Gonzalez, Gustavo; Hernández-Leo, Davinia

    2015-01-01

    A new generation of public displays demands high interactive and multiscreen features to enrich people's experience in new pervasive environments. Traditionally, research on public display interaction has involved mobile devices as the main characters during the use of personal area network technologies such as Bluetooth or NFC. However, the emergent Smart TV model arises as an interesting alternative for the implementation of a new generation of public displays. This is due to its intrinsic connection capabilities with surrounding devices like smartphones or tablets. Nonetheless, the different approaches proposed by the most important vendors are still underdeveloped to support multiscreen and interaction capabilities for modern public displays, because most of them are intended for domestic environments. This research proposes multiscreen interactive middleware for public displays, which was developed from the principles of a loosely coupled interaction model, simplicity, stability, concurrency, low latency, and the usage of open standards and technologies. Moreover, a validation prototype is proposed in one of the most interesting public display scenarios: the advertising. PMID:25950018

  13. Pervasive influence of idiosyncratic associative biases during facial emotion recognition.

    PubMed

    El Zein, Marwa; Wyart, Valentin; Grèzes, Julie

    2018-06-11

    Facial morphology has been shown to influence perceptual judgments of emotion in a way that is shared across human observers. Here we demonstrate that these shared associations between facial morphology and emotion coexist with strong variations unique to each human observer. Interestingly, a large part of these idiosyncratic associations does not vary on short time scales, emerging from stable inter-individual differences in the way facial morphological features influence emotion recognition. Computational modelling of decision-making and neural recordings of electrical brain activity revealed that both shared and idiosyncratic face-emotion associations operate through a common biasing mechanism rather than an increased sensitivity to face-associated emotions. Together, these findings emphasize the underestimated influence of idiosyncrasies on core social judgments and identify their neuro-computational signatures.

  14. Pervasive Learning--Using Games to Tear down the Classroom Walls

    ERIC Educational Resources Information Center

    Pløhn, Trygve

    2014-01-01

    Pervasive gaming is a new and emerging gaming genre where the physical and social aspects of the real world are integrated into the game and blends into the player's everyday life. Given the nature of pervasive games, it may be possible to use that type of game as a tool to support learning in a university course by providing a gameplay where the…

  15. Multi-input and binary reproducible, high bandwidth floating point adder in a collective network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Dong; Eisley, Noel A; Heidelberger, Philip

    To add floating point numbers in a parallel computing system, a collective logic device receives the floating point numbers from computing nodes. The collective logic devices converts the floating point numbers to integer numbers. The collective logic device adds the integer numbers and generating a summation of the integer numbers. The collective logic device converts the summation to a floating point number. The collective logic device performs the receiving, the converting the floating point numbers, the adding, the generating and the converting the summation in one pass. One pass indicates that the computing nodes send inputs only once to themore » collective logic device and receive outputs only once from the collective logic device.« less

  16. Qualification and Approval of Personal Computer-Based Aviation Training Devices

    DOT National Transportation Integrated Search

    1997-05-12

    This Advisory Circular (AC) provides information and guidance to potential training device manufacturers and aviation training consumers concerning a means, acceptable to the Administrator, by which personal computer-based aviation training devices (...

  17. 75 FR 62565 - Notice of Receipt of Complaint; Solicitation of Comments Relating to the Public Interest

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-12

    ... Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and..., portable music and data processing devices, computers and components thereof. The complaint names as...

  18. Uncertain behaviours of integrated circuits improve computational performance.

    PubMed

    Yoshimura, Chihiro; Yamaoka, Masanao; Hayashi, Masato; Okuyama, Takuya; Aoki, Hidetaka; Kawarabayashi, Ken-ichi; Mizuno, Hiroyuki

    2015-11-20

    Improvements to the performance of conventional computers have mainly been achieved through semiconductor scaling; however, scaling is reaching its limitations. Natural phenomena, such as quantum superposition and stochastic resonance, have been introduced into new computing paradigms to improve performance beyond these limitations. Here, we explain that the uncertain behaviours of devices due to semiconductor scaling can improve the performance of computers. We prototyped an integrated circuit by performing a ground-state search of the Ising model. The bit errors of memory cell devices holding the current state of search occur probabilistically by inserting fluctuations into dynamic device characteristics, which will be actualised in the future to the chip. As a result, we observed more improvements in solution accuracy than that without fluctuations. Although the uncertain behaviours of devices had been intended to be eliminated in conventional devices, we demonstrate that uncertain behaviours has become the key to improving computational performance.

  19. Determining mode excitations of vacuum electronics devices via three-dimensional simulations using the SOS code

    NASA Technical Reports Server (NTRS)

    Warren, Gary

    1988-01-01

    The SOS code is used to compute the resonance modes (frequency-domain information) of sample devices and separately to compute the transient behavior of the same devices. A code, DOT, is created to compute appropriate dot products of the time-domain and frequency-domain results. The transient behavior of individual modes in the device is then plotted. Modes in a coupled-cavity traveling-wave tube (CCTWT) section excited beam in separate simulations are analyzed. Mode energy vs. time and mode phase vs. time are computed and it is determined whether the transient waves are forward or backward waves for each case. Finally, the hot-test mode frequencies of the CCTWT section are computed.

  20. Transformation in the pharmaceutical industry--a systematic analysis of operational evidence.

    PubMed

    Shafiei, Nader; Ford, James L; Morecroft, Charles W; Lisboa, Paulo J; Taylor, Mark J; Mouzughi, Yusra

    2013-01-01

    Through systematic collection and trending of pharmaceutical data, operational evidence to verify existence of 14 factors affecting the ongoing pharmaceutical transformation has been compiled. These 14 factors are termed transformation triggers. The theoretical evidence in support of these triggers is carried forward from a systematic review of the literature that was conducted previously. Trends in operational evidence and the associated theoretical evidence were compared to identify areas of similarity and contrast. Areas of strong correlation between theoretical evidence and operational evidence included four transformation triggers: a fully integrated pharma network, personalized medicine, translational research, and pervasive computing. Key areas of contrast included three transformation triggers-namely, healthcare management focus, adaptive trials, and regulatory enforcement-for which the operational evidence was stronger than the theoretical evidence. The intent of this paper is to provide proof to demonstrate if there is any operational evidence that supports the 14 transformation triggers previously identified during the theoretical part of this research. The theoretical evidence for these triggers was carried forward to this paper for study from an operational perspective. The practical evidence established in this paper was compared with the corresponding theoretical evidence to identify areas of similarity and difference. This resulted in four triggers that had strong relationship between operational and theoretical evidence; they are a fully integrated pharma network, personalized medicine, translational research, and pervasive computing. The areas of difference included three transformation triggers for which the operational evidence was stronger than the theoretical evidence. These were healthcare management focus, adaptive trials, and regulatory enforcement.

  1. Evidence of pervasive biologically functional secondary structures within the genomes of eukaryotic single-stranded DNA viruses.

    PubMed

    Muhire, Brejnev Muhizi; Golden, Michael; Murrell, Ben; Lefeuvre, Pierre; Lett, Jean-Michel; Gray, Alistair; Poon, Art Y F; Ngandu, Nobubelo Kwanele; Semegni, Yves; Tanov, Emil Pavlov; Monjane, Adérito Luis; Harkins, Gordon William; Varsani, Arvind; Shepherd, Dionne Natalie; Martin, Darren Patrick

    2014-02-01

    Single-stranded DNA (ssDNA) viruses have genomes that are potentially capable of forming complex secondary structures through Watson-Crick base pairing between their constituent nucleotides. A few of the structural elements formed by such base pairings are, in fact, known to have important functions during the replication of many ssDNA viruses. Unknown, however, are (i) whether numerous additional ssDNA virus genomic structural elements predicted to exist by computational DNA folding methods actually exist and (ii) whether those structures that do exist have any biological relevance. We therefore computationally inferred lists of the most evolutionarily conserved structures within a diverse selection of animal- and plant-infecting ssDNA viruses drawn from the families Circoviridae, Anelloviridae, Parvoviridae, Nanoviridae, and Geminiviridae and analyzed these for evidence of natural selection favoring the maintenance of these structures. While we find evidence that is consistent with purifying selection being stronger at nucleotide sites that are predicted to be base paired than at sites predicted to be unpaired, we also find strong associations between sites that are predicted to pair with one another and site pairs that are apparently coevolving in a complementary fashion. Collectively, these results indicate that natural selection actively preserves much of the pervasive secondary structure that is evident within eukaryote-infecting ssDNA virus genomes and, therefore, that much of this structure is biologically functional. Lastly, we provide examples of various highly conserved but completely uncharacterized structural elements that likely have important functions within some of the ssDNA virus genomes analyzed here.

  2. Evidence of Pervasive Biologically Functional Secondary Structures within the Genomes of Eukaryotic Single-Stranded DNA Viruses

    PubMed Central

    Muhire, Brejnev Muhizi; Golden, Michael; Murrell, Ben; Lefeuvre, Pierre; Lett, Jean-Michel; Gray, Alistair; Poon, Art Y. F.; Ngandu, Nobubelo Kwanele; Semegni, Yves; Tanov, Emil Pavlov; Monjane, Adérito Luis; Harkins, Gordon William; Varsani, Arvind; Shepherd, Dionne Natalie

    2014-01-01

    Single-stranded DNA (ssDNA) viruses have genomes that are potentially capable of forming complex secondary structures through Watson-Crick base pairing between their constituent nucleotides. A few of the structural elements formed by such base pairings are, in fact, known to have important functions during the replication of many ssDNA viruses. Unknown, however, are (i) whether numerous additional ssDNA virus genomic structural elements predicted to exist by computational DNA folding methods actually exist and (ii) whether those structures that do exist have any biological relevance. We therefore computationally inferred lists of the most evolutionarily conserved structures within a diverse selection of animal- and plant-infecting ssDNA viruses drawn from the families Circoviridae, Anelloviridae, Parvoviridae, Nanoviridae, and Geminiviridae and analyzed these for evidence of natural selection favoring the maintenance of these structures. While we find evidence that is consistent with purifying selection being stronger at nucleotide sites that are predicted to be base paired than at sites predicted to be unpaired, we also find strong associations between sites that are predicted to pair with one another and site pairs that are apparently coevolving in a complementary fashion. Collectively, these results indicate that natural selection actively preserves much of the pervasive secondary structure that is evident within eukaryote-infecting ssDNA virus genomes and, therefore, that much of this structure is biologically functional. Lastly, we provide examples of various highly conserved but completely uncharacterized structural elements that likely have important functions within some of the ssDNA virus genomes analyzed here. PMID:24284329

  3. Towards Pervasive Augmented Reality: Context-Awareness in Augmented Reality.

    PubMed

    Grubert, Jens; Langlotz, Tobias; Zollmann, Stefanie; Regenbrecht, Holger

    2017-06-01

    Augmented Reality is a technique that enables users to interact with their physical environment through the overlay of digital information. While being researched for decades, more recently, Augmented Reality moved out of the research labs and into the field. While most of the applications are used sporadically and for one particular task only, current and future scenarios will provide a continuous and multi-purpose user experience. Therefore, in this paper, we present the concept of Pervasive Augmented Reality, aiming to provide such an experience by sensing the user's current context and adapting the AR system based on the changing requirements and constraints. We present a taxonomy for Pervasive Augmented Reality and context-aware Augmented Reality, which classifies context sources and context targets relevant for implementing such a context-aware, continuous Augmented Reality experience. We further summarize existing approaches that contribute towards Pervasive Augmented Reality. Based our taxonomy and survey, we identify challenges for future research directions in Pervasive Augmented Reality.

  4. Brain-controlled body movement assistance devices and methods

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leuthardt, Eric C.; Love, Lonnie J.; Coker, Rob

    Methods, devices, systems, and apparatus, including computer programs encoded on a computer storage medium, for brain-controlled body movement assistance devices. In one aspect, a device includes a brain-controlled body movement assistance device with a brain-computer interface (BCI) component adapted to be mounted to a user, a body movement assistance component operably connected to the BCI component and adapted to be worn by the user, and a feedback mechanism provided in connection with at least one of the BCI component and the body movement assistance component, the feedback mechanism being configured to output information relating to a usage session of themore » brain-controlled body movement assistance device.« less

  5. An evaluation method of computer usability based on human-to-computer information transmission model.

    PubMed

    Ogawa, K

    1992-01-01

    This paper proposes a new evaluation and prediction method for computer usability. This method is based on our two previously proposed information transmission measures created from a human-to-computer information transmission model. The model has three information transmission levels: the device, software, and task content levels. Two measures, called the device independent information measure (DI) and the computer independent information measure (CI), defined on the software and task content levels respectively, are given as the amount of information transmitted. Two information transmission rates are defined as DI/T and CI/T, where T is the task completion time: the device independent information transmission rate (RDI), and the computer independent information transmission rate (RCI). The method utilizes the RDI and RCI rates to evaluate relatively the usability of software and device operations on different computer systems. Experiments using three different systems, in this case a graphical information input task, confirm that the method offers an efficient way of determining computer usability.

  6. Mobile Recommender Apps with Privacy Management for Accessible and Usable Technologies.

    PubMed

    Hersh, Marion; Leporini, Barbara

    2017-01-01

    The paper presents the preliminary results of an ongoing survey of the use of computers and mobile devices, interest in recommender apps and knowledge and concerns about privacy issues amongst English and Italian speaking disabled people. Participants were found to be regular users of computers and mobile devices for a range of applications. They were interested in recommender apps for household items, computer software and apps that met their accessibility and other requirements. They showed greater concerns about controlling access to personal data of different types than this data being retained by the computer or mobile device. They were also willing to make tradeoffs to improve device performance.

  7. Semiconductors: Still a Wide Open Frontier for Scientists/Engineers

    NASA Astrophysics Data System (ADS)

    Seiler, David G.

    1997-10-01

    A 1995 Business Week article described several features of the explosive use of semiconductor chips today: ``Booming'' personal computer markets are driving high demand for microprocessors and memory chips; (2) New information superhighway markets will `ignite' sales of multimedia and communication chips; and (3) Demand for digital-signal-processing and data-compression chips, which speed up video and graphics, is `red hot.' A Washington Post article by Stan Hinden said that technology is creating an unstoppable demand for electronic elements. This ``digital pervasiveness'' means that a semiconductor chip is going into almost every high-tech product that people buy - cars, televisions, video recorders, telephones, radios, alarm clocks, coffee pots, etc. ``Semiconductors are everywhere.'' Silicon and compound semiconductors are absolutely essential and are pervasive enablers for DoD operations and systems. DoD's Critical Technologies Plan of 1991 says that ``Semiconductor materials and microelectronics are critically important and appropriately lead the list of critical defense technologies.'' These trends continue unabated. This talk describes some of the frontiers of semiconductors today and shows how scientists and engineers can effectively contribute to its advancement. Cooperative, multidisciplinary efforts are increasing. Specific examples will be given for scanning capacitance microscopy and thin-film metrology.

  8. Converging, pervasive technologies: chronic and emerging issues and policy adequacy.

    PubMed

    Seelman, Katherine D

    2008-01-01

    This article is a thought piece with the expansive goal of identifying policy facilitators and barriers to the development of usable and accessible advanced information and communications technology for people with disabilities across the age span at the research and development and marketing stages. The working hypothesis is as follows: The lack of participation in and representation of the interests of people with disabilities in the technology resource system is a barrier to availability of affordable consumer goods that enable independence and community integration. Converging, pervasive computing technology, especially in housing applications, is used as a case example, drawing especially from research and development conducted by the National Science Foundation Quality of Life Technology Engineering Research Center. A critical theory approach is used to identify problems and seek solutions to the apparent lack of balance between the demand and needs of disabled users and the supply and availability of usable, affordable consumer goods produced by the technology resource system in which allocation decisions are made. The approach uses policy analysis tools such as a technology assessment framework; the participation and environment components of the World Health Organization's International Classification of Functioning, Disability and Health; and participatory action research.

  9. Wearable Therapy - Detecting Information from Wearables and Mobiles that are Relevant to Clinical and Self-directed Therapy.

    PubMed

    Arnrich, Bert; Ersoy, Cem; Mayora, Oscar; Dey, Anind; Berthouze, Nadia; Kunze, Kai

    2017-01-09

    This accompanying editorial provides a brief introduction into the focus theme "Wearable Therapy". The focus theme "Wearable Therapy" aims to present contributions which target wearable and mobile technologies to support clinical and self-directed therapy. A call for papers was announced to all participants of the "9th International Conference on Pervasive Computing Technologies for Healthcare" and was published in November 2015. A peer review process was conducted to select the papers for the focus theme. Six papers were selected to be included in this focus theme. The paper topics cover a broad range including an approach to build a health informatics research program, a comprehensive literature review of self-quantification for health self-management, methods for affective state detection of informal care givers, social-aware handling of falls, smart shoes for supporting self-directed therapy of alcohol addicts, and reference information model for pervasive health systems. More empirical evidence is needed that confirms sustainable effects of employing wearable and mobile technology for clinical and self-directed therapy. Inconsistencies between different conceptual approaches need to be revealed in order to enable more systematic investigations and comparisons.

  10. A Computer Spreadsheet for Locating Assistive Devices.

    ERIC Educational Resources Information Center

    Palmer, Catherine V.; Garstecki, Dean C.

    1988-01-01

    The article presents a directory of assistive devices for persons with hearing impairments in a grid format by distributor and type of device (alerting devices, telephone, TV/radio/stereo, personal communication, group communication, and other). The product locator is also available in spreadsheet form for either the Macintosh or IBM-PC computers.…

  11. Real-time interactive simulation: using touch panels, graphics tablets, and video-terminal keyboards

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Venhuizen, J.R.

    1983-01-01

    A Simulation Laboratory utilizing only digital computers for interactive computing must rely on CRT based graphics devices for output devices, and keyboards, graphics tablets, and touch panels, etc., for input devices. The devices all work well, with the combination of a CRT with a touch panel mounted on it as the most flexible combination of input/output devices for interactive simulation.

  12. Mobile computing device configured to compute irradiance, glint, and glare of the sun

    DOEpatents

    Gupta, Vipin P; Ho, Clifford K; Khalsa, Siri Sahib

    2014-03-11

    Described herein are technologies pertaining to computing the solar irradiance distribution on a surface of a receiver in a concentrating solar power system or glint/glare emitted from a reflective entity. A mobile computing device includes at least one camera that captures images of the Sun and the entity of interest, wherein the images have pluralities of pixels having respective pluralities of intensity values. Based upon the intensity values of the pixels in the respective images, the solar irradiance distribution on the surface of the entity or glint/glare corresponding to the entity is computed by the mobile computing device.

  13. Modems and More: The Computer Branches Out.

    ERIC Educational Resources Information Center

    Dyrli, Odvard Egil

    1986-01-01

    Surveys new "peripherals," electronic devices that attach to computers. Devices such as videodisc players, desktop laser printers, large screen projectors, and input mechanisms that circumvent the keyboard dramatically expand the computer's instructional uses. (Author/LHW)

  14. Network Information System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    1996-05-01

    The Network Information System (NWIS) was initially implemented in May 1996 as a system in which computing devices could be recorded so that unique names could be generated for each device. Since then the system has grown to be an enterprise wide information system which is integrated with other systems to provide the seamless flow of data through the enterprise. The system Iracks data for two main entities: people and computing devices. The following are the type of functions performed by NWIS for these two entities: People Provides source information to the enterprise person data repository for select contractors andmore » visitors Generates and tracks unique usernames and Unix user IDs for every individual granted cyber access Tracks accounts for centrally managed computing resources, and monitors and controls the reauthorization of the accounts in accordance with the DOE mandated interval Computing Devices Generates unique names for all computing devices registered in the system Tracks the following information for each computing device: manufacturer, make, model, Sandia property number, vendor serial number, operating system and operating system version, owner, device location, amount of memory, amount of disk space, and level of support provided for the machine Tracks the hardware address for network cards Tracks the P address registered to computing devices along with the canonical and alias names for each address Updates the Dynamic Domain Name Service (DDNS) for canonical and alias names Creates the configuration files for DHCP to control the DHCP ranges and allow access to only properly registered computers Tracks and monitors classified security plans for stand-alone computers Tracks the configuration requirements used to setup the machine Tracks the roles people have on machines (system administrator, administrative access, user, etc...) Allows systems administrators to track changes made on the machine (both hardware and software) Generates an adjustment history of changes on selected fields« less

  15. Analysis of Polarizing Optical Systems for Digital Optical Computing with Symmetric Self Electrooptic Devices

    DTIC Science & Technology

    1991-03-31

    I AD-A232 768 I Annual Report Analysis of Polarizing Optical Systems for Digital Optical Computing with I ’ Symmetric Self Electrooptic Devices I To...TTU AND SuSiIU S. PUNDIN mUMBERS Polarizing Optical Systems for Digital Optical Computing with Symmetric Self Electrooptic Devices AFOSR-89-0542 C...UTION COO$ UNLIMITED 13. ABSTRACT (MAxnum00woUw Two architectural approaches have dominated the field of optical computing . The first appAch uses

  16. System Control Applications of Low-Power Radio Frequency Devices

    NASA Astrophysics Data System (ADS)

    van Rensburg, Roger

    2017-09-01

    This paper conceptualizes a low-power wireless sensor network design for application employment to reduce theft of portable computer devices used in educational institutions today. The aim of this study is to design and develop a reliable and robust wireless network that can eradicate accessibility of a device’s human interface. An embedded system supplied by an energy harvesting source, installed on the portable computer device, may represent one of multiple slave nodes which request regular updates from a standalone master station. A portable computer device which is operated in an undesignated area or in a field perimeter where master to slave communication is restricted, indicating a possible theft scenario, will initiate a shutdown of its operating system and render the device unusable. Consequently, an algorithm in the device firmware may ensure the necessary steps are executed to track the device, irrespective whether the device is enabled. Design outcomes thus far indicate that a wireless network using low-power embedded hardware, is feasible for anti-theft applications. By incorporating one of the latest Bluetooth low-energy, ANT+, ZigBee or Thread wireless technologies, an anti-theft system may be implemented that has the potential to reduce major portable computer device theft in institutions of digitized learning.

  17. The effects of perceived USB-delay for sensor and embedded system development.

    PubMed

    Du, J; Kade, D; Gerdtman, C; Ozcan, O; Linden, M

    2016-08-01

    Perceiving delay in computer input devices is a problem which gets even more eminent when being used in healthcare applications and/or in small, embedded systems. Therefore, the amount of delay found as acceptable when using computer input devices was investigated in this paper. A device was developed to perform a benchmark test for the perception of delay. The delay can be set from 0 to 999 milliseconds (ms) between a receiving computer and an available USB-device. The USB-device can be a mouse, a keyboard or some other type of USB-connected input device. Feedback from performed user tests with 36 people form the basis for the determination of time limitations for the USB data processing in microprocessors and embedded systems without users' noticing the delay. For this paper, tests were performed with a personal computer and a common computer mouse, testing the perception of delays between 0 and 500 ms. The results of our user tests show that perceived delays up to 150 ms were acceptable and delays larger than 300 ms were not acceptable at all.

  18. Perspective: Stochastic magnetic devices for cognitive computing

    NASA Astrophysics Data System (ADS)

    Roy, Kaushik; Sengupta, Abhronil; Shim, Yong

    2018-06-01

    Stochastic switching of nanomagnets can potentially enable probabilistic cognitive hardware consisting of noisy neural and synaptic components. Furthermore, computational paradigms inspired from the Ising computing model require stochasticity for achieving near-optimality in solutions to various types of combinatorial optimization problems such as the Graph Coloring Problem or the Travelling Salesman Problem. Achieving optimal solutions in such problems are computationally exhaustive and requires natural annealing to arrive at the near-optimal solutions. Stochastic switching of devices also finds use in applications involving Deep Belief Networks and Bayesian Inference. In this article, we provide a multi-disciplinary perspective across the stack of devices, circuits, and algorithms to illustrate how the stochastic switching dynamics of spintronic devices in the presence of thermal noise can provide a direct mapping to the computational units of such probabilistic intelligent systems.

  19. On the performances of computer vision algorithms on mobile platforms

    NASA Astrophysics Data System (ADS)

    Battiato, S.; Farinella, G. M.; Messina, E.; Puglisi, G.; Ravì, D.; Capra, A.; Tomaselli, V.

    2012-01-01

    Computer Vision enables mobile devices to extract the meaning of the observed scene from the information acquired with the onboard sensor cameras. Nowadays, there is a growing interest in Computer Vision algorithms able to work on mobile platform (e.g., phone camera, point-and-shot-camera, etc.). Indeed, bringing Computer Vision capabilities on mobile devices open new opportunities in different application contexts. The implementation of vision algorithms on mobile devices is still a challenging task since these devices have poor image sensors and optics as well as limited processing power. In this paper we have considered different algorithms covering classic Computer Vision tasks: keypoint extraction, face detection, image segmentation. Several tests have been done to compare the performances of the involved mobile platforms: Nokia N900, LG Optimus One, Samsung Galaxy SII.

  20. Direct surgeon control of the computer in the operating room.

    PubMed

    Onceanu, Dumitru; Stewart, A James

    2011-01-01

    This paper describes the design and evaluation of a joystick-like device that allows direct surgeon control of the computer in the operating room. The device contains no electronic parts, is easy to use, is unobtrusive, has no physical connection to the computer, and makes use of an existing surgical tool. The device was tested in comparison to a mouse and to verbal dictation.

  1. University Students Use of Computers and Mobile Devices for Learning and Their Reading Speed on Different Platforms

    ERIC Educational Resources Information Center

    Mpofu, Bongeka

    2016-01-01

    This research was aimed at the investigation of mobile device and computer use at a higher learning institution. The goal was to determine the current use of computers and mobile devices for learning and the students' reading speed on different platforms. The research was contextualised in a sample of students at the University of South Africa.…

  2. 47 CFR 15.102 - CPU boards and power supplies used in personal computers.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... computers. 15.102 Section 15.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Unintentional Radiators § 15.102 CPU boards and power supplies used in personal computers. (a... modifications that must be made to a personal computer, peripheral device, CPU board or power supply during...

  3. 47 CFR 15.102 - CPU boards and power supplies used in personal computers.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... computers. 15.102 Section 15.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Unintentional Radiators § 15.102 CPU boards and power supplies used in personal computers. (a... modifications that must be made to a personal computer, peripheral device, CPU board or power supply during...

  4. 47 CFR 15.102 - CPU boards and power supplies used in personal computers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... computers. 15.102 Section 15.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Unintentional Radiators § 15.102 CPU boards and power supplies used in personal computers. (a... modifications that must be made to a personal computer, peripheral device, CPU board or power supply during...

  5. 47 CFR 15.102 - CPU boards and power supplies used in personal computers.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... computers. 15.102 Section 15.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Unintentional Radiators § 15.102 CPU boards and power supplies used in personal computers. (a... modifications that must be made to a personal computer, peripheral device, CPU board or power supply during...

  6. 47 CFR 15.102 - CPU boards and power supplies used in personal computers.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... computers. 15.102 Section 15.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Unintentional Radiators § 15.102 CPU boards and power supplies used in personal computers. (a... modifications that must be made to a personal computer, peripheral device, CPU board or power supply during...

  7. 78 FR 50445 - Certain Computers and Computer Peripheral Devices and Components Thereof and Products Containing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-19

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-841] Certain Computers and Computer Peripheral Devices and Components Thereof and Products Containing the Same Request for Statements on the Public Interest AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY: Notice is hereby...

  8. Using Digital Computer Field Mapping of Outcrops to Examine the Preservation of High-P Rocks During Pervasive, Retrograde Greenschist Fluid Infiltration, Tinos, Cyclades Archipelago, Greece

    NASA Astrophysics Data System (ADS)

    Breeding, C. M.; Ague, J. J.; Broecker, M.

    2001-12-01

    Digital field mapping of outcrops on the island of Tinos, Greece, was undertaken to investigate the nature of retrograde fluid infiltration during exhumation of high-P metamorphic rocks of the Attic-Cycladic blueschist belt. High-resolution digital photographs of outcrops were taken and loaded into graphics editing software on a portable, belt-mounted computer in the field. Geologic features from outcrops were drawn and labeled on the digital images using the software in real-time. The ability to simultaneously identify geologic features in outcrops and digitize those features onto digital photographs in the field allows the creation of detailed, field-verified, outcrop-scale maps that aid in geologic interpretation. During Cretaceous-Eocene subduction in the Cyclades, downgoing crustal material was metamorphosed to eclogite and blueschist facies. Subsequent Oligocene-Miocene exhumation of the high-P rocks was accompanied by pervasive, retrograde fluid infiltration resulting in nearly complete greenschist facies overprinting. On Tinos, most high-P rocks have undergone intense retrogression; however, adjacent to thick marble horizons with completely retrograded contact zones, small (sub km-scale) enclaves of high-P rocks (blueschist and minor eclogite facies) were preserved. Field observations suggest that the remnant high-P zones consist mostly of massive metabasic rocks and minor adjacent metasediments. Within the enclaves, detailed digital outcrop maps reveal that greenschist retrogression increases in intensity outward from the center, implying interaction with a fluid flowing along enclave perimeters. Permeability contrasts could not have been solely responsible for preservation of the high-P rocks, as similar rock suites distal to marble contacts were completely overprinted. We conclude that the retrograded contacts of the marble units served as high-permeability conduits for regional retrograde fluid flow. Pervasive, layer-parallel flow through metasediments would have been drawn into these more permeable flow channels. Deflections in fluid flow paths toward the high flux contacts likely caused retrograde fluids to flow around the enclaves, preserving the zones of "dry," unretrograded high-P rocks near marble horizons. Digital mapping of outcrops is a unique method for direct examination of the relationships between geologic structure, lithology, and mineral assemblage variation in the field. Outcrop mapping in the Attic-Cycladic blueschist belt has revealed that regional fluid flow along contacts can have important implications for the large-scale distribution of mineral assemblages in metamorphic terranes.

  9. 76 FR 22918 - In the Matter of Certain Handheld Electronic Computing Devices, Related Software, and Components...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-25

    ... Computing Devices, Related Software, and Components Thereof; Notice of Investigation AGENCY: U.S... devices, related software, and components thereof by reason of infringement of certain claims of U.S... devices, related software, and components thereof that infringe one or more of claims 1 and 5 of the '372...

  10. Portable control device for networked mobile robots

    DOEpatents

    Feddema, John T.; Byrne, Raymond H.; Bryan, Jon R.; Harrington, John J.; Gladwell, T. Scott

    2002-01-01

    A handheld control device provides a way for controlling one or multiple mobile robotic vehicles by incorporating a handheld computer with a radio board. The device and software use a personal data organizer as the handheld computer with an additional microprocessor and communication device on a radio board for use in controlling one robot or multiple networked robots.

  11. Remote media vision-based computer input device

    NASA Astrophysics Data System (ADS)

    Arabnia, Hamid R.; Chen, Ching-Yi

    1991-11-01

    In this paper, we introduce a vision-based computer input device which has been built at the University of Georgia. The user of this system gives commands to the computer without touching any physical device. The system receives input through a CCD camera; it is PC- based and is built on top of the DOS operating system. The major components of the input device are: a monitor, an image capturing board, a CCD camera, and some software (developed by use). These are interfaced with a standard PC running under the DOS operating system.

  12. Pervasive Sound Sensing: A Weakly Supervised Training Approach.

    PubMed

    Kelly, Daniel; Caulfield, Brian

    2016-01-01

    Modern smartphones present an ideal device for pervasive sensing of human behavior. Microphones have the potential to reveal key information about a person's behavior. However, they have been utilized to a significantly lesser extent than other smartphone sensors in the context of human behavior sensing. We postulate that, in order for microphones to be useful in behavior sensing applications, the analysis techniques must be flexible and allow easy modification of the types of sounds to be sensed. A simplification of the training data collection process could allow a more flexible sound classification framework. We hypothesize that detailed training, a prerequisite for the majority of sound sensing techniques, is not necessary and that a significantly less detailed and time consuming data collection process can be carried out, allowing even a nonexpert to conduct the collection, labeling, and training process. To test this hypothesis, we implement a diverse density-based multiple instance learning framework, to identify a target sound, and a bag trimming algorithm, which, using the target sound, automatically segments weakly labeled sound clips to construct an accurate training set. Experiments reveal that our hypothesis is a valid one and results show that classifiers, trained using the automatically segmented training sets, were able to accurately classify unseen sound samples with accuracies comparable to supervised classifiers, achieving an average F -measure of 0.969 and 0.87 for two weakly supervised datasets.

  13. Two-dimensional radiant energy array computers and computing devices

    NASA Technical Reports Server (NTRS)

    Schaefer, D. H.; Strong, J. P., III (Inventor)

    1976-01-01

    Two dimensional digital computers and computer devices operate in parallel on rectangular arrays of digital radiant energy optical signal elements which are arranged in ordered rows and columns. Logic gate devices receive two input arrays and provide an output array having digital states dependent only on the digital states of the signal elements of the two input arrays at corresponding row and column positions. The logic devices include an array of photoconductors responsive to at least one of the input arrays for either selectively accelerating electrons to a phosphor output surface, applying potentials to an electroluminescent output layer, exciting an array of discrete radiant energy sources, or exciting a liquid crystal to influence crystal transparency or reflectivity.

  14. RRAM-based parallel computing architecture using k-nearest neighbor classification for pattern recognition

    NASA Astrophysics Data System (ADS)

    Jiang, Yuning; Kang, Jinfeng; Wang, Xinan

    2017-03-01

    Resistive switching memory (RRAM) is considered as one of the most promising devices for parallel computing solutions that may overcome the von Neumann bottleneck of today’s electronic systems. However, the existing RRAM-based parallel computing architectures suffer from practical problems such as device variations and extra computing circuits. In this work, we propose a novel parallel computing architecture for pattern recognition by implementing k-nearest neighbor classification on metal-oxide RRAM crossbar arrays. Metal-oxide RRAM with gradual RESET behaviors is chosen as both the storage and computing components. The proposed architecture is tested by the MNIST database. High speed (~100 ns per example) and high recognition accuracy (97.05%) are obtained. The influence of several non-ideal device properties is also discussed, and it turns out that the proposed architecture shows great tolerance to device variations. This work paves a new way to achieve RRAM-based parallel computing hardware systems with high performance.

  15. Computing through Scientific Abstractions in SysBioPS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chin, George; Stephan, Eric G.; Gracio, Deborah K.

    2004-10-13

    Today, biologists and bioinformaticists have a tremendous amount of computational power at their disposal. With the availability of supercomputers, burgeoning scientific databases and digital libraries such as GenBank and PubMed, and pervasive computational environments such as the Grid, biologists have access to a wealth of computational capabilities and scientific data at hand. Yet, the rapid development of computational technologies has far exceeded the typical biologist’s ability to effectively apply the technology in their research. Computational sciences research and development efforts such as the Biology Workbench, BioSPICE (Biological Simulation Program for Intra-Cellular Evaluation), and BioCoRE (Biological Collaborative Research Environment) are importantmore » in connecting biologists and their scientific problems to computational infrastructures. On the Computational Cell Environment and Heuristic Entity-Relationship Building Environment projects at the Pacific Northwest National Laboratory, we are jointly developing a new breed of scientific problem solving environment called SysBioPSE that will allow biologists to access and apply computational resources in the scientific research context. In contrast to other computational science environments, SysBioPSE operates as an abstraction layer above a computational infrastructure. The goal of SysBioPSE is to allow biologists to apply computational resources in the context of the scientific problems they are addressing and the scientific perspectives from which they conduct their research. More specifically, SysBioPSE allows biologists to capture and represent scientific concepts and theories and experimental processes, and to link these views to scientific applications, data repositories, and computer systems.« less

  16. Enhancing battery efficiency for pervasive health-monitoring systems based on electronic textiles.

    PubMed

    Zheng, Nenggan; Wu, Zhaohui; Lin, Man; Yang, Laurence Tianruo

    2010-03-01

    Electronic textiles are regarded as one of the most important computation platforms for future computer-assisted health-monitoring applications. In these novel systems, multiple batteries are used in order to prolong their operational lifetime, which is a significant metric for system usability. However, due to the nonlinear features of batteries, computing systems with multiple batteries cannot achieve the same battery efficiency as those powered by a monolithic battery of equal capacity. In this paper, we propose an algorithm aiming to maximize battery efficiency globally for the computer-assisted health-care systems with multiple batteries. Based on an accurate analytical battery model, the concept of weighted battery fatigue degree is introduced and the novel battery-scheduling algorithm called predicted weighted fatigue degree least first (PWFDLF) is developed. Besides, we also discuss our attempts during search PWFDLF: a weighted round-robin (WRR) and a greedy algorithm achieving highest local battery efficiency, which reduces to the sequential discharging policy. Evaluation results show that a considerable improvement in battery efficiency can be obtained by PWFDLF under various battery configurations and current profiles compared to conventional sequential and WRR discharging policies.

  17. Data compression for sequencing data

    PubMed Central

    2013-01-01

    Post-Sanger sequencing methods produce tons of data, and there is a general agreement that the challenge to store and process them must be addressed with data compression. In this review we first answer the question “why compression” in a quantitative manner. Then we also answer the questions “what” and “how”, by sketching the fundamental compression ideas, describing the main sequencing data types and formats, and comparing the specialized compression algorithms and tools. Finally, we go back to the question “why compression” and give other, perhaps surprising answers, demonstrating the pervasiveness of data compression techniques in computational biology. PMID:24252160

  18. One-to-One Computing in Public Schools: Lessons from "Laptops for All" Programs

    ERIC Educational Resources Information Center

    Abell Foundation, 2008

    2008-01-01

    The basic tenet of one-to-one computing is that the student and teacher have Internet-connected, wireless computing devices in the classroom and optimally at home as well. Also known as "ubiquitous computing," this strategy assumes that every teacher and student has her own computing device and obviates the need for moving classes to…

  19. Embedded systems for supporting computer accessibility.

    PubMed

    Mulfari, Davide; Celesti, Antonio; Fazio, Maria; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Nowadays, customized AT software solutions allow their users to interact with various kinds of computer systems. Such tools are generally available on personal devices (e.g., smartphones, laptops and so on) commonly used by a person with a disability. In this paper, we investigate a way of using the aforementioned AT equipments in order to access many different devices without assistive preferences. The solution takes advantage of open source hardware and its core component consists of an affordable Linux embedded system: it grabs data coming from the assistive software, which runs on the user's personal device, then, after processing, it generates native keyboard and mouse HID commands for the target computing device controlled by the end user. This process supports any operating system available on the target machine and it requires no specialized software installation; therefore the user with a disability can rely on a single assistive tool to control a wide range of computing platforms, including conventional computers and many kinds of mobile devices, which receive input commands through the USB HID protocol.

  20. A cloud computing based 12-lead ECG telemedicine service

    PubMed Central

    2012-01-01

    Background Due to the great variability of 12-lead ECG instruments and medical specialists’ interpretation skills, it remains a challenge to deliver rapid and accurate 12-lead ECG reports with senior cardiologists’ decision making support in emergency telecardiology. Methods We create a new cloud and pervasive computing based 12-lead Electrocardiography (ECG) service to realize ubiquitous 12-lead ECG tele-diagnosis. Results This developed service enables ECG to be transmitted and interpreted via mobile phones. That is, tele-consultation can take place while the patient is on the ambulance, between the onsite clinicians and the off-site senior cardiologists, or among hospitals. Most importantly, this developed service is convenient, efficient, and inexpensive. Conclusions This cloud computing based ECG tele-consultation service expands the traditional 12-lead ECG applications onto the collaboration of clinicians at different locations or among hospitals. In short, this service can greatly improve medical service quality and efficiency, especially for patients in rural areas. This service has been evaluated and proved to be useful by cardiologists in Taiwan. PMID:22838382

  1. A cloud computing based 12-lead ECG telemedicine service.

    PubMed

    Hsieh, Jui-Chien; Hsu, Meng-Wei

    2012-07-28

    Due to the great variability of 12-lead ECG instruments and medical specialists' interpretation skills, it remains a challenge to deliver rapid and accurate 12-lead ECG reports with senior cardiologists' decision making support in emergency telecardiology. We create a new cloud and pervasive computing based 12-lead Electrocardiography (ECG) service to realize ubiquitous 12-lead ECG tele-diagnosis. This developed service enables ECG to be transmitted and interpreted via mobile phones. That is, tele-consultation can take place while the patient is on the ambulance, between the onsite clinicians and the off-site senior cardiologists, or among hospitals. Most importantly, this developed service is convenient, efficient, and inexpensive. This cloud computing based ECG tele-consultation service expands the traditional 12-lead ECG applications onto the collaboration of clinicians at different locations or among hospitals. In short, this service can greatly improve medical service quality and efficiency, especially for patients in rural areas. This service has been evaluated and proved to be useful by cardiologists in Taiwan.

  2. Blind source computer device identification from recorded VoIP calls for forensic investigation.

    PubMed

    Jahanirad, Mehdi; Anuar, Nor Badrul; Wahab, Ainuddin Wahid Abdul

    2017-03-01

    The VoIP services provide fertile ground for criminal activity, thus identifying the transmitting computer devices from recorded VoIP call may help the forensic investigator to reveal useful information. It also proves the authenticity of the call recording submitted to the court as evidence. This paper extended the previous study on the use of recorded VoIP call for blind source computer device identification. Although initial results were promising but theoretical reasoning for this is yet to be found. The study suggested computing entropy of mel-frequency cepstrum coefficients (entropy-MFCC) from near-silent segments as an intrinsic feature set that captures the device response function due to the tolerances in the electronic components of individual computer devices. By applying the supervised learning techniques of naïve Bayesian, linear logistic regression, neural networks and support vector machines to the entropy-MFCC features, state-of-the-art identification accuracy of near 99.9% has been achieved on different sets of computer devices for both call recording and microphone recording scenarios. Furthermore, unsupervised learning techniques, including simple k-means, expectation-maximization and density-based spatial clustering of applications with noise (DBSCAN) provided promising results for call recording dataset by assigning the majority of instances to their correct clusters. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.

  3. Fundamental device design considerations in the development of disruptive nanoelectronics.

    PubMed

    Singh, R; Poole, J O; Poole, K F; Vaidya, S D

    2002-01-01

    In the last quarter of a century silicon-based integrated circuits (ICs) have played a major role in the growth of the economy throughout the world. A number of new technologies, such as quantum computing, molecular computing, DNA molecules for computing, etc., are currently being explored to create a product to replace semiconductor transistor technology. We have examined all of the currently explored options and found that none of these options are suitable as silicon IC's replacements. In this paper we provide fundamental device criteria that must be satisfied for the successful operation of a manufacturable, not yet invented, device. The two fundamental limits are the removal of heat and reliability. The switching speed of any practical man-made computing device will be in the range of 10(-15) to 10(-3) s. Heisenberg's uncertainty principle and the computer architecture set the heat generation limit. The thermal conductivity of the materials used in the fabrication of a nanodimensional device sets the heat removal limit. In current electronic products, redundancy plays a significant part in improving the reliability of parts with macroscopic defects. In the future, microscopic and even nanoscopic defects will play a critical role in the reliability of disruptive nanoelectronics. The lattice vibrations will set the intrinsic reliability of future computing systems. The two critical limits discussed in this paper provide criteria for the selection of materials used in the fabrication of future devices. Our work shows that diamond contains the clue to providing computing devices that will surpass the performance of silicon-based nanoelectronics.

  4. Synaptic electronics: materials, devices and applications.

    PubMed

    Kuzum, Duygu; Yu, Shimeng; Wong, H-S Philip

    2013-09-27

    In this paper, the recent progress of synaptic electronics is reviewed. The basics of biological synaptic plasticity and learning are described. The material properties and electrical switching characteristics of a variety of synaptic devices are discussed, with a focus on the use of synaptic devices for neuromorphic or brain-inspired computing. Performance metrics desirable for large-scale implementations of synaptic devices are illustrated. A review of recent work on targeted computing applications with synaptic devices is presented.

  5. PCA method for automated detection of mispronounced words

    NASA Astrophysics Data System (ADS)

    Ge, Zhenhao; Sharma, Sudhendu R.; Smith, Mark J. T.

    2011-06-01

    This paper presents a method for detecting mispronunciations with the aim of improving Computer Assisted Language Learning (CALL) tools used by foreign language learners. The algorithm is based on Principle Component Analysis (PCA). It is hierarchical with each successive step refining the estimate to classify the test word as being either mispronounced or correct. Preprocessing before detection, like normalization and time-scale modification, is implemented to guarantee uniformity of the feature vectors input to the detection system. The performance using various features including spectrograms and Mel-Frequency Cepstral Coefficients (MFCCs) are compared and evaluated. Best results were obtained using MFCCs, achieving up to 99% accuracy in word verification and 93% in native/non-native classification. Compared with Hidden Markov Models (HMMs) which are used pervasively in recognition application, this particular approach is computational efficient and effective when training data is limited.

  6. The fission yeast CENP-B protein Abp1 prevents pervasive transcription of repetitive DNA elements.

    PubMed

    Daulny, Anne; Mejía-Ramírez, Eva; Reina, Oscar; Rosado-Lugo, Jesus; Aguilar-Arnal, Lorena; Auer, Herbert; Zaratiegui, Mikel; Azorin, Fernando

    2016-10-01

    It is well established that eukaryotic genomes are pervasively transcribed producing cryptic unstable transcripts (CUTs). However, the mechanisms regulating pervasive transcription are not well understood. Here, we report that the fission yeast CENP-B homolog Abp1 plays an important role in preventing pervasive transcription. We show that loss of abp1 results in the accumulation of CUTs, which are targeted for degradation by the exosome pathway. These CUTs originate from different types of genomic features, but the highest increase corresponds to Tf2 retrotransposons and rDNA repeats, where they map along the entire elements. In the absence of abp1, increased RNAPII-Ser5P occupancy is observed throughout the Tf2 coding region and, unexpectedly, RNAPII-Ser5P is enriched at rDNA repeats. Loss of abp1 also results in Tf2 derepression and increased nucleolus size. Altogether these results suggest that Abp1 prevents pervasive RNAPII transcription of repetitive DNA elements (i.e., Tf2 and rDNA repeats) from internal cryptic sites. Copyright © 2016 Elsevier B.V. All rights reserved.

  7. Development of qualification guidelines for personal computer-based aviation training devices.

    DOT National Transportation Integrated Search

    1995-02-01

    Recent advances in the capabilities of personal computers have resulted in an increase in the number of flight simulation programs made available as Personal Computer-Based Aviation Training Devices (PCATDs).The potential benefits of PCATDs have been...

  8. RSTensorFlow: GPU Enabled TensorFlow for Deep Learning on Commodity Android Devices

    PubMed Central

    Alzantot, Moustafa; Wang, Yingnan; Ren, Zhengshuang; Srivastava, Mani B.

    2018-01-01

    Mobile devices have become an essential part of our daily lives. By virtue of both their increasing computing power and the recent progress made in AI, mobile devices evolved to act as intelligent assistants in many tasks rather than a mere way of making phone calls. However, popular and commonly used tools and frameworks for machine intelligence are still lacking the ability to make proper use of the available heterogeneous computing resources on mobile devices. In this paper, we study the benefits of utilizing the heterogeneous (CPU and GPU) computing resources available on commodity android devices while running deep learning models. We leveraged the heterogeneous computing framework RenderScript to accelerate the execution of deep learning models on commodity Android devices. Our system is implemented as an extension to the popular open-source framework TensorFlow. By integrating our acceleration framework tightly into TensorFlow, machine learning engineers can now easily make benefit of the heterogeneous computing resources on mobile devices without the need of any extra tools. We evaluate our system on different android phones models to study the trade-offs of running different neural network operations on the GPU. We also compare the performance of running different models architectures such as convolutional and recurrent neural networks on CPU only vs using heterogeneous computing resources. Our result shows that although GPUs on the phones are capable of offering substantial performance gain in matrix multiplication on mobile devices. Therefore, models that involve multiplication of large matrices can run much faster (approx. 3 times faster in our experiments) due to GPU support. PMID:29629431

  9. RSTensorFlow: GPU Enabled TensorFlow for Deep Learning on Commodity Android Devices.

    PubMed

    Alzantot, Moustafa; Wang, Yingnan; Ren, Zhengshuang; Srivastava, Mani B

    2017-06-01

    Mobile devices have become an essential part of our daily lives. By virtue of both their increasing computing power and the recent progress made in AI, mobile devices evolved to act as intelligent assistants in many tasks rather than a mere way of making phone calls. However, popular and commonly used tools and frameworks for machine intelligence are still lacking the ability to make proper use of the available heterogeneous computing resources on mobile devices. In this paper, we study the benefits of utilizing the heterogeneous (CPU and GPU) computing resources available on commodity android devices while running deep learning models. We leveraged the heterogeneous computing framework RenderScript to accelerate the execution of deep learning models on commodity Android devices. Our system is implemented as an extension to the popular open-source framework TensorFlow. By integrating our acceleration framework tightly into TensorFlow, machine learning engineers can now easily make benefit of the heterogeneous computing resources on mobile devices without the need of any extra tools. We evaluate our system on different android phones models to study the trade-offs of running different neural network operations on the GPU. We also compare the performance of running different models architectures such as convolutional and recurrent neural networks on CPU only vs using heterogeneous computing resources. Our result shows that although GPUs on the phones are capable of offering substantial performance gain in matrix multiplication on mobile devices. Therefore, models that involve multiplication of large matrices can run much faster (approx. 3 times faster in our experiments) due to GPU support.

  10. Beyond Moore's law: towards competitive quantum devices

    NASA Astrophysics Data System (ADS)

    Troyer, Matthias

    2015-05-01

    A century after the invention of quantum theory and fifty years after Bell's inequality we see the first quantum devices emerge as products that aim to be competitive with the best classical computing devices. While a universal quantum computer of non-trivial size is still out of reach there exist a number commercial and experimental devices: quantum random number generators, quantum simulators and quantum annealers. In this colloquium I will present some of these devices and validation tests we performed on them. Quantum random number generators use the inherent randomness in quantum measurements to produce true random numbers, unlike classical pseudorandom number generators which are inherently deterministic. Optical lattice emulators use ultracold atomic gases in optical lattices to mimic typical models of condensed matter physics. In my talk I will focus especially on the devices built by Canadian company D-Wave systems, which are special purpose quantum simulators for solving hard classical optimization problems. I will review the controversy around the quantum nature of these devices and will compare them to state of the art classical algorithms. I will end with an outlook towards universal quantum computing and end with the question: which important problems that are intractable even for post-exa-scale classical computers could we expect to solve once we have a universal quantum computer?

  11. An electrically reconfigurable logic gate intrinsically enabled by spin-orbit materials.

    PubMed

    Kazemi, Mohammad

    2017-11-10

    The spin degree of freedom in magnetic devices has been discussed widely for computing, since it could significantly reduce energy dissipation, might enable beyond Von Neumann computing, and could have applications in quantum computing. For spin-based computing to become widespread, however, energy efficient logic gates comprising as few devices as possible are required. Considerable recent progress has been reported in this area. However, proposals for spin-based logic either require ancillary charge-based devices and circuits in each individual gate or adopt principals underlying charge-based computing by employing ancillary spin-based devices, which largely negates possible advantages. Here, we show that spin-orbit materials possess an intrinsic basis for the execution of logic operations. We present a spin-orbit logic gate that performs a universal logic operation utilizing the minimum possible number of devices, that is, the essential devices required for representing the logic operands. Also, whereas the previous proposals for spin-based logic require extra devices in each individual gate to provide reconfigurability, the proposed gate is 'electrically' reconfigurable at run-time simply by setting the amplitude of the clock pulse applied to the gate. We demonstrate, analytically and numerically with experimentally benchmarked models, that the gate performs logic operations and simultaneously stores the result, realizing the 'stateful' spin-based logic scalable to ultralow energy dissipation.

  12. Protecting computer-based medical devices: defending against viruses and other threats.

    PubMed

    2005-07-01

    The increasing integration of computer hardware has exposed medical devices to greater risks than ever before. More and more devices rely on commercial off-the-shelf software and operating systems, which are vulnerable to the increasing proliferation of viruses and other malicious programs that target computers. Therefore, it is necessary for hospitals to take steps such as those outlined in this article to ensure that their computer-based devices are made safe and continue to remain safe in the future. Maintaining the security of medical devices requires planning, careful execution, and a commitment of resources. A team should be created to develop a process for surveying the security status of all computerized devices in the hospital and making sure that patches and other updates are applied as needed. These patches and updates should be approved by the medical system supplier before being implemented. The team should consider using virtual local area networks to isolate susceptible devices on the hospital's network. All security measures should be carefully documented, and the documentation should be kept up-to-date. Above all, care must be taken to ensure that medical device security involves a collaborative, supportive partnership between the hospital's information technology staff and biomedical engineering personnel.

  13. 21 CFR 870.1110 - Blood pressure computer.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Blood pressure computer. 870.1110 Section 870.1110 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1110 Blood pressure...

  14. Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting

    DOEpatents

    Hamlet, Jason R; Bauer, Todd M; Pierson, Lyndon G

    2014-09-30

    Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing device. The cryptographic fingerprint unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware platform. The PUF circuit is used to generate a PUF value. A key generator is coupled to generate a private key and a public key based on the PUF value while a decryptor is coupled to receive an authentication challenge posed to the computing device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  15. Landau-Kleffner Syndrome

    MedlinePlus

    ... difficult to diagnose and may be misdiagnosed as autism, pervasive developmental disorder, hearing impairment, learning disability, auditory/ ... difficult to diagnose and may be misdiagnosed as autism, pervasive developmental disorder, hearing impairment, learning disability, auditory/ ...

  16. Mobile and fixed computer use by doctors and nurses on hospital wards: multi-method study on the relationships between clinician role, clinical task, and device choice.

    PubMed

    Andersen, Pia; Lindgaard, Anne-Mette; Prgomet, Mirela; Creswick, Nerida; Westbrook, Johanna I

    2009-08-04

    Selecting the right mix of stationary and mobile computing devices is a significant challenge for system planners and implementers. There is very limited research evidence upon which to base such decisions. We aimed to investigate the relationships between clinician role, clinical task, and selection of a computer hardware device in hospital wards. Twenty-seven nurses and eight doctors were observed for a total of 80 hours as they used a range of computing devices to access a computerized provider order entry system on two wards at a major Sydney teaching hospital. Observers used a checklist to record the clinical tasks completed, devices used, and location of the activities. Field notes were also documented during observations. Semi-structured interviews were conducted after observation sessions. Assessment of the physical attributes of three devices-stationary PCs, computers on wheels (COWs) and tablet PCs-was made. Two types of COWs were available on the wards: generic COWs (laptops mounted on trolleys) and ergonomic COWs (an integrated computer and cart device). Heuristic evaluation of the user interfaces was also carried out. The majority (93.1%) of observed nursing tasks were conducted using generic COWs. Most nursing tasks were performed in patients' rooms (57%) or in the corridors (36%), with a small percentage at a patient's bedside (5%). Most nursing tasks related to the preparation and administration of drugs. Doctors on ward rounds conducted 57.3% of observed clinical tasks on generic COWs and 35.9% on tablet PCs. On rounds, 56% of doctors' tasks were performed in the corridors, 29% in patients' rooms, and 3% at the bedside. Doctors not on a ward round conducted 93.6% of tasks using stationary PCs, most often within the doctors' office. Nurses and doctors were observed performing workarounds, such as transcribing medication orders from the computer to paper. The choice of device was related to clinical role, nature of the clinical task, degree of mobility required, including where task completion occurs, and device design. Nurses' work, and clinical tasks performed by doctors during ward rounds, require highly mobile computer devices. Nurses and doctors on ward rounds showed a strong preference for generic COWs over all other devices. Tablet PCs were selected by doctors for only a small proportion of clinical tasks. Even when using mobile devices clinicians completed a very low proportion of observed tasks at the bedside. The design of the devices and ward space configurations place limitations on how and where devices are used and on the mobility of clinical work. In such circumstances, clinicians will initiate workarounds to compensate. In selecting hardware devices, consideration should be given to who will be using the devices, the nature of their work, and the physical layout of the ward.

  17. Neuromorphic Computing, Architectures, Models, and Applications. A Beyond-CMOS Approach to Future Computing, June 29-July 1, 2016, Oak Ridge, TN

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Potok, Thomas; Schuman, Catherine; Patton, Robert

    The White House and Department of Energy have been instrumental in driving the development of a neuromorphic computing program to help the United States continue its lead in basic research into (1) Beyond Exascale—high performance computing beyond Moore’s Law and von Neumann architectures, (2) Scientific Discovery—new paradigms for understanding increasingly large and complex scientific data, and (3) Emerging Architectures—assessing the potential of neuromorphic and quantum architectures. Neuromorphic computing spans a broad range of scientific disciplines from materials science to devices, to computer science, to neuroscience, all of which are required to solve the neuromorphic computing grand challenge. In our workshopmore » we focus on the computer science aspects, specifically from a neuromorphic device through an application. Neuromorphic devices present a very different paradigm to the computer science community from traditional von Neumann architectures, which raises six major questions about building a neuromorphic application from the device level. We used these fundamental questions to organize the workshop program and to direct the workshop panels and discussions. From the white papers, presentations, panels, and discussions, there emerged several recommendations on how to proceed.« less

  18. Secure data exchange between intelligent devices and computing centers

    NASA Astrophysics Data System (ADS)

    Naqvi, Syed; Riguidel, Michel

    2005-03-01

    The advent of reliable spontaneous networking technologies (commonly known as wireless ad-hoc networks) has ostensibly raised stakes for the conception of computing intensive environments using intelligent devices as their interface with the external world. These smart devices are used as data gateways for the computing units. These devices are employed in highly volatile environments where the secure exchange of data between these devices and their computing centers is of paramount importance. Moreover, their mission critical applications require dependable measures against the attacks like denial of service (DoS), eavesdropping, masquerading, etc. In this paper, we propose a mechanism to assure reliable data exchange between an intelligent environment composed of smart devices and distributed computing units collectively called 'computational grid'. The notion of infosphere is used to define a digital space made up of a persistent and a volatile asset in an often indefinite geographical space. We study different infospheres and present general evolutions and issues in the security of such technology-rich and intelligent environments. It is beyond any doubt that these environments will likely face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. It would be better to build in the ability to uniformly deal with these systems. As a solution, we propose a concept of virtualization of security services. We try to solve the difficult problems of implementation and maintenance of trust on the one hand, and those of security management in heterogeneous infrastructure on the other hand.

  19. CSP: A Multifaceted Hybrid Architecture for Space Computing

    NASA Technical Reports Server (NTRS)

    Rudolph, Dylan; Wilson, Christopher; Stewart, Jacob; Gauvin, Patrick; George, Alan; Lam, Herman; Crum, Gary Alex; Wirthlin, Mike; Wilson, Alex; Stoddard, Aaron

    2014-01-01

    Research on the CHREC Space Processor (CSP) takes a multifaceted hybrid approach to embedded space computing. Working closely with the NASA Goddard SpaceCube team, researchers at the National Science Foundation (NSF) Center for High-Performance Reconfigurable Computing (CHREC) at the University of Florida and Brigham Young University are developing hybrid space computers that feature an innovative combination of three technologies: commercial-off-the-shelf (COTS) devices, radiation-hardened (RadHard) devices, and fault-tolerant computing. Modern COTS processors provide the utmost in performance and energy-efficiency but are susceptible to ionizing radiation in space, whereas RadHard processors are virtually immune to this radiation but are more expensive, larger, less energy-efficient, and generations behind in speed and functionality. By featuring COTS devices to perform the critical data processing, supported by simpler RadHard devices that monitor and manage the COTS devices, and augmented with novel uses of fault-tolerant hardware, software, information, and networking within and between COTS devices, the resulting system can maximize performance and reliability while minimizing energy consumption and cost. NASA Goddard has adopted the CSP concept and technology with plans underway to feature flight-ready CSP boards on two upcoming space missions.

  20. PLATO--AN AUTOMATED TEACHING DEVICE.

    ERIC Educational Resources Information Center

    BITZER, D.; AND OTHERS

    PLATO (PROGRAMED LOGIC FOR AUTOMATIC TEACHING OPERATION) IS A DEVICE FOR TEACHING A NUMBER OF STUDENTS INDIVIDUALLY BY MEANS OF A SINGLE, CENTRAL PURPOSE, DIGITAL COMPUTER. THE GENERAL ORGANIZATION OF EQUIPMENT CONSISTS OF A KEYSET FOR STUDENT RESPONSES, THE COMPUTER, STORAGE DEVICE (ELECTRIC BLACKBOARD), SLIDE SELECTOR (ELECTRICAL BOOK), AND TV…

  1. 21 CFR 870.1435 - Single-function, preprogrammed diagnostic computer.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Single-function, preprogrammed diagnostic computer. 870.1435 Section 870.1435 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1435...

  2. Introduction to Semiconductor Devices

    NASA Astrophysics Data System (ADS)

    Brennan, Kevin F.

    2005-03-01

    This volume offers a solid foundation for understanding the most important devices used in the hottest areas of electronic engineering today, from semiconductor fundamentals to state-of-the-art semiconductor devices in the telecommunications and computing industries. Kevin Brennan describes future approaches to computing hardware and RF power amplifiers, and explains how emerging trends and system demands of computing and telecommunications systems influence the choice, design and operation of semiconductor devices. In addition, he covers MODFETs and MOSFETs, short channel effects, and the challenges faced by continuing miniaturization. His book is both an excellent senior/graduate text and a valuable reference for practicing engineers and researchers.

  3. Detecting Nano-Scale Vibrations in Rotating Devices by Using Advanced Computational Methods

    PubMed Central

    del Toro, Raúl M.; Haber, Rodolfo E.; Schmittdiel, Michael C.

    2010-01-01

    This paper presents a computational method for detecting vibrations related to eccentricity in ultra precision rotation devices used for nano-scale manufacturing. The vibration is indirectly measured via a frequency domain analysis of the signal from a piezoelectric sensor attached to the stationary component of the rotating device. The algorithm searches for particular harmonic sequences associated with the eccentricity of the device rotation axis. The detected sequence is quantified and serves as input to a regression model that estimates the eccentricity. A case study presents the application of the computational algorithm during precision manufacturing processes. PMID:22399918

  4. Output Devices, Computation, and the Future of Mathematical Crafts.

    ERIC Educational Resources Information Center

    Eisenberg, Michael

    2002-01-01

    The advent of powerful, affordable output devices offers the potential for a vastly expanded landscape of computationally-enriched mathematical craft activities in education. Craft activities have both intellectual and emotional affordances that are relatively lacking in "traditional" computer-based education. Describes three software applications…

  5. A computational workflow for designing silicon donor qubits

    DOE PAGES

    Humble, Travis S.; Ericson, M. Nance; Jakowski, Jacek; ...

    2016-09-19

    Developing devices that can reliably and accurately demonstrate the principles of superposition and entanglement is an on-going challenge for the quantum computing community. Modeling and simulation offer attractive means of testing early device designs and establishing expectations for operational performance. However, the complex integrated material systems required by quantum device designs are not captured by any single existing computational modeling method. We examine the development and analysis of a multi-staged computational workflow that can be used to design and characterize silicon donor qubit systems with modeling and simulation. Our approach integrates quantum chemistry calculations with electrostatic field solvers to performmore » detailed simulations of a phosphorus dopant in silicon. We show how atomistic details can be synthesized into an operational model for the logical gates that define quantum computation in this particular technology. In conclusion, the resulting computational workflow realizes a design tool for silicon donor qubits that can help verify and validate current and near-term experimental devices.« less

  6. A Computer Story: Complexity from Simplicity

    ERIC Educational Resources Information Center

    DeLeo, Gary; Weidenhammer, Amanda; Wecht, Kristen

    2012-01-01

    In this technological age, digital devices are conspicuous examples of extraordinary complexity. When a user clicks on computer icons or presses calculator buttons, these devices channel electricity through a complex system of decision-making circuits. Yet, in spite of this remarkable complexity, the hearts of these devices are components that…

  7. 78 FR 1248 - Certain Computing Devices With Associated Instruction Sets and Software; Notice of Commission...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-08

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-812] Certain Computing Devices With Associated Instruction Sets and Software; Notice of Commission Determination Not To Review an Initial... devices with associated instruction sets and software by reason of infringement of claims 1-4, 7-10, and...

  8. Adaptive Device Context Based Mobile Learning Systems

    ERIC Educational Resources Information Center

    Pu, Haitao; Lin, Jinjiao; Song, Yanwei; Liu, Fasheng

    2011-01-01

    Mobile learning is e-learning delivered through mobile computing devices, which represents the next stage of computer-aided, multi-media based learning. Therefore, mobile learning is transforming the way of traditional education. However, as most current e-learning systems and their contents are not suitable for mobile devices, an approach for…

  9. Can a tablet device alter undergraduate science students' study behavior and use of technology?

    PubMed

    Morris, Neil P; Ramsay, Luke; Chauhan, Vikesh

    2012-06-01

    This article reports findings from a study investigating undergraduate biological sciences students' use of technology and computer devices for learning and the effect of providing students with a tablet device. A controlled study was conducted to collect quantitative and qualitative data on the impact of a tablet device on students' use of devices and technology for learning. Overall, we found that students made extensive use of the tablet device for learning, using it in preference to laptop computers to retrieve information, record lectures, and access learning resources. In line with other studies, we found that undergraduate students only use familiar Web 2.0 technologies and that the tablet device did not alter this behavior for the majority of tools. We conclude that undergraduate science students can make extensive use of a tablet device to enhance their learning opportunities without institutions changing their teaching methods or computer systems, but that institutional intervention may be needed to drive changes in student behavior toward the use of novel Web 2.0 technologies.

  10. On-Site Classification of Pansteatitis in Mozambique Tilapia (Oreochromis mossambicus) using a Portable Lipid-Based Analyzer

    PubMed Central

    Somerville, Stephen E.; Cantu, Theresa M.; Guillette, Matthew P.; Botha, Hannes; Boggs, Ashley S. P.; Luus-Powell, Wilmien; Guillette, Louis J.

    2017-01-01

    While no pansteatitis-related large-scale mortality events have occurred since 2008, the current status of pansteatitis (presence and pervasiveness) in the Olifants River system and other regions of South Africa remain largely unknown. In part, this is due to both a lack of known biological markers of pansteatitis and a lack of suitable non-invasive assays capable of rapidly classifying the disease. Here, we propose the application of a point-of-care (POC) device using lipid-based test strips (total cholesterol (TC) and total triglyceride (TG)), for classifying pansteatitis status in the whole blood of pre-spawning Mozambique tilapia (Oreochromis mossambicus). Using the TC strips, the POC device was able to non-lethally classify the tilapia as either healthy or pansteatitis-affected; the sexes were examined independently because sexual dimorphism was observed for TC (males p = 0.0364, females χ2 = 0.0007). No significant difference between diseased and pansteatitis-affected tilapia was observed using the TG strips. This is one of the first described applications of using POC devices for on-site environmental disease state testing. A discussion on the merits of using portable lipid-based analyzers as an in-field disease-state diagnostic tool is provided. PMID:28729886

  11. MEMS Sensor Technologies for Human Centred Applications in Healthcare, Physical Activities, Safety and Environmental Sensing: A Review on Research Activities in Italy

    PubMed Central

    Ciuti, Gastone; Ricotti, Leonardo; Menciassi, Arianna; Dario, Paolo

    2015-01-01

    Over the past few decades the increased level of public awareness concerning healthcare, physical activities, safety and environmental sensing has created an emerging need for smart sensor technologies and monitoring devices able to sense, classify, and provide feedbacks to users’ health status and physical activities, as well as to evaluate environmental and safety conditions in a pervasive, accurate and reliable fashion. Monitoring and precisely quantifying users’ physical activity with inertial measurement unit-based devices, for instance, has also proven to be important in health management of patients affected by chronic diseases, e.g., Parkinson’s disease, many of which are becoming highly prevalent in Italy and in the Western world. This review paper will focus on MEMS sensor technologies developed in Italy in the last three years describing research achievements for healthcare and physical activity, safety and environmental sensing, in addition to smart systems integration. Innovative and smart integrated solutions for sensing devices, pursued and implemented in Italian research centres, will be highlighted, together with specific applications of such technologies. Finally, the paper will depict the future perspective of sensor technologies and corresponding exploitation opportunities, again with a specific focus on Italy. PMID:25808763

  12. Mobile and Fixed Computer Use by Doctors and Nurses on Hospital Wards: Multi-method Study on the Relationships Between Clinician Role, Clinical Task, and Device Choice

    PubMed Central

    Andersen, Pia; Lindgaard, Anne-Mette; Prgomet, Mirela; Creswick, Nerida

    2009-01-01

    Background Selecting the right mix of stationary and mobile computing devices is a significant challenge for system planners and implementers. There is very limited research evidence upon which to base such decisions. Objective We aimed to investigate the relationships between clinician role, clinical task, and selection of a computer hardware device in hospital wards. Methods Twenty-seven nurses and eight doctors were observed for a total of 80 hours as they used a range of computing devices to access a computerized provider order entry system on two wards at a major Sydney teaching hospital. Observers used a checklist to record the clinical tasks completed, devices used, and location of the activities. Field notes were also documented during observations. Semi-structured interviews were conducted after observation sessions. Assessment of the physical attributes of three devices—stationary PCs, computers on wheels (COWs) and tablet PCs—was made. Two types of COWs were available on the wards: generic COWs (laptops mounted on trolleys) and ergonomic COWs (an integrated computer and cart device). Heuristic evaluation of the user interfaces was also carried out. Results The majority (93.1%) of observed nursing tasks were conducted using generic COWs. Most nursing tasks were performed in patients’ rooms (57%) or in the corridors (36%), with a small percentage at a patient’s bedside (5%). Most nursing tasks related to the preparation and administration of drugs. Doctors on ward rounds conducted 57.3% of observed clinical tasks on generic COWs and 35.9% on tablet PCs. On rounds, 56% of doctors’ tasks were performed in the corridors, 29% in patients’ rooms, and 3% at the bedside. Doctors not on a ward round conducted 93.6% of tasks using stationary PCs, most often within the doctors’ office. Nurses and doctors were observed performing workarounds, such as transcribing medication orders from the computer to paper. Conclusions The choice of device was related to clinical role, nature of the clinical task, degree of mobility required, including where task completion occurs, and device design. Nurses’ work, and clinical tasks performed by doctors during ward rounds, require highly mobile computer devices. Nurses and doctors on ward rounds showed a strong preference for generic COWs over all other devices. Tablet PCs were selected by doctors for only a small proportion of clinical tasks. Even when using mobile devices clinicians completed a very low proportion of observed tasks at the bedside. The design of the devices and ward space configurations place limitations on how and where devices are used and on the mobility of clinical work. In such circumstances, clinicians will initiate workarounds to compensate. In selecting hardware devices, consideration should be given to who will be using the devices, the nature of their work, and the physical layout of the ward. PMID:19674959

  13. Simulation training tools for nonlethal weapons using gaming environments

    NASA Astrophysics Data System (ADS)

    Donne, Alexsana; Eagan, Justin; Tse, Gabriel; Vanderslice, Tom; Woods, Jerry

    2006-05-01

    Modern simulation techniques have a growing role for evaluating new technologies and for developing cost-effective training programs. A mission simulator facilitates the productive exchange of ideas by demonstration of concepts through compellingly realistic computer simulation. Revolutionary advances in 3D simulation technology have made it possible for desktop computers to process strikingly realistic and complex interactions with results depicted in real-time. Computer games now allow for multiple real human players and "artificially intelligent" (AI) simulated robots to play together. Advances in computer processing power have compensated for the inherent intensive calculations required for complex simulation scenarios. The main components of the leading game-engines have been released for user modifications, enabling game enthusiasts and amateur programmers to advance the state-of-the-art in AI and computer simulation technologies. It is now possible to simulate sophisticated and realistic conflict situations in order to evaluate the impact of non-lethal devices as well as conflict resolution procedures using such devices. Simulations can reduce training costs as end users: learn what a device does and doesn't do prior to use, understand responses to the device prior to deployment, determine if the device is appropriate for their situational responses, and train with new devices and techniques before purchasing hardware. This paper will present the status of SARA's mission simulation development activities, based on the Half-Life gameengine, for the purpose of evaluating the latest non-lethal weapon devices, and for developing training tools for such devices.

  14. "What Are You Viewing?" Exploring the Pervasive Social TV Experience

    NASA Astrophysics Data System (ADS)

    Schatz, Raimund; Baillie, Lynne; Fröhlich, Peter; Egger, Sebastian; Grechenig, Thomas

    The vision of pervasive TV foresees users engaging with interactive video services across a variety of contexts and user interfaces. Following this idea, this chapter extends traditional Social TV toward the notion of pervasive Social TV (PSTV) by including mobile viewing scenarios. We discuss social interaction enablers that integrate TV content consumption and communication in the context of two case studies that evaluate Social TV on mobile smartphones as well as the traditional set-top-box-based setup. We report on the impact of social features such as text-chat, audio-chat, and synchronized channel-choice on the end-user's media experience. By analyzing the commonalities and the differences between mobile and living-room Social TV that we found, we provide guidance on the design of pervasive Social TV systems as well as on future research issues.

  15. ICT and the future of healthcare: Aspects of pervasive health monitoring.

    PubMed

    Haluza, Daniela; Jungwirth, David

    2018-01-01

    Along with the digital revolution, information and communication technology applications are currently transforming the delivery of health and social care services. This paper investigates prevailing opinions toward future technology-based healthcare solutions among Austrian healthcare professionals. During a biphasic online Delphi survey, panelists rated expected outcomes of two future scenarios describing pervasive health monitoring applications. Experts perceived that the scenarios were highly innovative, but only moderately desirable, and that their implementation could especially improve patients' knowledge, quality of healthcare, and living standard. Contrarily, monetary aspects, technical prerequisites, and data security were identified as key obstacles. We further compared the impact of professional affiliation. Clearly, opinions toward pervasive healthcare differed between the interest groups, medical professionals, patient advocates, and administrative personnel. These data suggest closer collaborations between stakeholder groups to harmonize differences in expectations regarding pervasive health monitoring.

  16. Ag2S atomic switch-based `tug of war' for decision making

    NASA Astrophysics Data System (ADS)

    Lutz, C.; Hasegawa, T.; Chikyow, T.

    2016-07-01

    For a computing process such as making a decision, a software controlled chip of several transistors is necessary. Inspired by how a single cell amoeba decides its movements, the theoretical `tug of war' computing model was proposed but not yet implemented in an analogue device suitable for integrated circuits. Based on this model, we now developed a new electronic element for decision making processes, which will have no need for prior programming. The devices are based on the growth and shrinkage of Ag filaments in α-Ag2+δS gap-type atomic switches. Here we present the adapted device design and the new materials. We demonstrate the basic `tug of war' operation by IV-measurements and Scanning Electron Microscopy (SEM) observation. These devices could be the base for a CMOS-free new computer architecture.For a computing process such as making a decision, a software controlled chip of several transistors is necessary. Inspired by how a single cell amoeba decides its movements, the theoretical `tug of war' computing model was proposed but not yet implemented in an analogue device suitable for integrated circuits. Based on this model, we now developed a new electronic element for decision making processes, which will have no need for prior programming. The devices are based on the growth and shrinkage of Ag filaments in α-Ag2+δS gap-type atomic switches. Here we present the adapted device design and the new materials. We demonstrate the basic `tug of war' operation by IV-measurements and Scanning Electron Microscopy (SEM) observation. These devices could be the base for a CMOS-free new computer architecture. Electronic supplementary information (ESI) available. See DOI: 10.1039/c6nr00690f

  17. A Systematic Review of Tablet Computers and Portable Media Players as Speech Generating Devices for Individuals with Autism Spectrum Disorder.

    PubMed

    Lorah, Elizabeth R; Parnell, Ashley; Whitby, Peggy Schaefer; Hantula, Donald

    2015-12-01

    Powerful, portable, off-the-shelf handheld devices, such as tablet based computers (i.e., iPad(®); Galaxy(®)) or portable multimedia players (i.e., iPod(®)), can be adapted to function as speech generating devices for individuals with autism spectrum disorders or related developmental disabilities. This paper reviews the research in this new and rapidly growing area and delineates an agenda for future investigations. In general, participants using these devices acquired verbal repertoires quickly. Studies comparing these devices to picture exchange or manual sign language found that acquisition was often quicker when using a tablet computer and that the vast majority of participants preferred using the device to picture exchange or manual sign language. Future research in interface design, user experience, and extended verbal repertoires is recommended.

  18. Controlling Laboratory Processes From A Personal Computer

    NASA Technical Reports Server (NTRS)

    Will, H.; Mackin, M. A.

    1991-01-01

    Computer program provides natural-language process control from IBM PC or compatible computer. Sets up process-control system that either runs without operator or run by workers who have limited programming skills. Includes three smaller programs. Two of them, written in FORTRAN 77, record data and control research processes. Third program, written in Pascal, generates FORTRAN subroutines used by other two programs to identify user commands with device-driving routines written by user. Also includes set of input data allowing user to define user commands to be executed by computer. Requires personal computer operating under MS-DOS with suitable hardware interfaces to all controlled devices. Also requires FORTRAN 77 compiler and device drivers written by user.

  19. Wearable computer technology for dismounted applications

    NASA Astrophysics Data System (ADS)

    Daniels, Reginald

    2010-04-01

    Small computing devices which rival the compact size of traditional personal digital assistants (PDA) have recently established a market niche. These computing devices are small enough to be considered unobtrusive for humans to wear. The computing devices are also powerful enough to run full multi-tasking general purpose operating systems. This paper will explore the wearable computer information system for dismounted applications recently fielded for ground-based US Air Force use. The environments that the information systems are used in will be reviewed, as well as a description of the net-centric, ground-based warrior. The paper will conclude with a discussion regarding the importance of intuitive, usable, and unobtrusive operator interfaces for dismounted operators.

  20. Modeling and Simulation of Explosively Driven Electromechanical Devices

    NASA Astrophysics Data System (ADS)

    Demmie, Paul N.

    2002-07-01

    Components that store electrical energy in ferroelectric materials and produce currents when their permittivity is explosively reduced are used in a variety of applications. The modeling and simulation of such devices is a challenging problem since one has to represent the coupled physics of detonation, shock propagation, and electromagnetic field generation. The high fidelity modeling and simulation of complicated electromechanical devices was not feasible prior to having the Accelerated Strategic Computing Initiative (ASCI) computers and the ASCI developed codes at Sandia National Laboratories (SNL). The EMMA computer code is used to model such devices and simulate their operation. In this paper, I discuss the capabilities of the EMMA code for the modeling and simulation of one such electromechanical device, a slim-loop ferroelectric (SFE) firing set.

  1. 76 FR 24051 - In the Matter of Certain Electronic Devices, Including Mobile Phones, Mobile Tablets, Portable...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-29

    ..., Including Mobile Phones, Mobile Tablets, Portable Music Players, and Computers, and Components Thereof... certain electronic devices, including mobile phones, mobile tablets, portable music players, and computers... mobile phones, mobile tablets, portable music players, and computers, and components thereof that...

  2. Effects of portable computing devices on posture, muscle activation levels and efficiency.

    PubMed

    Werth, Abigail; Babski-Reeves, Kari

    2014-11-01

    Very little research exists on ergonomic exposures when using portable computing devices. This study quantified muscle activity (forearm and neck), posture (wrist, forearm and neck), and performance (gross typing speed and error rates) differences across three portable computing devices (laptop, netbook, and slate computer) and two work settings (desk and computer) during data entry tasks. Twelve participants completed test sessions on a single computer using a test-rest-test protocol (30min of work at one work setting, 15min of rest, 30min of work at the other work setting). The slate computer resulted in significantly more non-neutral wrist, elbow and neck postures, particularly when working on the sofa. Performance on the slate computer was four times less than that of the other computers, though lower muscle activity levels were also found. Potential or injury or illness may be elevated when working on smaller, portable computers in non-traditional work settings. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  3. Abstractions for DNA circuit design.

    PubMed

    Lakin, Matthew R; Youssef, Simon; Cardelli, Luca; Phillips, Andrew

    2012-03-07

    DNA strand displacement techniques have been used to implement a broad range of information processing devices, from logic gates, to chemical reaction networks, to architectures for universal computation. Strand displacement techniques enable computational devices to be implemented in DNA without the need for additional components, allowing computation to be programmed solely in terms of nucleotide sequences. A major challenge in the design of strand displacement devices has been to enable rapid analysis of high-level designs while also supporting detailed simulations that include known forms of interference. Another challenge has been to design devices capable of sustaining precise reaction kinetics over long periods, without relying on complex experimental equipment to continually replenish depleted species over time. In this paper, we present a programming language for designing DNA strand displacement devices, which supports progressively increasing levels of molecular detail. The language allows device designs to be programmed using a common syntax and then analysed at varying levels of detail, with or without interference, without needing to modify the program. This allows a trade-off to be made between the level of molecular detail and the computational cost of analysis. We use the language to design a buffered architecture for DNA devices, capable of maintaining precise reaction kinetics for a potentially unbounded period. We test the effectiveness of buffered gates to support long-running computation by designing a DNA strand displacement system capable of sustained oscillations.

  4. Computing architecture for autonomous microgrids

    DOEpatents

    Goldsmith, Steven Y.

    2015-09-29

    A computing architecture that facilitates autonomously controlling operations of a microgrid is described herein. A microgrid network includes numerous computing devices that execute intelligent agents, each of which is assigned to a particular entity (load, source, storage device, or switch) in the microgrid. The intelligent agents can execute in accordance with predefined protocols to collectively perform computations that facilitate uninterrupted control of the .

  5. Spin-neurons: A possible path to energy-efficient neuromorphic computers

    NASA Astrophysics Data System (ADS)

    Sharad, Mrigank; Fan, Deliang; Roy, Kaushik

    2013-12-01

    Recent years have witnessed growing interest in the field of brain-inspired computing based on neural-network architectures. In order to translate the related algorithmic models into powerful, yet energy-efficient cognitive-computing hardware, computing-devices beyond CMOS may need to be explored. The suitability of such devices to this field of computing would strongly depend upon how closely their physical characteristics match with the essential computing primitives employed in such models. In this work, we discuss the rationale of applying emerging spin-torque devices for bio-inspired computing. Recent spin-torque experiments have shown the path to low-current, low-voltage, and high-speed magnetization switching in nano-scale magnetic devices. Such magneto-metallic, current-mode spin-torque switches can mimic the analog summing and "thresholding" operation of an artificial neuron with high energy-efficiency. Comparison with CMOS-based analog circuit-model of a neuron shows that "spin-neurons" (spin based circuit model of neurons) can achieve more than two orders of magnitude lower energy and beyond three orders of magnitude reduction in energy-delay product. The application of spin-neurons can therefore be an attractive option for neuromorphic computers of future.

  6. Spin-neurons: A possible path to energy-efficient neuromorphic computers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sharad, Mrigank; Fan, Deliang; Roy, Kaushik

    Recent years have witnessed growing interest in the field of brain-inspired computing based on neural-network architectures. In order to translate the related algorithmic models into powerful, yet energy-efficient cognitive-computing hardware, computing-devices beyond CMOS may need to be explored. The suitability of such devices to this field of computing would strongly depend upon how closely their physical characteristics match with the essential computing primitives employed in such models. In this work, we discuss the rationale of applying emerging spin-torque devices for bio-inspired computing. Recent spin-torque experiments have shown the path to low-current, low-voltage, and high-speed magnetization switching in nano-scale magnetic devices.more » Such magneto-metallic, current-mode spin-torque switches can mimic the analog summing and “thresholding” operation of an artificial neuron with high energy-efficiency. Comparison with CMOS-based analog circuit-model of a neuron shows that “spin-neurons” (spin based circuit model of neurons) can achieve more than two orders of magnitude lower energy and beyond three orders of magnitude reduction in energy-delay product. The application of spin-neurons can therefore be an attractive option for neuromorphic computers of future.« less

  7. [Obsessive-compulsive symptoms, tics, stereotypic movements or need for absolute consistency? The occurrence of repetitive activities in patients with pervasive developmental disorders--case studies].

    PubMed

    Bryńska, Anita; Lipińska, Elzbieta; Matelska, Monika

    2011-01-01

    Repetitive and stereotyped behaviours in the form of stereotyped interests or specific routine activities are one ofthe diagnostic criteria in pervasive developmental disorders. The occurrence of repetitive behaviours in patients with pervasive developmental disorders is a starting point for questions about the type and classification criteria of such behaviours. The aim of the article is to present case studies of patients with pervasive developmental disorders and co-morbid symptoms in the form of routine activities, tics, obsessive-compulsive symptoms or stereotyped behaviours. The first case study describes a patient with Asperger's syndrome and obsessive compulsive symptoms. The diagnostic problems regarding complex motor tics are discussed in the second case study which describes a patient with Asperger's syndrome and Gilles de la Tourette syndrome. The third and fourth case study describes mono-zygotic twins with so called High Functioning Autism whose repetitive activities point to either obsessive compulsive symptoms, stereotypic movements, need for absolute consistency or echopraxia. The possible comorbidity of pervasive developmental disorders and symptoms in the form of repetitive behaviours, possible interactions as well as diagnostic challenges is discussed in the article.

  8. A Low-Cost Environmental Monitoring System: How to Prevent Systematic Errors in the Design Phase through the Combined Use of Additive Manufacturing and Thermographic Techniques.

    PubMed

    Salamone, Francesco; Danza, Ludovico; Meroni, Italo; Pollastro, Maria Cristina

    2017-04-11

    nEMoS (nano Environmental Monitoring System) is a 3D-printed device built following the Do-It-Yourself (DIY) approach. It can be connected to the web and it can be used to assess indoor environmental quality (IEQ). It is built using some low-cost sensors connected to an Arduino microcontroller board. The device is assembled in a small-sized case and both thermohygrometric sensors used to measure the air temperature and relative humidity, and the globe thermometer used to measure the radiant temperature, can be subject to thermal effects due to overheating of some nearby components. A thermographic analysis was made to rule out this possibility. The paper shows how the pervasive technique of additive manufacturing can be combined with the more traditional thermographic techniques to redesign the case and to verify the accuracy of the optimized system in order to prevent instrumental systematic errors in terms of the difference between experimental and actual values of the above-mentioned environmental parameters.

  9. Materials and processing science: Limits for microelectronics

    NASA Astrophysics Data System (ADS)

    Rosenberg, R.

    1988-09-01

    The theme of this talk will be to illustrate examples of technologies that will drive materials and processing sciences to the limit and to describe some of the research being pursued to understand materials interactions which are pervasive to projected structure fabrication. It is to be expected that the future will see a progression to nanostructures where scaling laws will be tested and quantum transport will become more in evidence, to low temperature operation for tighter control and improved performance, to complex vertical profiles where 3D stacking and superlattices will produce denser packing and device flexibility, to faster communication links with optoelectronics, and to compatible packaging technologies. New low temperature processing techniques, such as epitaxy of silicon, PECVD of dielectrics, low temperature high pressure oxidation, silicon-germanium heterostructures, etc., must be combined with shallow metallurgies, new lithographic technologies, maskless patterning, rapid thermal processing (RTP) to produce needed profile control, reduce process incompatibilities and develop new device geometries. Materials interactions are of special consequence for chip substrates and illustrations of work in metal-ceramic and metal-polymer adhesion will be offered.

  10. A Low-Cost Environmental Monitoring System: How to Prevent Systematic Errors in the Design Phase through the Combined Use of Additive Manufacturing and Thermographic Techniques

    PubMed Central

    Salamone, Francesco; Danza, Ludovico; Meroni, Italo; Pollastro, Maria Cristina

    2017-01-01

    nEMoS (nano Environmental Monitoring System) is a 3D-printed device built following the Do-It-Yourself (DIY) approach. It can be connected to the web and it can be used to assess indoor environmental quality (IEQ). It is built using some low-cost sensors connected to an Arduino microcontroller board. The device is assembled in a small-sized case and both thermohygrometric sensors used to measure the air temperature and relative humidity, and the globe thermometer used to measure the radiant temperature, can be subject to thermal effects due to overheating of some nearby components. A thermographic analysis was made to rule out this possibility. The paper shows how the pervasive technique of additive manufacturing can be combined with the more traditional thermographic techniques to redesign the case and to verify the accuracy of the optimized system in order to prevent instrumental systematic errors in terms of the difference between experimental and actual values of the above-mentioned environmental parameters. PMID:28398225

  11. Bridging the digital divide: mobile access to personal health records among patients with diabetes.

    PubMed

    Graetz, Ilana; Huang, Jie; Brand, Richard J; Hsu, John; Yamin, Cyrus K; Reed, Mary E

    2018-01-01

    Some patients lack regular computer access and experience a digital divide that causes them to miss internet-based health innovations. The diffusion of smartphones has increased internet access across the socioeconomic spectrum, and increasing the channels through which patients can access their personal health records (PHRs) could help bridge the divide in PHR use. We examined PHR use through a computer-based Web browser or mobile device. Cross-sectional historical cohort analysis. Among adult patients in the diabetes registry of an integrated healthcare delivery system, we studied the devices used to access their PHR during 2016. Among 267,208 patients with diabetes, 68.1% used the PHR in 2016; 60.6% of all log-ins were via computer and 39.4% were via mobile device. Overall, 63.9% used it from both a computer and mobile device, 29.6% used only a computer, and 6.5% used only a mobile device. After adjustment, patients who were black, Hispanic, or Asian; lived in lower socioeconomic status (SES) neighborhoods; or had lower engagement were all significantly more likely to use the PHR only from a mobile device (P <.05). Patients using the PHR only via mobile device used it less frequently. Mobile-ready PHRs may increase access among patients facing a digital divide in computer use, disproportionately reaching racial/ethnic minorities and lower SES patients. Nonetheless, even with a mobile-optimized and app-accessible PHR, differences in PHR use by race/ethnicity and SES remain. Continued efforts are needed to increase equitable access to PHRs among patients with chronic conditions.

  12. Controlling the Universe

    ERIC Educational Resources Information Center

    Evanson, Nick

    2004-01-01

    Basic electronic devices have been used to great effect with console computer games. This paper looks at a range of devices from the very simple, such as microswitches and potentiometers, up to the more complex Hall effect probe. There is a great deal of relatively straightforward use of simple devices in computer games systems, and having read…

  13. Xyce

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thomquist, Heidi K.; Fixel, Deborah A.; Fett, David Brian

    The Xyce Parallel Electronic Simulator simulates electronic circuit behavior in DC, AC, HB, MPDE and transient mode using standard analog (DAE) and/or device (PDE) device models including several age and radiation aware devices. It supports a variety of computing platforms (both serial and parallel) computers. Lastly, it uses a variety of modern solution algorithms dynamic parallel load-balancing and iterative solvers.

  14. 40 CFR 211.207 - Computation of the noise -reduction rating (NRR).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false Computation of the noise -reduction... (CONTINUED) NOISE ABATEMENT PROGRAMS PRODUCT NOISE LABELING Hearing Protective Devices § 211.207 Computation of the noise -reduction rating (NRR). Calculate the NRR for hearing protective devices by...

  15. Computer Augmented Learning; A Survey.

    ERIC Educational Resources Information Center

    Kindred, J.

    The report contains a description and summary of computer augmented learning devices and systems. The devices are of two general types programed instruction systems based on the teaching machines pioneered by Pressey and developed by Skinner, and the so-called "docile" systems that permit greater user-direction with the computer under student…

  16. Computer Output Microfilm and Library Catalogs.

    ERIC Educational Resources Information Center

    Meyer, Richard W.

    Early computers dealt with mathematical and scientific problems requiring very little input and not much output, therefore high speed printing devices were not required. Today with increased variety of use, high speed printing is necessary and Computer Output Microfilm (COM) devices have been created to meet this need. This indirect process can…

  17. Telecommunications Relay Service

    MedlinePlus

    ... used with an existing voice telephone and a computer or other Web-enabled device without requiring any ... based TRS call. The user may use a computer or other web-enabled device to communicate with ...

  18. The 'Biologically-Inspired Computing' Column

    NASA Technical Reports Server (NTRS)

    Hinchey, Mike

    2006-01-01

    The field of Biology changed dramatically in 1953, with the determination by Francis Crick and James Dewey Watson of the double helix structure of DNA. This discovery changed Biology for ever, allowing the sequencing of the human genome, and the emergence of a "new Biology" focused on DNA, genes, proteins, data, and search. Computational Biology and Bioinformatics heavily rely on computing to facilitate research into life and development. Simultaneously, an understanding of the biology of living organisms indicates a parallel with computing systems: molecules in living cells interact, grow, and transform according to the "program" dictated by DNA. Moreover, paradigms of Computing are emerging based on modelling and developing computer-based systems exploiting ideas that are observed in nature. This includes building into computer systems self-management and self-governance mechanisms that are inspired by the human body's autonomic nervous system, modelling evolutionary systems analogous to colonies of ants or other insects, and developing highly-efficient and highly-complex distributed systems from large numbers of (often quite simple) largely homogeneous components to reflect the behaviour of flocks of birds, swarms of bees, herds of animals, or schools of fish. This new field of "Biologically-Inspired Computing", often known in other incarnations by other names, such as: Autonomic Computing, Pervasive Computing, Organic Computing, Biomimetics, and Artificial Life, amongst others, is poised at the intersection of Computer Science, Engineering, Mathematics, and the Life Sciences. Successes have been reported in the fields of drug discovery, data communications, computer animation, control and command, exploration systems for space, undersea, and harsh environments, to name but a few, and augur much promise for future progress.

  19. Adolescent sleep patterns and night-time technology use: results of the Australian Broadcasting Corporation's Big Sleep Survey.

    PubMed

    Gamble, Amanda L; D'Rozario, Angela L; Bartlett, Delwyn J; Williams, Shaun; Bin, Yu Sun; Grunstein, Ronald R; Marshall, Nathaniel S

    2014-01-01

    Electronic devices in the bedroom are broadly linked with poor sleep in adolescents. This study investigated whether there is a dose-response relationship between use of electronic devices (computers, cellphones, televisions and radios) in bed prior to sleep and adolescent sleep patterns. Adolescents aged 11-17 yrs (n = 1,184; 67.6% female) completed an Australia-wide internet survey that examined sleep patterns, sleepiness, sleep disorders, the presence of electronic devices in the bedroom and frequency of use in bed at night. Over 70% of adolescents reported 2 or more electronic devices in their bedroom at night. Use of devices in bed a few nights per week or more was 46.8% cellphone, 38.5% computer, 23.2% TV, and 15.8% radio. Device use had dose-dependent associations with later sleep onset on weekdays (highest-dose computer adjOR  = 3.75: 99% CI  = 2.17-6.46; cellphone 2.29: 1.22-4.30) and weekends (computer 3.68: 2.14-6.32; cellphone 3.24: 1.70-6.19; TV 2.32: 1.30-4.14), and later waking on weekdays (computer 2.08: 1.25-3.44; TV 2.31: 1.33-4.02) and weekends (computer 1.99: 1.21-3.26; cellphone 2.33: 1.33-4.08; TV 2.04: 1.18-3.55). Only 'almost every night' computer use (: 2.43: 1.45-4.08) was associated with short weekday sleep duration, and only 'almost every night' cellphone use (2.23: 1.26-3.94) was associated with wake lag (waking later on weekends). Use of computers, cell-phones and televisions at higher doses was associated with delayed sleep/wake schedules and wake lag, potentially impairing health and educational outcomes.

  20. Hadoop-MCC: Efficient Multiple Compound Comparison Algorithm Using Hadoop.

    PubMed

    Hua, Guan-Jie; Hung, Che-Lun; Tang, Chuan Yi

    2018-01-01

    In the past decade, the drug design technologies have been improved enormously. The computer-aided drug design (CADD) has played an important role in analysis and prediction in drug development, which makes the procedure more economical and efficient. However, computation with big data, such as ZINC containing more than 60 million compounds data and GDB-13 with more than 930 million small molecules, is a noticeable issue of time-consuming problem. Therefore, we propose a novel heterogeneous high performance computing method, named as Hadoop-MCC, integrating Hadoop and GPU, to copy with big chemical structure data efficiently. Hadoop-MCC gains the high availability and fault tolerance from Hadoop, as Hadoop is used to scatter input data to GPU devices and gather the results from GPU devices. Hadoop framework adopts mapper/reducer computation model. In the proposed method, mappers response for fetching SMILES data segments and perform LINGO method on GPU, then reducers collect all comparison results produced by mappers. Due to the high availability of Hadoop, all of LINGO computational jobs on mappers can be completed, even if some of the mappers encounter problems. A comparison of LINGO is performed on each the GPU device in parallel. According to the experimental results, the proposed method on multiple GPU devices can achieve better computational performance than the CUDA-MCC on a single GPU device. Hadoop-MCC is able to achieve scalability, high availability, and fault tolerance granted by Hadoop, and high performance as well by integrating computational power of both of Hadoop and GPU. It has been shown that using the heterogeneous architecture as Hadoop-MCC effectively can enhance better computational performance than on a single GPU device. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  1. 76 FR 45860 - In the Matter of Certain Electronic Devices, Including Wireless Communication Devices, Portable...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-01

    ..., Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... electronic devices, including wireless communication devices, portable music and data processing devices, and... electronic devices, including wireless communication devices, portable music and data processing devices, and...

  2. Pervasive Sensing: Addressing the Heterogeneity Problem

    NASA Astrophysics Data System (ADS)

    O'Grady, Michael J.; Murdoch, Olga; Kroon, Barnard; Lillis, David; Carr, Dominic; Collier, Rem W.; O'Hare, Gregory M. P.

    2013-06-01

    Pervasive sensing is characterized by heterogeneity across a number of dimensions. This raises significant problems for those designing, implementing and deploying sensor networks, irrespective of application domain. Such problems include for example, issues of data provenance and integrity, security, and privacy amongst others. Thus engineering a network that is fit-for-purpose represents a significant challenge. In this paper, the issue of heterogeneity is explored from the perspective of those who seek to harness a pervasive sensing element in their applications. A initial solution is proposed based on the middleware construct.

  3. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  4. A serial digital data communications device. [for real time flight simulation

    NASA Technical Reports Server (NTRS)

    Fetter, J. L.

    1977-01-01

    A general purpose computer peripheral device which is used to provide a full-duplex, serial, digital data transmission link between a Xerox Sigma computer and a wide variety of external equipment, including computers, terminals, and special purpose devices is reported. The interface has an extensive set of user defined options to assist the user in establishing the necessary data links. This report describes those options and other features of the serial communications interface and its performance by discussing its application to a particular problem.

  5. Virtual Reality and Computer-Enhanced Training Devices Equally Improve Laparoscopic Surgical Skill in Novices

    PubMed Central

    Kanumuri, Prathima; Ganai, Sabha; Wohaibi, Eyad M.; Bush, Ronald W.; Grow, Daniel R.

    2008-01-01

    Background: The study aim was to compare the effectiveness of virtual reality and computer-enhanced video-scopic training devices for training novice surgeons in complex laparoscopic skills. Methods: Third-year medical students received instruction on laparoscopic intracorporeal suturing and knot tying and then underwent a pretraining assessment of the task using a live porcine model. Students were then randomized to objectives-based training on either the virtual reality (n=8) or computer-enhanced (n=8) training devices for 4 weeks, after which the assessment was repeated. Results: Posttraining performance had improved compared with pretraining performance in both task completion rate (94% versus 18%; P<0.001*) and time [181±58 (SD) versus 292±24*]. Performance of the 2 groups was comparable before and after training. Of the subjects, 88% thought that haptic cues were important in simulators. Both groups agreed that their respective training systems were effective teaching tools, but computer-enhanced device trainees were more likely to rate their training as representative of reality (P<0.01). Conclusions: Training on virtual reality and computer-enhanced devices had equivalent effects on skills improvement in novices. Despite the perception that haptic feedback is important in laparoscopic simulation training, its absence in the virtual reality device did not impede acquisition of skill. PMID:18765042

  6. Doctors' experience with handheld computers in clinical practice: qualitative study.

    PubMed

    McAlearney, Ann Scheck; Schweikhart, Sharon B; Medow, Mitchell A

    2004-05-15

    To examine doctors' perspectives about their experiences with handheld computers in clinical practice. Qualitative study of eight focus groups consisting of doctors with diverse training and practice patterns. Six practice settings across the United States and two additional focus group sessions held at a national meeting of general internists. 54 doctors who did or did not use handheld computers. Doctors who used handheld computers in clinical practice seemed generally satisfied with them and reported diverse patterns of use. Users perceived that the devices helped them increase productivity and improve patient care. Barriers to use concerned the device itself and personal and perceptual constraints, with perceptual factors such as comfort with technology, preference for paper, and the impression that the devices are not easy to use somewhat difficult to overcome. Participants suggested that organisations can help promote handheld computers by providing advice on purchase, usage, training, and user support. Participants expressed concern about reliability and security of the device but were particularly concerned about dependency on the device and over-reliance as a substitute for clinical thinking. Doctors expect handheld computers to become more useful, and most seem interested in leveraging (getting the most value from) their use. Key opportunities with handheld computers included their use as a stepping stone to build doctors' comfort with other information technology and ehealth initiatives and providing point of care support that helps improve patient care.

  7. Quantum computing: a prime modality in neurosurgery's future.

    PubMed

    Lee, Brian; Liu, Charles Y; Apuzzo, Michael L J

    2012-11-01

    With each significant development in the field of neurosurgery, our dependence on computers, small and large, has continuously increased. From something as mundane as bipolar cautery to sophisticated intraoperative navigation with real-time magnetic resonance imaging-assisted surgical guidance, both technologies, however simple or complex, require computational processing power to function. The next frontier for neurosurgery involves developing a greater understanding of the brain and furthering our capabilities as surgeons to directly affect brain circuitry and function. This has come in the form of implantable devices that can electronically and nondestructively influence the cortex and nuclei with the purpose of restoring neuronal function and improving quality of life. We are now transitioning from devices that are turned on and left alone, such as vagus nerve stimulators and deep brain stimulators, to "smart" devices that can listen and react to the body as the situation may dictate. The development of quantum computers and their potential to be thousands, if not millions, of times faster than current "classical" computers, will significantly affect the neurosciences, especially the field of neurorehabilitation and neuromodulation. Quantum computers may advance our understanding of the neural code and, in turn, better develop and program implantable neural devices. When quantum computers reach the point where we can actually implant such devices in patients, the possibilities of what can be done to interface and restore neural function will be limitless. Copyright © 2012 Elsevier Inc. All rights reserved.

  8. Sixth SIAM conference on applied linear algebra: Final program and abstracts. Final technical report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1997-12-31

    Linear algebra plays a central role in mathematics and applications. The analysis and solution of problems from an amazingly wide variety of disciplines depend on the theory and computational techniques of linear algebra. In turn, the diversity of disciplines depending on linear algebra also serves to focus and shape its development. Some problems have special properties (numerical, structural) that can be exploited. Some are simply so large that conventional approaches are impractical. New computer architectures motivate new algorithms, and fresh ways to look at old ones. The pervasive nature of linear algebra in analyzing and solving problems means that peoplemore » from a wide spectrum--universities, industrial and government laboratories, financial institutions, and many others--share an interest in current developments in linear algebra. This conference aims to bring them together for their mutual benefit. Abstracts of papers presented are included.« less

  9. Permanency analysis on human electroencephalogram signals for pervasive Brain-Computer Interface systems.

    PubMed

    Sadeghi, Koosha; Junghyo Lee; Banerjee, Ayan; Sohankar, Javad; Gupta, Sandeep K S

    2017-07-01

    Brain-Computer Interface (BCI) systems use some permanent features of brain signals to recognize their corresponding cognitive states with high accuracy. However, these features are not perfectly permanent, and BCI system should be continuously trained over time, which is tedious and time consuming. Thus, analyzing the permanency of signal features is essential in determining how often to repeat training. In this paper, we monitor electroencephalogram (EEG) signals, and analyze their behavior through continuous and relatively long period of time. In our experiment, we record EEG signals corresponding to rest state (eyes open and closed) from one subject everyday, for three and a half months. The results show that signal features such as auto-regression coefficients remain permanent through time, while others such as power spectral density specifically in 5-7 Hz frequency band are not permanent. In addition, eyes open EEG data shows more permanency than eyes closed data.

  10. Radiology: "killer app" for next generation networks?

    PubMed

    McNeill, Kevin M

    2004-03-01

    The core principles of digital radiology were well developed by the end of the 1980 s. During the following decade tremendous improvements in computer technology enabled realization of those principles at an affordable cost. In this decade work can focus on highly distributed radiology in the context of the integrated health care enterprise. Over the same period computer networking has evolved from a relatively obscure field used by a small number of researchers across low-speed serial links to a pervasive technology that affects nearly all facets of society. Development directions in network technology will ultimately provide end-to-end data paths with speeds that match or exceed the speeds of data paths within the local network and even within workstations. This article describes key developments in Next Generation Networks, potential obstacles, and scenarios in which digital radiology can become a "killer app" that helps to drive deployment of new network infrastructure.

  11. Dynamic detection of window starting positions and its implementation within an activity recognition framework.

    PubMed

    Ni, Qin; Patterson, Timothy; Cleland, Ian; Nugent, Chris

    2016-08-01

    Activity recognition is an intrinsic component of many pervasive computing and ambient intelligent solutions. This has been facilitated by an explosion of technological developments in the area of wireless sensor network, wearable and mobile computing. Yet, delivering robust activity recognition, which could be deployed at scale in a real world environment, still remains an active research challenge. Much of the existing literature to date has focused on applying machine learning techniques to pre-segmented data collected in controlled laboratory environments. Whilst this approach can provide valuable ground truth information from which to build recognition models, these techniques often do not function well when implemented in near real time applications. This paper presents the application of a multivariate online change detection algorithm to dynamically detect the starting position of windows for the purposes of activity recognition. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. Hybrid expert system for decision supporting in the medical area: complexity and cognitive computing.

    PubMed

    Brasil, L M; de Azevedo, F M; Barreto, J M

    2001-09-01

    This paper proposes a hybrid expert system (HES) to minimise some complexity problems pervasive to the artificial intelligence such as: the knowledge elicitation process, known as the bottleneck of expert systems; the model choice for knowledge representation to code human reasoning; the number of neurons in the hidden layer and the topology used in the connectionist approach; the difficulty to obtain the explanation on how the network arrived to a conclusion. Two algorithms applied to developing of HES are also suggested. One of them is used to train the fuzzy neural network and the other to obtain explanations on how the fuzzy neural network attained a conclusion. To overcome these difficulties the cognitive computing was integrated to the developed system. A case study is presented (e.g. epileptic crisis) with the problem definition and simulations. Results are also discussed.

  13. [Animal experimentation, computer simulation and surgical research].

    PubMed

    Carpentier, Alain

    2009-11-01

    We live in a digital world In medicine, computers are providing new tools for data collection, imaging, and treatment. During research and development of complex technologies and devices such as artificial hearts, computer simulation can provide more reliable information than experimentation on large animals. In these specific settings, animal experimentation should serve more to validate computer models of complex devices than to demonstrate their reliability.

  14. Signal and noise extraction from analog memory elements for neuromorphic computing.

    PubMed

    Gong, N; Idé, T; Kim, S; Boybat, I; Sebastian, A; Narayanan, V; Ando, T

    2018-05-29

    Dense crossbar arrays of non-volatile memory (NVM) can potentially enable massively parallel and highly energy-efficient neuromorphic computing systems. The key requirements for the NVM elements are continuous (analog-like) conductance tuning capability and switching symmetry with acceptable noise levels. However, most NVM devices show non-linear and asymmetric switching behaviors. Such non-linear behaviors render separation of signal and noise extremely difficult with conventional characterization techniques. In this study, we establish a practical methodology based on Gaussian process regression to address this issue. The methodology is agnostic to switching mechanisms and applicable to various NVM devices. We show tradeoff between switching symmetry and signal-to-noise ratio for HfO 2 -based resistive random access memory. Then, we characterize 1000 phase-change memory devices based on Ge 2 Sb 2 Te 5 and separate total variability into device-to-device variability and inherent randomness from individual devices. These results highlight the usefulness of our methodology to realize ideal NVM devices for neuromorphic computing.

  15. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns.

    PubMed

    Paik, Soo-Hyun; Cho, Hyun; Chun, Ji-Won; Jeong, Jo-Eun; Kim, Dai-Jin

    2017-12-05

    Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD). Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1) individuals who played only computer games; (2) individuals who played computer games more than smartphone games; (3) individuals who played computer and smartphone games evenly; (4) individuals who played smartphone games more than computer games; (5) individuals who played only smartphone games. Data on demographics, gaming-related behaviors, and scales for Internet and smartphone addiction, depression, anxiety disorder, and substance use were collected. Combined users, especially those who played computer and smartphone games evenly, had higher prevalence of IGD, depression, anxiety disorder, and substance use disorder. These subjects were more prone to develop IGD than reference group (computer only gamers) (B = 0.457, odds ratio = 1.579). Smartphone only gamers had the lowest prevalence of IGD, spent the least time and money on gaming, and showed lowest scores of Internet and smartphone addiction. Our findings suggest that gaming device usage patterns may be associated with the occurrence, course, and prognosis of IGD.

  16. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns

    PubMed Central

    Cho, Hyun; Chun, Ji-Won; Jeong, Jo-Eun; Kim, Dai-Jin

    2017-01-01

    Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD). Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1) individuals who played only computer games; (2) individuals who played computer games more than smartphone games; (3) individuals who played computer and smartphone games evenly; (4) individuals who played smartphone games more than computer games; (5) individuals who played only smartphone games. Data on demographics, gaming-related behaviors, and scales for Internet and smartphone addiction, depression, anxiety disorder, and substance use were collected. Combined users, especially those who played computer and smartphone games evenly, had higher prevalence of IGD, depression, anxiety disorder, and substance use disorder. These subjects were more prone to develop IGD than reference group (computer only gamers) (B = 0.457, odds ratio = 1.579). Smartphone only gamers had the lowest prevalence of IGD, spent the least time and money on gaming, and showed lowest scores of Internet and smartphone addiction. Our findings suggest that gaming device usage patterns may be associated with the occurrence, course, and prognosis of IGD. PMID:29206183

  17. A five-layer users' need hierarchy of computer input device selection: a contextual observation survey of computer users with cervical spinal injuries (CSI).

    PubMed

    Tsai, Tsai-Hsuan; Nash, Robert J; Tseng, Kevin C

    2009-05-01

    This article presents how the researcher goes about answering the research question, 'how assistive technology impacts computer use among individuals with cervical spinal cord injury?' through an in-depth investigation into the real-life situations among computer operators with cervical spinal cord injuries (CSI). An in-depth survey was carried out to provide an insight into the function abilities and limitation, habitual practice and preference, choices and utilisation of input devices, personal and/or technical assistance, environmental set-up and arrangements and special requirements among 20 experienced computer users with cervical spinal cord injuries. Following the survey findings, a five-layer CSI users' needs hierarchy of input device selection and use was proposed. These needs were ranked in order: beginning with the most basic criterion at the bottom of the pyramid; lower-level criteria must be met before one moves onto the higher level. The users' needs hierarchy for CSI computer users, which had not been applied by previous research work and which has established a rationale for the development of alternative input devices. If an input device achieves the criteria set up in the needs hierarchy, then a good match of person and technology will be achieved.

  18. Value of wireless personal digital assistants for practice: perceptions of advanced practice nurses.

    PubMed

    Garrett, Bernard; Klein, Gerri

    2008-08-01

    The aims were to explore advanced practice nurses' perceptions on wireless Personal Digital Assistant technologies, to establish the type and range of tools that would be useful to support their practice and to identify any requirements and limitations that may impact the implementation of wireless Personal Digital Assistants in practice. The wireless Personal Digital Assistant is becoming established as a hand-held computing tool for healthcare professionals. The reflections of advanced practice nurses' about the value of wireless Personal Digital Assistants and its potential to contribute to improved patient care has not been investigated. A qualitative interpretivist design was used to explore advanced practice nurses' perceptions on the value of wireless Personal Digital Assistant technologies to support their practice. The data were collected using survey questionnaires and individual and focus group interviews with nurse practitioners, clinical nurse specialists and information technology managers based in British Columbia, Canada. An open-coding content analysis was performed using qualitative data analysis software. Wireless Personal Digital Assistant's use supports the principles of pervasivity and is a technology rapidly being adopted by advanced practice nurses. Some nurses indicated a reluctance to integrate wireless Personal Digital Assistant technologies into their practices because of the cost and the short technological life cycle of these devices. Many of the barriers which precluded the use of wireless networks within facilities are being removed. Nurses demonstrated a complex understanding of wireless Personal Digital Assistant technologies and gave good rationales for its integration in their practice. Nurses identified improved client care as the major benefit of this technology in practice and the type and range of tools they identified included clinical reference tools such as drug and diagnostic/laboratory reference applications and wireless communications. Nurses in this study support integrating wireless mobile computing technologies into their practice to improve client care.

  19. Discrete Thermodynamics

    DOE PAGES

    Margolin, L. G.; Hunter, A.

    2017-10-18

    Here, we consider the dependence of velocity probability distribution functions on the finite size of a thermodynamic system. We are motivated by applications to computational fluid dynamics, hence discrete thermodynamics. We then begin by describing a coarsening process that represents geometric renormalization. Then, based only on the requirements of conservation, we demonstrate that the pervasive assumption of local thermodynamic equilibrium is not form invariant. We develop a perturbative correction that restores form invariance to second-order in a small parameter associated with macroscopic gradients. Finally, we interpret the corrections in terms of unresolved kinetic energy and discuss the implications of ourmore » results both in theory and as applied to numerical simulation.« less

  20. Discrete Thermodynamics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Margolin, L. G.; Hunter, A.

    Here, we consider the dependence of velocity probability distribution functions on the finite size of a thermodynamic system. We are motivated by applications to computational fluid dynamics, hence discrete thermodynamics. We then begin by describing a coarsening process that represents geometric renormalization. Then, based only on the requirements of conservation, we demonstrate that the pervasive assumption of local thermodynamic equilibrium is not form invariant. We develop a perturbative correction that restores form invariance to second-order in a small parameter associated with macroscopic gradients. Finally, we interpret the corrections in terms of unresolved kinetic energy and discuss the implications of ourmore » results both in theory and as applied to numerical simulation.« less

  1. Dependence in probabilistic modeling Dempster-Shafer theory and probability bounds analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ferson, Scott; Nelsen, Roger B.; Hajagos, Janos

    2015-05-01

    This report summarizes methods to incorporate information (or lack of information) about inter-variable dependence into risk assessments that use Dempster-Shafer theory or probability bounds analysis to address epistemic and aleatory uncertainty. The report reviews techniques for simulating correlated variates for a given correlation measure and dependence model, computation of bounds on distribution functions under a specified dependence model, formulation of parametric and empirical dependence models, and bounding approaches that can be used when information about the intervariable dependence is incomplete. The report also reviews several of the most pervasive and dangerous myths among risk analysts about dependence in probabilistic models.

  2. HERA: A New Platform for Embedding Agents in Heterogeneous Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Alonso, Ricardo S.; de Paz, Juan F.; García, Óscar; Gil, Óscar; González, Angélica

    Ambient Intelligence (AmI) based systems require the development of innovative solutions that integrate distributed intelligent systems with context-aware technologies. In this sense, Multi-Agent Systems (MAS) and Wireless Sensor Networks (WSN) are two key technologies for developing distributed systems based on AmI scenarios. This paper presents the new HERA (Hardware-Embedded Reactive Agents) platform, that allows using dynamic and self-adaptable heterogeneous WSNs on which agents are directly embedded on the wireless nodes This approach facilitates the inclusion of context-aware capabilities in AmI systems to gather data from their surrounding environments, achieving a higher level of ubiquitous and pervasive computing.

  3. Possible 6-qubit NMR quantum computer device material; simulator of the NMR line width

    NASA Astrophysics Data System (ADS)

    Hashi, K.; Kitazawa, H.; Shimizu, T.; Goto, A.; Eguchi, S.; Ohki, S.

    2002-12-01

    For an NMR quantum computer, splitting of an NMR spectrum must be larger than a line width. In order to find a best device material for a solid-state NMR quantum computer, we have made a simulation program to calculate the NMR line width due to the nuclear dipole field by the 2nd moment method. The program utilizes the lattice information prepared by commercial software to draw a crystal structure. By applying this program, we can estimate the NMR line width due to the nuclear dipole field without measurements and find a candidate material for a 6-qubit solid-state NMR quantum computer device.

  4. Computational performance of a smoothed particle hydrodynamics simulation for shared-memory parallel computing

    NASA Astrophysics Data System (ADS)

    Nishiura, Daisuke; Furuichi, Mikito; Sakaguchi, Hide

    2015-09-01

    The computational performance of a smoothed particle hydrodynamics (SPH) simulation is investigated for three types of current shared-memory parallel computer devices: many integrated core (MIC) processors, graphics processing units (GPUs), and multi-core CPUs. We are especially interested in efficient shared-memory allocation methods for each chipset, because the efficient data access patterns differ between compute unified device architecture (CUDA) programming for GPUs and OpenMP programming for MIC processors and multi-core CPUs. We first introduce several parallel implementation techniques for the SPH code, and then examine these on our target computer architectures to determine the most effective algorithms for each processor unit. In addition, we evaluate the effective computing performance and power efficiency of the SPH simulation on each architecture, as these are critical metrics for overall performance in a multi-device environment. In our benchmark test, the GPU is found to produce the best arithmetic performance as a standalone device unit, and gives the most efficient power consumption. The multi-core CPU obtains the most effective computing performance. The computational speed of the MIC processor on Xeon Phi approached that of two Xeon CPUs. This indicates that using MICs is an attractive choice for existing SPH codes on multi-core CPUs parallelized by OpenMP, as it gains computational acceleration without the need for significant changes to the source code.

  5. Spintronic logic: from switching devices to computing systems

    NASA Astrophysics Data System (ADS)

    Friedman, Joseph S.

    2017-09-01

    Though numerous spintronic switching devices have been proposed or demonstrated, there has been significant difficulty in translating these advances into practical computing systems. The challenge of cascading has impeded the integration of multiple devices into a logic family, and several proposed solutions potentially overcome these challenges. Here, the cascading techniques by which the output of each spintronic device can drive the input of another device are described for several logic families, including spin-diode logic (in particular, all-carbon spin logic), complementary magnetic tunnel junction logic (CMAT), and emitter-coupled spin-transistor logic (ECSTL).

  6. What Are Some Types of Assistive Devices and How Are They Used?

    MedlinePlus

    ... in persons with hearing problems. Cognitive assistance, including computer or electrical assistive devices, can help people function following brain injury. Computer software and hardware, such as voice recognition programs, ...

  7. Could the heat sink effect of blood flow inside large vessels protect the vessel wall from thermal damage during RF-assisted surgical resection?

    PubMed

    González-Suárez, Ana; Trujillo, Macarena; Burdío, Fernando; Andaluz, Anna; Berjano, Enrique

    2014-08-01

    To assess by means of computer simulations whether the heat sink effect inside a large vessel (portal vein) could protect the vessel wall from thermal damage close to an internally cooled electrode during radiofrequency (RF)-assisted resection. First,in vivo experiments were conducted to validate the computational model by comparing the experimental and computational thermal lesion shapes created around the vessels. Computer simulations were then carried out to study the effect of different factors such as device-tissue contact, vessel position, and vessel-device distance on temperature distributions and thermal lesion shapes near a large vessel, specifically the portal vein. The geometries of thermal lesions around the vessels in the in vivo experiments were in agreement with the computer results. The thermal lesion shape created around the portal vein was significantly modified by the heat sink effect in all the cases considered. Thermal damage to the portal vein wall was inversely related to the vessel-device distance. It was also more pronounced when the device-tissue contact surface was reduced or when the vessel was parallel to the device or perpendicular to its distal end (blade zone), the vessel wall being damaged at distances less than 4.25 mm. The computational findings suggest that the heat sink effect could protect the portal vein wall for distances equal to or greater than 5 mm, regardless of its position and distance with respect to the RF-based device.

  8. 75 FR 17434 - In the Matter of Certain Personal Data and Mobile Communications Devices and Related Software...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-06

    ... Mobile Communications Devices and Related Software; Notice of Investigation AGENCY: U.S. International... Apple Computer, Inc. of Cupertino, California and NeXT Software, Inc. f/k/a NeXT Computer, Inc. of... certain personal data and mobile communications devices and related software by reason of infringement of...

  9. Touch in Computer-Mediated Environments: An Analysis of Online Shoppers' Touch-Interface User Experiences

    ERIC Educational Resources Information Center

    Chung, Sorim

    2016-01-01

    Over the past few years, one of the most fundamental changes in current computer-mediated environments has been input devices, moving from mouse devices to touch interfaces. However, most studies of online retailing have not considered device environments as retail cues that could influence users' shopping behavior. In this research, I examine the…

  10. 75 FR 4583 - In the Matter of: Certain Electronic Devices, Including Mobile Phones, Portable Music Players...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-28

    ..., Including Mobile Phones, Portable Music Players, and Computers; Notice of Investigation AGENCY: U.S... music players, and computers, by reason of infringement of certain claims of U.S. Patent Nos. 6,714,091... importation of certain electronic devices, including mobile phones, portable music players, or computers that...

  11. Spike-Timing Dependent Plasticity in Unipolar Silicon Oxide RRAM Devices

    PubMed Central

    Zarudnyi, Konstantin; Mehonic, Adnan; Montesi, Luca; Buckwell, Mark; Hudziak, Stephen; Kenyon, Anthony J.

    2018-01-01

    Resistance switching, or Resistive RAM (RRAM) devices show considerable potential for application in hardware spiking neural networks (neuro-inspired computing) by mimicking some of the behavior of biological synapses, and hence enabling non-von Neumann computer architectures. Spike-timing dependent plasticity (STDP) is one such behavior, and one example of several classes of plasticity that are being examined with the aim of finding suitable algorithms for application in many computing tasks such as coincidence detection, classification and image recognition. In previous work we have demonstrated that the neuromorphic capabilities of silicon-rich silicon oxide (SiOx) resistance switching devices extend beyond plasticity to include thresholding, spiking, and integration. We previously demonstrated such behaviors in devices operated in the unipolar mode, opening up the question of whether we could add plasticity to the list of features exhibited by our devices. Here we demonstrate clear STDP in unipolar devices. Significantly, we show that the response of our devices is broadly similar to that of biological synapses. This work further reinforces the potential of simple two-terminal RRAM devices to mimic neuronal functionality in hardware spiking neural networks. PMID:29472837

  12. Eye-gaze and intent: Application in 3D interface control

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schryver, J.C.; Goldberg, J.H.

    1993-06-01

    Computer interface control is typically accomplished with an input ``device`` such as keyboard, mouse, trackball, etc. An input device translates a users input actions, such as mouse clicks and key presses, into appropriate computer commands. To control the interface, the user must first convert intent into the syntax of the input device. A more natural means of computer control is possible when the computer can directly infer user intent, without need of intervening input devices. We describe an application of eye-gaze-contingent control of an interactive three-dimensional (3D) user interface. A salient feature of the user interface is natural input, withmore » a heightened impression of controlling the computer directly by the mind. With this interface, input of rotation and translation are intuitive, whereas other abstract features, such as zoom, are more problematic to match with user intent. This paper describes successes with implementation to date, and ongoing efforts to develop a more sophisticated intent inferencing methodology.« less

  13. Eye-gaze and intent: Application in 3D interface control

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schryver, J.C.; Goldberg, J.H.

    1993-01-01

    Computer interface control is typically accomplished with an input device'' such as keyboard, mouse, trackball, etc. An input device translates a users input actions, such as mouse clicks and key presses, into appropriate computer commands. To control the interface, the user must first convert intent into the syntax of the input device. A more natural means of computer control is possible when the computer can directly infer user intent, without need of intervening input devices. We describe an application of eye-gaze-contingent control of an interactive three-dimensional (3D) user interface. A salient feature of the user interface is natural input, withmore » a heightened impression of controlling the computer directly by the mind. With this interface, input of rotation and translation are intuitive, whereas other abstract features, such as zoom, are more problematic to match with user intent. This paper describes successes with implementation to date, and ongoing efforts to develop a more sophisticated intent inferencing methodology.« less

  14. Flow Ambiguity: A Path Towards Classically Driven Blind Quantum Computation

    NASA Astrophysics Data System (ADS)

    Mantri, Atul; Demarie, Tommaso F.; Menicucci, Nicolas C.; Fitzsimons, Joseph F.

    2017-07-01

    Blind quantum computation protocols allow a user to delegate a computation to a remote quantum computer in such a way that the privacy of their computation is preserved, even from the device implementing the computation. To date, such protocols are only known for settings involving at least two quantum devices: either a user with some quantum capabilities and a remote quantum server or two or more entangled but noncommunicating servers. In this work, we take the first step towards the construction of a blind quantum computing protocol with a completely classical client and single quantum server. Specifically, we show how a classical client can exploit the ambiguity in the flow of information in measurement-based quantum computing to construct a protocol for hiding critical aspects of a computation delegated to a remote quantum computer. This ambiguity arises due to the fact that, for a fixed graph, there exist multiple choices of the input and output vertex sets that result in deterministic measurement patterns consistent with the same fixed total ordering of vertices. This allows a classical user, computing only measurement angles, to drive a measurement-based computation performed on a remote device while hiding critical aspects of the computation.

  15. 78 FR 16865 - Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-19

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-794] Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... certain electronic devices, including wireless communication devices, portable music and data processing...

  16. Computer vision camera with embedded FPGA processing

    NASA Astrophysics Data System (ADS)

    Lecerf, Antoine; Ouellet, Denis; Arias-Estrada, Miguel

    2000-03-01

    Traditional computer vision is based on a camera-computer system in which the image understanding algorithms are embedded in the computer. To circumvent the computational load of vision algorithms, low-level processing and imaging hardware can be integrated in a single compact module where a dedicated architecture is implemented. This paper presents a Computer Vision Camera based on an open architecture implemented in an FPGA. The system is targeted to real-time computer vision tasks where low level processing and feature extraction tasks can be implemented in the FPGA device. The camera integrates a CMOS image sensor, an FPGA device, two memory banks, and an embedded PC for communication and control tasks. The FPGA device is a medium size one equivalent to 25,000 logic gates. The device is connected to two high speed memory banks, an IS interface, and an imager interface. The camera can be accessed for architecture programming, data transfer, and control through an Ethernet link from a remote computer. A hardware architecture can be defined in a Hardware Description Language (like VHDL), simulated and synthesized into digital structures that can be programmed into the FPGA and tested on the camera. The architecture of a classical multi-scale edge detection algorithm based on a Laplacian of Gaussian convolution has been developed to show the capabilities of the system.

  17. Realization of the FPGA-based reconfigurable computing environment by the example of morphological processing of a grayscale image

    NASA Astrophysics Data System (ADS)

    Shatravin, V.; Shashev, D. V.

    2018-05-01

    Currently, robots are increasingly being used in every industry. One of the most high-tech areas is creation of completely autonomous robotic devices including vehicles. The results of various global research prove the efficiency of vision systems in autonomous robotic devices. However, the use of these systems is limited because of the computational and energy resources available in the robot device. The paper describes the results of applying the original approach for image processing on reconfigurable computing environments by the example of morphological operations over grayscale images. This approach is prospective for realizing complex image processing algorithms and real-time image analysis in autonomous robotic devices.

  18. Evaluating Imaging and Computer-aided Detection and Diagnosis Devices at the FDA

    PubMed Central

    Gallas, Brandon D.; Chan, Heang-Ping; D’Orsi, Carl J.; Dodd, Lori E.; Giger, Maryellen L.; Gur, David; Krupinski, Elizabeth A.; Metz, Charles E.; Myers, Kyle J.; Obuchowski, Nancy A.; Sahiner, Berkman; Toledano, Alicia Y.; Zuley, Margarita L.

    2017-01-01

    This report summarizes the Joint FDA-MIPS Workshop on Methods for the Evaluation of Imaging and Computer-Assist Devices. The purpose of the workshop was to gather information on the current state of the science and facilitate consensus development on statistical methods and study designs for the evaluation of imaging devices to support US Food and Drug Administration submissions. Additionally, participants expected to identify gaps in knowledge and unmet needs that should be addressed in future research. This summary is intended to document the topics that were discussed at the meeting and disseminate the lessons that have been learned through past studies of imaging and computer-aided detection and diagnosis device performance. PMID:22306064

  19. Memory device for two-dimensional radiant energy array computers

    NASA Technical Reports Server (NTRS)

    Schaefer, D. H.; Strong, J. P., III (Inventor)

    1977-01-01

    A memory device for two dimensional radiant energy array computers was developed, in which the memory device stores digital information in an input array of radiant energy digital signals that are characterized by ordered rows and columns. The memory device contains a radiant energy logic storing device having a pair of input surface locations for receiving a pair of separate radiant energy digital signal arrays and an output surface location adapted to transmit a radiant energy digital signal array. A regenerative feedback device that couples one of the input surface locations to the output surface location in a manner for causing regenerative feedback is also included

  20. The internet of things for personalized health.

    PubMed

    Schreier, Günter

    2014-01-01

    Advances in information and communications technologies (ICT) enable new personalized health care concepts which are often characterized by four "P" terms, i.e. personalized, predictive, preventive and participatory. However, real world implementations of the complete 4P spectrum hardly exist today. The Internet of Things (IoT) has been defined as an extension to the current Internet that enables pervasive communication between the physical and the virtual world. Smart devices and enabling elements like Near Field Communication (NFC) and Radio Frequency Identification (RFID) technology already exist and increasingly will be a mainstream element of our lives. This future vision paper attempts to assess if and how the Internet of Things for personalized health (IoT4pH) can help to facilitate the 4P healthcare paradigm and discusses related challenges and opportunities.

Top