Sample records for pervasive computing electronic

  1. Simple video format for mobile applications

    NASA Astrophysics Data System (ADS)

    Smith, John R.; Miao, Zhourong; Li, Chung-Sheng

    2000-04-01

    With the advent of pervasive computing, there is a growing demand for enabling multimedia applications on mobile devices. Large numbers of pervasive computing devices, such as personal digital assistants (PDAs), hand-held computer (HHC), smart phones, portable audio players, automotive computing devices, and wearable computers are gaining access to online information sources. However, the pervasive computing devices are often constrained along a number of dimensions, such as processing power, local storage, display size and depth, connectivity, and communication bandwidth, which makes it difficult to access rich image and video content. In this paper, we report on our initial efforts in designing a simple scalable video format with low-decoding and transcoding complexity for pervasive computing. The goal is to enable image and video access for mobile applications such as electronic catalog shopping, video conferencing, remote surveillance and video mail using pervasive computing devices.

  2. The Implications of Pervasive Computing on Network Design

    NASA Astrophysics Data System (ADS)

    Briscoe, R.

    Mark Weiser's late-1980s vision of an age of calm technology with pervasive computing disappearing into the fabric of the world [1] has been tempered by an industry-driven vision with more of a feel of conspicuous consumption. In the modified version, everyone carries around consumer electronics to provide natural, seamless interactions both with other people and with the information world, particularly for eCommerce, but still through a pervasive computing fabric.

  3. The Pervasiveness and Impact of Electronic Communication Technologies in Organizations: A Survey of Major American Corporations.

    ERIC Educational Resources Information Center

    Hellweg, Susan A.; And Others

    A survey of the Fortune 500 corporations was conducted to ascertain the pervasiveness and perceived impact of five electronic communication technologies (electronic mail, videotex, interactive computers, video teleconferencing, and word processing). Ninety-four corporations responded to a 53-item questionnaire and follow-up survey. Analysis of the…

  4. Diabetes City: How Urban Game Design Strategies Can Help Diabetics

    NASA Astrophysics Data System (ADS)

    Knöll, Martin

    Computer Games are about to leave their “electronic shells” and enter the city. So-called Serious Pervasive Games (SPGs) [1] allow for hybrid - simultaneously physical and virtual - experiences, applying technologies of ubiquitous computing, communication and “intelligent” interfaces. They begin to focus on non-entertaining purposes. The following article a) presents game design strategies as a missing link between pervasive computing, Ambient Intelligence and user’s everyday life. Therefore it spurs a discussion how Pervasive Healthcare focusing on the therapy and prevention of chronic diseases can benefit from urban game design strategies. b) Moreover the article presents the development and work in progress of “DiabetesCity“ - an educational game prototype for young diabetics.

  5. Law School Experience in Pervasive Electronic Communications.

    ERIC Educational Resources Information Center

    Shiels, Rosemary

    1994-01-01

    Installation of a schoolwide local area computer network at Chicago-Kent College of Law (Illinois) is described. Uses of electronic mail within a course on computer law are described. Additional social, administrative, and research uses of electronic mail are noted as are positive effects and emerging problems (e.g., burdens on recipients and…

  6. Human computer confluence applied in healthcare and rehabilitation.

    PubMed

    Viaud-Delmon, Isabelle; Gaggioli, Andrea; Ferscha, Alois; Dunne, Stephen

    2012-01-01

    Human computer confluence (HCC) is an ambitious research program studying how the emerging symbiotic relation between humans and computing devices can enable radically new forms of sensing, perception, interaction, and understanding. It is an interdisciplinary field, bringing together researches from horizons as various as pervasive computing, bio-signals processing, neuroscience, electronics, robotics, virtual & augmented reality, and provides an amazing potential for applications in medicine and rehabilitation.

  7. Confronting the Ubiquity of Electronic Communication and Social Media: Ethical and Legal Considerations for Psychoeducational Practice

    ERIC Educational Resources Information Center

    Demers, Joseph A.; Sullivan, Amanda L.

    2016-01-01

    Most U.S. children and adults use computers and the Internet on a daily basis. The pervasiveness of electronic communication in a variety of contexts, including home and school, raises ethical and legal concerns for school psychologists and those in related fields of practice, because of the risks to privacy and confidentiality, boundaries,…

  8. Challenges in Securing the Interface Between the Cloud and Pervasive Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lagesse, Brent J

    2011-01-01

    Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources andmore » issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.« less

  9. An Infrastructure for Multi-Level Secure Service-Oriented Architecture (MLS-SOA) Using the Multiple Single-Level Approach

    DTIC Science & Technology

    2009-12-17

    IEEE TDKE, 1996. 8( 1). 14. Garvey, T.D., The inference Problem for Computer Security. 1992, SRI International. 15. Chaum , D ., Blind Signatures for...Pervasive Computing Environments. IEEE Transactions on Vehicular Technology, 2006. 55(4). 17. Chaum , D ., Security without Identification: Transaction...Systems to make Big Brother Obsolete. Communications of the ACM 1985. 28(10). 18. Chaum , D ., Untraceable Electronic Mail, Return Addresses, and Digital

  10. The impact of the pervasive information age on healthcare organizations.

    PubMed

    Landry, Brett J L; Mahesh, Sathi; Hartman, Sandra J

    2005-01-01

    New information technologies place data on integrated information systems, and provide access via pervasive computing technologies. Pervasive computing puts computing power in the hands of all employees, available wherever it is needed. Integrated systems offer seamless data and process integration over diverse information systems. In this paper we look at the impact of these technologies on healthcare organizations in the future.

  11. Pervasive access to images and data--the use of computing grids and mobile/wireless devices across healthcare enterprises.

    PubMed

    Pohjonen, Hanna; Ross, Peeter; Blickman, Johan G; Kamman, Richard

    2007-01-01

    Emerging technologies are transforming the workflows in healthcare enterprises. Computing grids and handheld mobile/wireless devices are providing clinicians with enterprise-wide access to all patient data and analysis tools on a pervasive basis. In this paper, emerging technologies are presented that provide computing grids and streaming-based access to image and data management functions, and system architectures that enable pervasive computing on a cost-effective basis. Finally, the implications of such technologies are investigated regarding the positive impacts on clinical workflows.

  12. Mobile healthcare information management utilizing Cloud Computing and Android OS.

    PubMed

    Doukas, Charalampos; Pliakas, Thomas; Maglogiannis, Ilias

    2010-01-01

    Cloud Computing provides functionality for managing information data in a distributed, ubiquitous and pervasive manner supporting several platforms, systems and applications. This work presents the implementation of a mobile system that enables electronic healthcare data storage, update and retrieval using Cloud Computing. The mobile application is developed using Google's Android operating system and provides management of patient health records and medical images (supporting DICOM format and JPEG2000 coding). The developed system has been evaluated using the Amazon's S3 cloud service. This article summarizes the implementation details and presents initial results of the system in practice.

  13. Building Efficient Wireless Infrastructures for Pervasive Computing Environments

    ERIC Educational Resources Information Center

    Sheng, Bo

    2010-01-01

    Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…

  14. A Secure Framework for Location Verification in Pervasive Computing

    NASA Astrophysics Data System (ADS)

    Liu, Dawei; Lee, Moon-Chuen; Wu, Dan

    The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.

  15. Pervasive healthcare as a scientific discipline.

    PubMed

    Bardram, J E

    2008-01-01

    The OECD countries are facing a set of core challenges; an increasing elderly population; increasing number of chronic and lifestyle-related diseases; expanding scope of what medicine can do; and increasing lack of medical professionals. Pervasive healthcare asks how pervasive computing technology can be designed to meet these challenges. The objective of this paper is to discuss 'pervasive healthcare' as a research field and tries to establish how novel and distinct it is, compared to related work within biomedical engineering, medical informatics, and ubiquitous computing. The paper presents the research questions, approach, technologies, and methods of pervasive healthcare and discusses these in comparison to those of other related scientific disciplines. A set of central research themes are presented; monitoring and body sensor networks; pervasive assistive technologies; pervasive computing for hospitals; and preventive and persuasive technologies. Two projects illustrate the kind of research being done in pervasive healthcare. The first project is targeted at home-based monitoring of hypertension; the second project is designing context-aware technologies for hospitals. Both projects approach the healthcare challenges in a new way, apply a new type of research method, and come up with new kinds of technological solutions. 'Clinical proof-of-concept' is recommended as a new method for pervasive healthcare research; the method helps design and test pervasive healthcare technologies, and in ascertaining their clinical potential before large-scale clinical tests are needed. The paper concludes that pervasive healthcare as a research field and agenda is novel; it is addressing new emerging research questions, represents a novel approach, designs new types of technologies, and applies a new kind of research method.

  16. Distributed Pervasive Worlds: The Case of Exergames

    ERIC Educational Resources Information Center

    Laine, Teemu H.; Sedano, Carolina Islas

    2015-01-01

    Pervasive worlds are computing environments where a virtual world converges with the physical world through context-aware technologies such as sensors. In pervasive worlds, technology is distributed among entities that may be distributed geographically. We explore the concept, possibilities, and challenges of distributed pervasive worlds in a case…

  17. Studying the Elusive Experience in Pervasive Games

    ERIC Educational Resources Information Center

    Stenros, Jaakko; Waern, Annika; Montola, Markus

    2012-01-01

    Studying pervasive games is inherently difficult and different from studying computer or board games. This article builds upon the experiences of staging and studying several playful pervasive technology prototypes. It discusses the challenges and pitfalls of evaluating pervasive game prototypes and charts methods that have proven useful in…

  18. Students Develop Real-World Web and Pervasive Computing Systems.

    ERIC Educational Resources Information Center

    Tappert, Charles C.

    In the academic year 2001-2002, Pace University (New York) Computer Science and Information Systems (CSIS) students developed real-world Web and pervasive computing systems for actual customers. This paper describes the general use of team projects in CSIS at Pace University, the real-world projects from this academic year, the benefits of…

  19. Middleware Architecture for Ambient Intelligence in the Networked Home

    NASA Astrophysics Data System (ADS)

    Georgantas, Nikolaos; Issarny, Valerie; Mokhtar, Sonia Ben; Bromberg, Yerom-David; Bianco, Sebastien; Thomson, Graham; Raverdy, Pierre-Guillaume; Urbieta, Aitor; Cardoso, Roberto Speicys

    With computing and communication capabilities now embedded in most physical objects of the surrounding environment and most users carrying wireless computing devices, the Ambient Intelligence (AmI) / pervasive computing vision [28] pioneered by Mark Weiser [32] is becoming a reality. Devices carried by nomadic users can seamlessly network with a variety of devices, both stationary and mobile, both nearby and remote, providing a wide range of functional capabilities, from base sensing and actuating to rich applications (e.g., smart spaces). This then allows the dynamic deployment of pervasive applications, which dynamically compose functional capabilities accessible in the pervasive network at the given time and place of an application request.

  20. What Students Want

    ERIC Educational Resources Information Center

    Schaffhauser, Dian

    2010-01-01

    Institutions already cater to the technology needs of students. According to the 2008 Campus Computing survey, 60 percent of colleges and universities offer pervasive or near-pervasive wireless; computers are as ubiquitous as water bottles; course management systems have become one-stop shops for class content; few classrooms lack projectors; and…

  1. Pervasive Computing and Communication Technologies for U-Learning

    ERIC Educational Resources Information Center

    Park, Young C.

    2014-01-01

    The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…

  2. Developing Online Learning Resources: Big Data, Social Networks, and Cloud Computing to Support Pervasive Knowledge

    ERIC Educational Resources Information Center

    Anshari, Muhammad; Alas, Yabit; Guan, Lim Sei

    2016-01-01

    Utilizing online learning resources (OLR) from multi channels in learning activities promise extended benefits from traditional based learning-centred to a collaborative based learning-centred that emphasises pervasive learning anywhere and anytime. While compiling big data, cloud computing, and semantic web into OLR offer a broader spectrum of…

  3. Mobility in hospital work: towards a pervasive computing hospital environment.

    PubMed

    Morán, Elisa B; Tentori, Monica; González, Víctor M; Favela, Jesus; Martínez-Garcia, Ana I

    2007-01-01

    Handheld computers are increasingly being used by hospital workers. With the integration of wireless networks into hospital information systems, handheld computers can provide the basis for a pervasive computing hospital environment; to develop this designers need empirical information to understand how hospital workers interact with information while moving around. To characterise the medical phenomena we report the results of a workplace study conducted in a hospital. We found that individuals spend about half of their time at their base location, where most of their interactions occur. On average, our informants spent 23% of their time performing information management tasks, followed by coordination (17.08%), clinical case assessment (15.35%) and direct patient care (12.6%). We discuss how our results offer insights for the design of pervasive computing technology, and directions for further research and development in this field such as transferring information between heterogeneous devices and integration of the physical and digital domains.

  4. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    NASA Astrophysics Data System (ADS)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  5. Towards pervasive computing in health care - a literature review.

    PubMed

    Orwat, Carsten; Graefe, Andreas; Faulwasser, Timm

    2008-06-19

    The evolving concepts of pervasive computing, ubiquitous computing and ambient intelligence are increasingly influencing health care and medicine. Summarizing published research, this literature review provides an overview of recent developments and implementations of pervasive computing systems in health care. It also highlights some of the experiences reported in deployment processes. There is no clear definition of pervasive computing in the current literature. Thus specific inclusion criteria for selecting articles about relevant systems were developed. Searches were conducted in four scientific databases alongside manual journal searches for the period of 2002 to 2006. Articles included present prototypes, case studies and pilot studies, clinical trials and systems that are already in routine use. The searches identified 69 articles describing 67 different systems. In a quantitative analysis, these systems were categorized into project status, health care settings, user groups, improvement aims, and systems features (i.e., component types, data gathering, data transmission, systems functions). The focus is on the types of systems implemented, their frequency of occurrence and their characteristics. Qualitative analyses were performed of deployment issues, such as organizational and personnel issues, privacy and security issues, and financial issues. This paper provides a comprehensive access to the literature of the emerging field by addressing specific topics of application settings, systems features, and deployment experiences. Both an overview and an analysis of the literature on a broad and heterogeneous range of systems are provided. Most systems are described in their prototype stages. Deployment issues, such as implications on organization or personnel, privacy concerns, or financial issues are mentioned rarely, though their solution is regarded as decisive in transferring promising systems to a stage of regular operation. There is a need for further research on the deployment of pervasive computing systems, including clinical studies, economic and social analyses, user studies, etc.

  6. Enhancing battery efficiency for pervasive health-monitoring systems based on electronic textiles.

    PubMed

    Zheng, Nenggan; Wu, Zhaohui; Lin, Man; Yang, Laurence Tianruo

    2010-03-01

    Electronic textiles are regarded as one of the most important computation platforms for future computer-assisted health-monitoring applications. In these novel systems, multiple batteries are used in order to prolong their operational lifetime, which is a significant metric for system usability. However, due to the nonlinear features of batteries, computing systems with multiple batteries cannot achieve the same battery efficiency as those powered by a monolithic battery of equal capacity. In this paper, we propose an algorithm aiming to maximize battery efficiency globally for the computer-assisted health-care systems with multiple batteries. Based on an accurate analytical battery model, the concept of weighted battery fatigue degree is introduced and the novel battery-scheduling algorithm called predicted weighted fatigue degree least first (PWFDLF) is developed. Besides, we also discuss our attempts during search PWFDLF: a weighted round-robin (WRR) and a greedy algorithm achieving highest local battery efficiency, which reduces to the sequential discharging policy. Evaluation results show that a considerable improvement in battery efficiency can be obtained by PWFDLF under various battery configurations and current profiles compared to conventional sequential and WRR discharging policies.

  7. Pervasive liquid metal based direct writing electronics with roller-ball pen

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zheng, Yi; Zhang, Qin; Liu, Jing, E-mail: jliu@mail.ipc.ac.cn

    A roller-ball pen enabled direct writing electronics via room temperature liquid metal ink was proposed. With the rolling to print mechanism, the metallic inks were smoothly written on flexible polymer substrate to form conductive tracks and electronic devices. The contact angle analyzer and scanning electron microscope were implemented to disclose several unique inner properties of the obtained electronics. An ever high writing resolution with line width and thickness as 200 μm and 80 μm, respectively was realized. Further, with the administration of external writing pressure, GaIn{sub 24.5} droplets embody increasing wettability on polymer which demonstrates the pervasive adaptability of themore » roller-ball pen electronics.« less

  8. A Service-oriented Approach towards Context-aware Mobile Learning Management Systems

    DTIC Science & Technology

    2010-07-01

    towards a pervasive university. Keywords-context-aware computing, service-oriented archi- tecture, mobile computing, elearning , learn management sys- tem I...usage of device- specific features provide support for various ubiquitous and pervasive eLearning scenarios [2][3]. By knowing where the user currently...data from the mobile device towards a context-aware mobile LMS. II. BASIC CONCEPTS For a better understanding of the presented eLearning sce- narios

  9. Towards pervasive computing in health care – A literature review

    PubMed Central

    Orwat, Carsten; Graefe, Andreas; Faulwasser, Timm

    2008-01-01

    Background The evolving concepts of pervasive computing, ubiquitous computing and ambient intelligence are increasingly influencing health care and medicine. Summarizing published research, this literature review provides an overview of recent developments and implementations of pervasive computing systems in health care. It also highlights some of the experiences reported in deployment processes. Methods There is no clear definition of pervasive computing in the current literature. Thus specific inclusion criteria for selecting articles about relevant systems were developed. Searches were conducted in four scientific databases alongside manual journal searches for the period of 2002 to 2006. Articles included present prototypes, case studies and pilot studies, clinical trials and systems that are already in routine use. Results The searches identified 69 articles describing 67 different systems. In a quantitative analysis, these systems were categorized into project status, health care settings, user groups, improvement aims, and systems features (i.e., component types, data gathering, data transmission, systems functions). The focus is on the types of systems implemented, their frequency of occurrence and their characteristics. Qualitative analyses were performed of deployment issues, such as organizational and personnel issues, privacy and security issues, and financial issues. This paper provides a comprehensive access to the literature of the emerging field by addressing specific topics of application settings, systems features, and deployment experiences. Conclusion Both an overview and an analysis of the literature on a broad and heterogeneous range of systems are provided. Most systems are described in their prototype stages. Deployment issues, such as implications on organization or personnel, privacy concerns, or financial issues are mentioned rarely, though their solution is regarded as decisive in transferring promising systems to a stage of regular operation. There is a need for further research on the deployment of pervasive computing systems, including clinical studies, economic and social analyses, user studies, etc. PMID:18565221

  10. An Adaptive Sensor Mining Framework for Pervasive Computing Applications

    NASA Astrophysics Data System (ADS)

    Rashidi, Parisa; Cook, Diane J.

    Analyzing sensor data in pervasive computing applications brings unique challenges to the KDD community. The challenge is heightened when the underlying data source is dynamic and the patterns change. We introduce a new adaptive mining framework that detects patterns in sensor data, and more importantly, adapts to the changes in the underlying model. In our framework, the frequent and periodic patterns of data are first discovered by the Frequent and Periodic Pattern Miner (FPPM) algorithm; and then any changes in the discovered patterns over the lifetime of the system are discovered by the Pattern Adaptation Miner (PAM) algorithm, in order to adapt to the changing environment. This framework also captures vital context information present in pervasive computing applications, such as the startup triggers and temporal information. In this paper, we present a description of our mining framework and validate the approach using data collected in the CASAS smart home testbed.

  11. Wearable Notification via Dissemination Service in a Pervasive Computing Environment

    DTIC Science & Technology

    2015-09-01

    context, state, and environment in a manner that would be transparent to a Soldier’s common operations. 15. SUBJECT TERMS pervasive computing, Android ...of user context shifts, i.e., changes in the user’s position, history , workflow, or resource interests. If the PCE is described as a 2-component...convenient viewing on the Glass’s screen just above the line of sight. All of the software developed uses Google’s Android open-source software stack

  12. Ethical Responsibility Key to Computer Security.

    ERIC Educational Resources Information Center

    Lynn, M. Stuart

    1989-01-01

    The pervasiveness of powerful computers and computer networks has raised the specter of new forms of abuse and of concomitant ethical issues. Blurred boundaries, hackers, the Computer Worm, ethical issues, and implications for academic institutions are discussed. (MLW)

  13. Pervasive Knowledge, Social Networks, and Cloud Computing: E-Learning 2.0

    ERIC Educational Resources Information Center

    Anshari, Muhammad; Alas, Yabit; Guan, Lim Sei

    2015-01-01

    Embedding Web 2.0 in learning processes has extended learning from traditional based learning-centred to a collaborative based learning-centred institution that emphasises learning anywhere and anytime. While deploying Semantic Web into e-learning offers a broader spectrum of pervasive knowledge acquisition to enrich users' experience in learning.…

  14. Towards a flexible middleware for context-aware pervasive and wearable systems.

    PubMed

    Muro, Marco; Amoretti, Michele; Zanichelli, Francesco; Conte, Gianni

    2012-11-01

    Ambient intelligence and wearable computing call for innovative hardware and software technologies, including a highly capable, flexible and efficient middleware, allowing for the reuse of existing pervasive applications when developing new ones. In the considered application domain, middleware should also support self-management, interoperability among different platforms, efficient communications, and context awareness. In the on-going "everything is networked" scenario scalability appears as a very important issue, for which the peer-to-peer (P2P) paradigm emerges as an appealing solution for connecting software components in an overlay network, allowing for efficient and balanced data distribution mechanisms. In this paper, we illustrate how all these concepts can be placed into a theoretical tool, called networked autonomic machine (NAM), implemented into a NAM-based middleware, and evaluated against practical problems of pervasive computing.

  15. Pervasive Computing Goes to School

    ERIC Educational Resources Information Center

    Plymale, William O.

    2005-01-01

    In 1991 Mark Weiser introduced the idea of ubiquitous computing: a world in which computers and associated technologies become invisible, and thus indistinguishable from everyday life. This invisible computing is accomplished by means of "embodied virtuality," the process of drawing computers into the physical world. Weiser proposed that…

  16. From computers to ubiquitous computing by 2010: health care.

    PubMed

    Aziz, Omer; Lo, Benny; Pansiot, Julien; Atallah, Louis; Yang, Guang-Zhong; Darzi, Ara

    2008-10-28

    Over the past decade, miniaturization and cost reduction in semiconductors have led to computers smaller in size than a pinhead with powerful processing abilities that are affordable enough to be disposable. Similar advances in wireless communication, sensor design and energy storage have meant that the concept of a truly pervasive 'wireless sensor network', used to monitor environments and objects within them, has become a reality. The need for a wireless sensor network designed specifically for human body monitoring has led to the development of wireless 'body sensor network' (BSN) platforms composed of tiny integrated microsensors with on-board processing and wireless data transfer capability. The ubiquitous computing abilities of BSNs offer the prospect of continuous monitoring of human health in any environment, be it home, hospital, outdoors or the workplace. This pervasive technology comes at a time when Western world health care costs have sharply risen, reflected by increasing expenditure on health care as a proportion of gross domestic product over the last 20 years. Drivers of this rise include an ageing post 'baby boom' population, higher incidence of chronic disease and the need for earlier diagnosis. This paper outlines the role of pervasive health care technologies in providing more efficient health care.

  17. In vitro dosimetry of agglomerates

    NASA Astrophysics Data System (ADS)

    Hirsch, V.; Kinnear, C.; Rodriguez-Lorenzo, L.; Monnier, C. A.; Rothen-Rutishauser, B.; Balog, S.; Petri-Fink, A.

    2014-06-01

    Agglomeration of nanoparticles in biological fluids is a pervasive phenomenon that leads to difficulty in the interpretation of results from in vitro exposure, primarily due to differing particokinetics of agglomerates to nanoparticles. Therefore, well-defined small agglomerates were designed that possessed different particokinetic profiles, and their cellular uptake was compared to a computational model of dosimetry. The approach used here paves the way for a better understanding of the impact of agglomeration on the nanoparticle-cell interaction.Agglomeration of nanoparticles in biological fluids is a pervasive phenomenon that leads to difficulty in the interpretation of results from in vitro exposure, primarily due to differing particokinetics of agglomerates to nanoparticles. Therefore, well-defined small agglomerates were designed that possessed different particokinetic profiles, and their cellular uptake was compared to a computational model of dosimetry. The approach used here paves the way for a better understanding of the impact of agglomeration on the nanoparticle-cell interaction. Electronic supplementary information (ESI) available: ITC data for tiopronin/Au-NP interactions, agglomeration kinetics at different pHs for tiopronin-coated Au-NPs, UV-Vis spectra in water, PBS and DMEM and temporal correlation functions for single Au-NPs and corresponding agglomerates, calculation of diffusion and sedimentation parameters, modelling of relative cell uptake based on the ISDD model and cytotoxicity of single Au-NPs and their agglomerates, and synthesis and cell uptake of large spherical Au-NPs. See DOI: 10.1039/c4nr00460d

  18. Towards Situation Driven Mobile Tutoring System for Learning Languages and Communication Skills: Application to Users with Specific Needs

    ERIC Educational Resources Information Center

    Khemaja, Maha; Taamallah, Aroua

    2016-01-01

    Current advances in portable devices and wireless technologies had drastically impacted mobile and pervasive computing development and use. Nowadays, mobile and or pervasive applications, are increasingly being used to support users' everyday activities. These apps either distributed or standalone are characterized by the variability of the…

  19. Critical branching neural networks.

    PubMed

    Kello, Christopher T

    2013-01-01

    It is now well-established that intrinsic variations in human neural and behavioral activity tend to exhibit scaling laws in their fluctuations and distributions. The meaning of these scaling laws is an ongoing matter of debate between isolable causes versus pervasive causes. A spiking neural network model is presented that self-tunes to critical branching and, in doing so, simulates observed scaling laws as pervasive to neural and behavioral activity. These scaling laws are related to neural and cognitive functions, in that critical branching is shown to yield spiking activity with maximal memory and encoding capacities when analyzed using reservoir computing techniques. The model is also shown to account for findings of pervasive 1/f scaling in speech and cued response behaviors that are difficult to explain by isolable causes. Issues and questions raised by the model and its results are discussed from the perspectives of physics, neuroscience, computer and information sciences, and psychological and cognitive sciences.

  20. A Conceptual Framework and Principles for Trusted Pervasive Health

    PubMed Central

    Blobel, Bernd Gerhard; Seppälä, Antto Veikko; Sorvari, Hannu Olavi; Nykänen, Pirkko Anneli

    2012-01-01

    Background Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept—pervasive health—which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. Objective This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and polices which can make pervasive health trustworthy. Methods In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. Results In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that any stakeholder or system collecting or processing health data must support transparency and shall publish its trust and privacy attributes and even its domain specific policies. Conclusions The developed principles enable trustworthiness and guarantee privacy in pervasive health. The implementation of principles requires new infrastructural services such as trust verification and policy conflict resolution. After implementation, the accuracy and usability of principles should be analyzed. PMID:22481297

  1. A conceptual framework and principles for trusted pervasive health.

    PubMed

    Ruotsalainen, Pekka Sakari; Blobel, Bernd Gerhard; Seppälä, Antto Veikko; Sorvari, Hannu Olavi; Nykänen, Pirkko Anneli

    2012-04-06

    Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept-pervasive health-which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and policies which can make pervasive health trustworthy. In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that any stakeholder or system collecting or processing health data must support transparency and shall publish its trust and privacy attributes and even its domain specific policies. The developed principles enable trustworthiness and guarantee privacy in pervasive health. The implementation of principles requires new infrastructural services such as trust verification and policy conflict resolution. After implementation, the accuracy and usability of principles should be analyzed.

  2. Introduction to This Special Issue on Context-Aware Computing.

    ERIC Educational Resources Information Center

    Moran, Thomas P.; Dourish, Paul

    2001-01-01

    Discusses pervasive, or ubiquitous, computing; explains the notion of context; and defines context-aware computing as the key to disperse and enmesh computation into our lives. Considers context awareness in human-computer interaction and describes the broad topic areas of the essays included in this special issue. (LRW)

  3. Volcano Monitoring: A Case Study in Pervasive Computing

    NASA Astrophysics Data System (ADS)

    Peterson, Nina; Anusuya-Rangappa, Lohith; Shirazi, Behrooz A.; Song, Wenzhan; Huang, Renjie; Tran, Daniel; Chien, Steve; Lahusen, Rick

    Recent advances in wireless sensor network technology have provided robust and reliable solutions for sophisticated pervasive computing applications such as inhospitable terrain environmental monitoring. We present a case study for developing a real-time pervasive computing system, called OASIS for optimized autonomous space in situ sensor-web, which combines ground assets (a sensor network) and space assets (NASA’s earth observing (EO-1) satellite) to monitor volcanic activities at Mount St. Helens. OASIS’s primary goals are: to integrate complementary space and in situ ground sensors into an interactive and autonomous sensorweb, to optimize power and communication resource management of the sensorweb and to provide mechanisms for seamless and scalable fusion of future space and in situ components. The OASIS in situ ground sensor network development addresses issues related to power management, bandwidth management, quality of service management, topology and routing management, and test-bed design. The space segment development consists of EO-1 architectural enhancements, feedback of EO-1 data into the in situ component, command and control integration, data ingestion and dissemination and field demonstrations.

  4. Personal pervasive environments: practice and experience.

    PubMed

    Ballesteros, Francisco J; Guardiola, Gorka; Soriano, Enrique

    2012-01-01

    In this paper we present our experience designing and developing two different systems to enable personal pervasive computing environments, Plan B and the Octopus. These systems were fully implemented and have been used on a daily basis for years. Both are based on synthetic (virtual) file system interfaces and provide mechanisms to adapt to changes in the context and reconfigure the system to support pervasive applications. We also present the main differences between them, focusing on architectural and reconfiguration aspects. Finally, we analyze the pitfalls and successes of both systems and review the lessons we learned while designing, developing, and using them.

  5. Personal Pervasive Environments: Practice and Experience

    PubMed Central

    Ballesteros, Francisco J.; Guardiola, Gorka; Soriano, Enrique

    2012-01-01

    In this paper we present our experience designing and developing two different systems to enable personal pervasive computing environments, Plan B and the Octopus. These systems were fully implemented and have been used on a daily basis for years. Both are based on synthetic (virtual) file system interfaces and provide mechanisms to adapt to changes in the context and reconfigure the system to support pervasive applications. We also present the main differences between them, focusing on architectural and reconfiguration aspects. Finally, we analyze the pitfalls and successes of both systems and review the lessons we learned while designing, developing, and using them. PMID:22969340

  6. The use of computer vision in an intelligent environment to support aging-in-place, safety, and independence in the home.

    PubMed

    Mihailidis, Alex; Carmichael, Brent; Boger, Jennifer

    2004-09-01

    This paper discusses the use of computer vision in pervasive healthcare systems, specifically in the design of a sensing agent for an intelligent environment that assists older adults with dementia during an activity of daily living. An overview of the techniques applied in this particular example is provided, along with results from preliminary trials completed using the new sensing agent. A discussion of the results obtained to date is presented, including technical and social issues that remain for the advancement and acceptance of this type of technology within pervasive healthcare.

  7. Envisioning future cognitive telerehabilitation technologies: a co-design process with clinicians.

    PubMed

    How, Tuck-Voon; Hwang, Amy S; Green, Robin E A; Mihailidis, Alex

    2017-04-01

    Purpose Cognitive telerehabilitation is the concept of delivering cognitive assessment, feedback, or therapeutic intervention at a distance through technology. With the increase of mobile devices, wearable sensors, and novel human-computer interfaces, new possibilities are emerging to expand the cognitive telerehabilitation paradigm. This research aims to: (1) explore design opportunities and considerations when applying emergent pervasive computing technologies to cognitive telerehabilitation and (2) develop a generative co-design process for use with rehabilitation clinicians. Methods We conducted a custom co-design process that used design cards, probes, and design sessions with traumatic brain injury (TBI) clinicians. All field notes and transcripts were analyzed qualitatively. Results Potential opportunities for TBI cognitive telerehabilitation exist in the areas of communication competency, executive functioning, emotional regulation, energy management, assessment, and skill training. Designers of TBI cognitive telerehabilitation technologies should consider how technologies are adapted to a patient's physical/cognitive/emotional state, their changing rehabilitation trajectory, and their surrounding life context (e.g. social considerations). Clinicians were receptive to our co-design approach. Conclusion Pervasive computing offers new opportunities for life-situated cognitive telerehabilitation. Convivial design methods, such as this co-design process, are a helpful way to explore new design opportunities and an important space for further methodological development. Implications for Rehabilitation Designers of rehabilitation technologies should consider how to extend current design methods in order to facilitate the creative contribution of rehabilitation stakeholders. This co-design approach enables a fuller participation from rehabilitation clinicians at the front-end of design. Pervasive computing has the potential to: extend the duration and intensity of cognitive telerehabilitation training (including the delivery of 'booster' sessions or maintenance therapies); provide assessment and treatment in the context of a traumatic brain injury (TBI) patient's everyday life (thereby enhancing generalization); and permit time-sensitive interventions. Long-term use of pervasive computing for TBI cognitive telerehabilitation should take into account a patient's changing recovery trajectory, their meaningful goals, and their journey from loss to redefinition.

  8. Slovak High School Students' Attitudes toward Computers

    ERIC Educational Resources Information Center

    Kubiatko, Milan; Halakova, Zuzana; Nagyova, Sona; Nagy, Tibor

    2011-01-01

    The pervasive involvement of information and communication technologies and computers in our daily lives influences changes of attitude toward computers. We focused on finding these ecological effects in the differences in computer attitudes as a function of gender and age. A questionnaire with 34 Likert-type items was used in our research. The…

  9. Semiconductors: Still a Wide Open Frontier for Scientists/Engineers

    NASA Astrophysics Data System (ADS)

    Seiler, David G.

    1997-10-01

    A 1995 Business Week article described several features of the explosive use of semiconductor chips today: ``Booming'' personal computer markets are driving high demand for microprocessors and memory chips; (2) New information superhighway markets will `ignite' sales of multimedia and communication chips; and (3) Demand for digital-signal-processing and data-compression chips, which speed up video and graphics, is `red hot.' A Washington Post article by Stan Hinden said that technology is creating an unstoppable demand for electronic elements. This ``digital pervasiveness'' means that a semiconductor chip is going into almost every high-tech product that people buy - cars, televisions, video recorders, telephones, radios, alarm clocks, coffee pots, etc. ``Semiconductors are everywhere.'' Silicon and compound semiconductors are absolutely essential and are pervasive enablers for DoD operations and systems. DoD's Critical Technologies Plan of 1991 says that ``Semiconductor materials and microelectronics are critically important and appropriately lead the list of critical defense technologies.'' These trends continue unabated. This talk describes some of the frontiers of semiconductors today and shows how scientists and engineers can effectively contribute to its advancement. Cooperative, multidisciplinary efforts are increasing. Specific examples will be given for scanning capacitance microscopy and thin-film metrology.

  10. Ethics Regulation in Social Computing Research: Examining the Role of Institutional Review Boards.

    PubMed

    Vitak, Jessica; Proferes, Nicholas; Shilton, Katie; Ashktorab, Zahra

    2017-12-01

    The parallel rise of pervasive data collection platforms and computational methods for collecting, analyzing, and drawing inferences from large quantities of user data has advanced social computing research, investigating digital traces to understand mediated behaviors of individuals, groups, and societies. At the same time, methods employed to access these data have raised questions about ethical research practices. This article provides insights into U.S. institutional review boards' (IRBs) attitudes and practices regulating social computing research. Through descriptive and inferential analysis of survey data from staff at 59 IRBs at research universities, we examine how IRBs evaluate the growing variety of studies using pervasive digital data. Findings unpack the difficulties IRB staff face evaluating increasingly technical research proposals while highlighting the belief in their ability to surmount these difficulties. They also indicate a lack of consensus among IRB staff about what should be reviewed and a willingness to work closely with researchers.

  11. The Experimental Mathematician: The Pleasure of Discovery and the Role of Proof

    ERIC Educational Resources Information Center

    Borwein, Jonathan M.

    2005-01-01

    The emergence of powerful mathematical computing environments, the growing availability of correspondingly powerful (multi-processor) computers and the pervasive presence of the Internet allow for mathematicians, students and teachers, to proceed heuristically and "quasi-inductively." We may increasingly use symbolic and numeric computation,…

  12. A Longitudinal Investigation of the Effects of Computer Anxiety on Performance in a Computing-Intensive Environment

    ERIC Educational Resources Information Center

    Buche, Mari W.; Davis, Larry R.; Vician, Chelley

    2007-01-01

    Computers are pervasive in business and education, and it would be easy to assume that all individuals embrace technology. However, evidence shows that roughly 30 to 40 percent of individuals experience some level of computer anxiety. Many academic programs involve computing-intensive courses, but the actual effects of this exposure on computer…

  13. Electronics: The Continuing Revolution. No. 5 in a Series of Special "Science" Compendia.

    ERIC Educational Resources Information Center

    Abelson, Philip H., Ed.; Hammond, Allen L., Ed.

    Presented are articles originally published in "Science" during 1975-77. This issue is divided into five parts. The first part presents four articles designed to provide an overview of the past, present, and future of electronics. The second part presents twelve articles showing the pervasiveness of electronics in banking and marketing, medicine,…

  14. Gender Differences: An Examination of Computer-Mediated Communication.

    ERIC Educational Resources Information Center

    Gregory, Mona Y.

    Computer-mediated communication (CMC) is a pervasive means of communicating in work place, education, and home settings. Males currently occupy approximately 69% of all jobs in the computer industry and only 10% of upper-level positions are occupied by females. Stereotypical perceptions and gendered occupations contribute to the lack of females in…

  15. The Pathways to Enterprise Mobile Readiness: Analysis of Perceptions, Pressures, Preparedness, and Progression

    ERIC Educational Resources Information Center

    Johnson, James Nathaniel

    2013-01-01

    Ubiquitous computing is a near reality in both the private and public arena. Business and personal spaces are seeing a proliferation of mobile computing devices and pervasive computing technologies. This phenomenon is creating a unique set of challenges for organizational IT professionals, specifically in the numerous spillover effects of having…

  16. Is Your Mission Ready for the Information Age?

    ERIC Educational Resources Information Center

    Oblinger, Diana G.

    1999-01-01

    Urges institutions of higher education to evaluate their mission statements in light of current trends, especially the pervasive influence of information technology. Raises evaluative questions concerning information technology and distance learning, student services, the campus library, research computing, administrative computing, and public…

  17. Towards the Formal Verification of a Distributed Real-Time Automotive System

    NASA Technical Reports Server (NTRS)

    Endres, Erik; Mueller, Christian; Shadrin, Andrey; Tverdyshev, Sergey

    2010-01-01

    We present the status of a project which aims at building, formally and pervasively verifying a distributed automotive system. The target system is a gate-level model which consists of several interconnected electronic control units with independent clocks. This model is verified against the specification as seen by a system programmer. The automotive system is implemented on several FPGA boards. The pervasive verification is carried out using combination of interactive theorem proving (Isabelle/HOL) and model checking (LTL).

  18. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.

    PubMed

    Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne

    2017-05-01

    Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.

  19. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

    PubMed Central

    Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne

    2017-01-01

    Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons. PMID:28468313

  20. Factors Associated with Young People's Successful Resolution of Distressing Electronic Harassment

    ERIC Educational Resources Information Center

    Fenaughty, John; Harre, Niki

    2013-01-01

    Electronic harassment is a pervasive phenomenon among young people, however relatively little is known about actions that targets of harassment may undertake to manage such abuse, and whether particular actions and personal characteristics are associated with successful resolution of such harassment. This mixed methods research identified whether…

  1. Cyberbullying and How It Impacts Schools

    ERIC Educational Resources Information Center

    Choucalas, Vida Zoe

    2013-01-01

    With all of its many benefits to humanity, one of the consequences of the Internet age is a far more pervasive and potentially damaging version of bullying called cyberbullying, which can also be referred to as ebullying, electronic bullying, cyberviolence, digital bullying, electronic harassment, and online harassment. Cyberbullying is being…

  2. An Argument for Clarity: What Are Learning Management Systems, What Are They Not, and What Should They Become?

    ERIC Educational Resources Information Center

    Watson, William R.; Watson, Sunnie Lee

    2007-01-01

    The application of computers to education has a history dating back to the 1950s, well before the pervasive spread of personal computers (Reiser, 1987). With a mature history and varying approaches to utilizing computers for education, a veritable alphabet soup of terms and acronyms related to computers in education have found their way into the…

  3. From black box to toolbox: Outlining device functionality, engagement activities, and the pervasive information architecture of mHealth interventions.

    PubMed

    Danaher, Brian G; Brendryen, Håvar; Seeley, John R; Tyler, Milagra S; Woolley, Tim

    2015-03-01

    mHealth interventions that deliver content via mobile phones represent a burgeoning area of health behavior change. The current paper examines two themes that can inform the underlying design of mHealth interventions: (1) mobile device functionality, which represents the technological toolbox available to intervention developers; and (2) the pervasive information architecture of mHealth interventions, which determines how intervention content can be delivered concurrently using mobile phones, personal computers, and other devices. We posit that developers of mHealth interventions will be better able to achieve the promise of this burgeoning arena by leveraging the toolbox and functionality of mobile devices in order to engage participants and encourage meaningful behavior change within the context of a carefully designed pervasive information architecture.

  4. Investigation of Teachers' Attitudes towards Computer Use in Primary Education in Kurdistan

    ERIC Educational Resources Information Center

    Balisane, Hewa

    2015-01-01

    Technological advances have pervasively changed our behaviours, beliefs and approaches in working, socialising and entertaining. Educators, including those in primary education, have acknowledged the positive effects of computer use in the classroom in various ways. With regard to pedagogical consideration, primary school teachers have adopted…

  5. Above-Campus Services: Shaping the Promise of Cloud Computing for Higher Education

    ERIC Educational Resources Information Center

    Wheeler, Brad; Waggener, Shelton

    2009-01-01

    The concept of today's cloud computing may date back to 1961, when John McCarthy, retired Stanford professor and Turing Award winner, delivered a speech at MIT's Centennial. In that speech, he predicted that in the future, computing would become a "public utility." Yet for colleges and universities, the recent growth of pervasive, very high speed…

  6. Ubiquitous computing in sports: A review and analysis.

    PubMed

    Baca, Arnold; Dabnichki, Peter; Heller, Mario; Kornfeind, Philipp

    2009-10-01

    Ubiquitous (pervasive) computing is a term for a synergetic use of sensing, communication and computing. Pervasive use of computing has seen a rapid increase in the current decade. This development has propagated in applied sport science and everyday life. The work presents a survey of recent developments in sport and leisure with emphasis on technology and computational techniques. A detailed analysis on new technological developments is performed. Sensors for position and motion detection, and such for equipment and physiological monitoring are discussed. Aspects of novel trends in communication technologies and data processing are outlined. Computational advancements have started a new trend - development of smart and intelligent systems for a wide range of applications - from model-based posture recognition to context awareness algorithms for nutrition monitoring. Examples particular to coaching and training are discussed. Selected tools for monitoring rules' compliance and automatic decision-making are outlined. Finally, applications in leisure and entertainment are presented, from systems supporting physical activity to systems providing motivation. It is concluded that the emphasis in future will shift from technologies to intelligent systems that allow for enhanced social interaction as efforts need to be made to improve user-friendliness and standardisation of measurement and transmission protocols.

  7. Correcting pervasive errors in RNA crystallography through enumerative structure prediction.

    PubMed

    Chou, Fang-Chieh; Sripakdeevong, Parin; Dibrov, Sergey M; Hermann, Thomas; Das, Rhiju

    2013-01-01

    Three-dimensional RNA models fitted into crystallographic density maps exhibit pervasive conformational ambiguities, geometric errors and steric clashes. To address these problems, we present enumerative real-space refinement assisted by electron density under Rosetta (ERRASER), coupled to Python-based hierarchical environment for integrated 'xtallography' (PHENIX) diffraction-based refinement. On 24 data sets, ERRASER automatically corrects the majority of MolProbity-assessed errors, improves the average R(free) factor, resolves functionally important discrepancies in noncanonical structure and refines low-resolution models to better match higher-resolution models.

  8. Behavioral Reference Model for Pervasive Healthcare Systems.

    PubMed

    Tahmasbi, Arezoo; Adabi, Sahar; Rezaee, Ali

    2016-12-01

    The emergence of mobile healthcare systems is an important outcome of application of pervasive computing concepts for medical care purposes. These systems provide the facilities and infrastructure required for automatic and ubiquitous sharing of medical information. Healthcare systems have a dynamic structure and configuration, therefore having an architecture is essential for future development of these systems. The need for increased response rate, problem limited storage, accelerated processing and etc. the tendency toward creating a new generation of healthcare system architecture highlight the need for further focus on cloud-based solutions for transfer data and data processing challenges. Integrity and reliability of healthcare systems are of critical importance, as even the slightest error may put the patients' lives in danger; therefore acquiring a behavioral model for these systems and developing the tools required to model their behaviors are of significant importance. The high-level designs may contain some flaws, therefor the system must be fully examined for different scenarios and conditions. This paper presents a software architecture for development of healthcare systems based on pervasive computing concepts, and then models the behavior of described system. A set of solutions are then proposed to improve the design's qualitative characteristics including, availability, interoperability and performance.

  9. Unlocking the Barriers to Women and Minorities in Computer Science and Information Systems Studies: Results from a Multi-Methodological Study Conducted at Two Minority Serving Institutions

    ERIC Educational Resources Information Center

    Buzzetto-More, Nicole; Ukoha, Ojiabo; Rustagi, Narendra

    2010-01-01

    The under representation of women and minorities in undergraduate computer science and information systems programs is a pervasive and persistent problem in the United States. Needed is a better understanding of the background and psychosocial factors that attract, or repel, minority students from computing disciplines. An examination of these…

  10. Health Informatics Program Design and Outcomes: Learning from an Early Offering at a Mid-Level University

    ERIC Educational Resources Information Center

    Parker, Kevin R.; Srinivasan, Sankara Subramanian; Houghton, Robert F.; Kordzadeh, Nima; Bozan, Karoly; Ottaway, Thomas; Davey, Bill

    2017-01-01

    Curriculum development is particularly challenging in computing-related disciplines as the computing industry changes more quickly than most. As information technology degrees have become relatively pervasive, some institutions that offer information systems degrees have recognized a need to develop specialist studies in information systems. This…

  11. Model Uncertainty and Robustness: A Computational Framework for Multimodel Analysis

    ERIC Educational Resources Information Center

    Young, Cristobal; Holsteen, Katherine

    2017-01-01

    Model uncertainty is pervasive in social science. A key question is how robust empirical results are to sensible changes in model specification. We present a new approach and applied statistical software for computational multimodel analysis. Our approach proceeds in two steps: First, we estimate the modeling distribution of estimates across all…

  12. A Framework for Safe Composition of Heterogeneous SOA Services in a Pervasive Computing Environment with Resource Constraints

    ERIC Educational Resources Information Center

    Reyes Alamo, Jose M.

    2010-01-01

    The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…

  13. Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-based Services

    NASA Astrophysics Data System (ADS)

    Soppera, A.; Burbridge, T.

    During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists and science fiction writers. Today this subject has become of interest to business, government, and society. Governmental authorities exercise their power through the networked environment. Credit card databases maintain our credit history and decide whether we are allowed to rent a house or obtain a loan. Mobile telephones can locate us in real time so that we do not miss calls. Within another 10 years, all sorts of devices will be connected through the network. Our fridge, our food, together with our health information, may all be networked for the purpose of maintaining diet and well-being. The Internet will move from being an infrastructure to connect computers, to being an infrastructure to connect everything [2, 3].

  14. An integrative architecture for a sensor-supported trust management system.

    PubMed

    Trček, Denis

    2012-01-01

    Trust plays a key role not only in e-worlds and emerging pervasive computing environments, but also already for millennia in human societies. Trust management solutions that have being around now for some fifteen years were primarily developed for the above mentioned cyber environments and they are typically focused on artificial agents, sensors, etc. However, this paper presents extensions of a new methodology together with architecture for trust management support that is focused on humans and human-like agents. With this methodology and architecture sensors play a crucial role. The architecture presents an already deployable tool for multi and interdisciplinary research in various areas where humans are involved. It provides new ways to obtain an insight into dynamics and evolution of such structures, not only in pervasive computing environments, but also in other important areas like management and decision making support.

  15. Scaling Task Management in Space and Time: Reducing User Overhead in Ubiquitous-Computing Environments

    DTIC Science & Technology

    2005-03-28

    consequently users are torn between taking advantage of increasingly pervasive computing systems, and the price (in attention and skill) that they have to... advantage of the surrounding computing environments; and (c) that it is usable by non-experts. Second, from a software architect’s perspective, we...take full advantage of the computing systems accessible to them, much as they take advantage of the furniture in each physical space. In the example

  16. Web-Based Seamless Migration for Task-Oriented Mobile Distance Learning

    ERIC Educational Resources Information Center

    Zhang, Degan; Li, Yuan-chao; Zhang, Huaiyu; Zhang, Xinshang; Zeng, Guangping

    2006-01-01

    As a new kind of computing paradigm, pervasive computing will meet the requirements of human being that anybody maybe obtain services in anywhere and at anytime, task-oriented seamless migration is one of its applications. Apparently, the function of seamless mobility is suitable for mobile services, such as mobile Web-based learning. In this…

  17. Automatic Generation of Just-in-Time Online Assessments from Software Design Models

    ERIC Educational Resources Information Center

    Zualkernan, Imran A.; El-Naaj, Salim Abou; Papadopoulos, Maria; Al-Amoudi, Budoor K.; Matthews, Charles E.

    2009-01-01

    Computer software is pervasive in today's society. The rate at which new versions of computer software products are released is phenomenal when compared to the release rate of new products in traditional industries such as aircraft building. This rapid rate of change can partially explain why most certifications in the software industry are…

  18. From Operating-System Correctness to Pervasively Verified Applications

    NASA Astrophysics Data System (ADS)

    Daum, Matthias; Schirmer, Norbert W.; Schmidt, Mareike

    Though program verification is known and has been used for decades, the verification of a complete computer system still remains a grand challenge. Part of this challenge is the interaction of application programs with the operating system, which is usually entrusted with retrieving input data from and transferring output data to peripheral devices. In this scenario, the correct operation of the applications inherently relies on operating-system correctness. Based on the formal correctness of our real-time operating system Olos, this paper describes an approach to pervasively verify applications running on top of the operating system.

  19. Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way

    NASA Astrophysics Data System (ADS)

    Cui, Yank; Kobara, Kazukuni; Matsuura, Kanta; Imai, Hideki

    As pervasive computing technologies develop fast, the privacy protection becomes a crucial issue and needs to be coped with very carefully. Typically, it is difficult to efficiently identify and manage plenty of the low-cost pervasive devices like Radio Frequency Identification Devices (RFID), without leaking any privacy information. In particular, the attacker may not only eavesdrop the communication in a passive way, but also mount an active attack to ask queries adaptively, which is obviously more dangerous. Towards settling this problem, in this paper, we propose two lightweight authentication protocols which are privacy-preserving against active attack, in an asymmetric way. That asymmetric style with privacy-oriented simplification succeeds to reduce the load of low-cost devices and drastically decrease the computation cost for the management of server. This is because that, unlike the usual management of the identities, our approach does not require any synchronization nor exhaustive search in the database, which enjoys great convenience in case of a large-scale system. The protocols are based on a fast asymmetric encryption with specialized simplification and only one cryptographic hash function, which consequently assigns an easy work to pervasive devices. Besides, our results do not require the strong assumption of the random oracle.

  20. An Integrative Architecture for a Sensor-Supported Trust Management System

    PubMed Central

    Trček, Denis

    2012-01-01

    Trust plays a key role not only in e-worlds and emerging pervasive computing environments, but also already for millennia in human societies. Trust management solutions that have being around now for some fifteen years were primarily developed for the above mentioned cyber environments and they are typically focused on artificial agents, sensors, etc. However, this paper presents extensions of a new methodology together with architecture for trust management support that is focused on humans and human-like agents. With this methodology and architecture sensors play a crucial role. The architecture presents an already deployable tool for multi and interdisciplinary research in various areas where humans are involved. It provides new ways to obtain an insight into dynamics and evolution of such structures, not only in pervasive computing environments, but also in other important areas like management and decision making support. PMID:23112628

  1. Applying mobile and pervasive computer technology to enhance coordination of work in a surgical ward.

    PubMed

    Hansen, Thomas Riisgaard; Bardram, Jakob E

    2007-01-01

    Collaboration, coordination, and communication are crucial in maintaining an efficient and smooth flow of work in an operating ward. This coordination, however, often comes at a high price in terms of unsuccessfully trying to get hold of people, disturbing telephone calls, looking for people, and unnecessary stress. To accommodate this situation and to increase the quality of work in operating wards, we have designed a set of pervasive computer systems which supports what we call context-mediated communication and awareness. These systems use large interactive displays, video streaming from key locations, tracking systems, and mobile devices to support social awareness and different types of communication modalities relevant to the current context. In this paper we report qualitative data from a one-year deployment of the system in a local hospital. Overall, this study shows that 75% of the participants strongly agreed that these systems had made their work easier.

  2. Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components.

    PubMed

    Fragopoulos, Anastasios; Gialelis, John; Serpanos, Dimitrios

    2009-01-01

    Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers.

  3. Distributed Accounting on the Grid

    NASA Technical Reports Server (NTRS)

    Thigpen, William; Hacker, Thomas J.; McGinnis, Laura F.; Athey, Brian D.

    2001-01-01

    By the late 1990s, the Internet was adequately equipped to move vast amounts of data between HPC (High Performance Computing) systems, and efforts were initiated to link together the national infrastructure of high performance computational and data storage resources together into a general computational utility 'grid', analogous to the national electrical power grid infrastructure. The purpose of the Computational grid is to provide dependable, consistent, pervasive, and inexpensive access to computational resources for the computing community in the form of a computing utility. This paper presents a fully distributed view of Grid usage accounting and a methodology for allocating Grid computational resources for use on a Grid computing system.

  4. Perspectives from the NSF-sponsored workshop on Grand Challenges in Nanomaterials

    NASA Astrophysics Data System (ADS)

    Hull, Robert

    2004-03-01

    At an NSF-sponsored workshop in June 2003, about seventy research leaders in the field of nanomaterials met to discuss, explore and identify future new directions and critical needs ("Grand Challenges") for the next decade and beyond. The key pervasive theme that was identified was the need to develop techniques for assembly of nanoscaled materials over multiple lengths scales, at the levels of efficiency, economy, and precision necessary to realize broad new classes of applications in such diverse technologies as electronics, computation, telecommunications, data storage, energy storage / transmission / generation, health care, transportation, civil infrastructure, military applications, national security, and the environment. Elements of this strategy include development of new self-assembly and lithographic techniques; biologically-mediated synthesis; three-dimensional atomic-scale measurement of structure, properties and chemistry; harnessing of the sub-atomic properties of materials such as electron spin and quantum interactions; new computational methods that span all relevant length- and time- scales; a fundamental understanding of acceptable / achievable "fault tolerance" at the nanoscale; and methods for real-time and distributed sensing of nanoscale assembly. A parallel theme was the need to provide education concerning the potential, applications, and benefits of nanomaterials to all components of society and all levels of the educational spectrum. This talk will summarize the conclusions and recommendations from this workshop, and illustrate the future potential of this field through presentation of selected break-through results provided by workshop participants.

  5. Using Multi-modal Sensing for Human Activity Modeling in the Real World

    NASA Astrophysics Data System (ADS)

    Harrison, Beverly L.; Consolvo, Sunny; Choudhury, Tanzeem

    Traditionally smart environments have been understood to represent those (often physical) spaces where computation is embedded into the users' surrounding infrastructure, buildings, homes, and workplaces. Users of this "smartness" move in and out of these spaces. Ambient intelligence assumes that users are automatically and seamlessly provided with context-aware, adaptive information, applications and even sensing - though this remains a significant challenge even when limited to these specialized, instrumented locales. Since not all environments are "smart" the experience is not a pervasive one; rather, users move between these intelligent islands of computationally enhanced space while we still aspire to achieve a more ideal anytime, anywhere experience. Two key technological trends are helping to bridge the gap between these smart environments and make the associated experience more persistent and pervasive. Smaller and more computationally sophisticated mobile devices allow sensing, communication, and services to be more directly and continuously experienced by user. Improved infrastructure and the availability of uninterrupted data streams, for instance location-based data, enable new services and applications to persist across environments.

  6. Interleaving Semantic Web Reasoning and Service Discovery to Enforce Context-Sensitive Security and Privacy Policies

    DTIC Science & Technology

    2005-07-01

    policies in pervasive computing environments. In this context, the owner of information sources (e.g. user, sensor, application, or organization...work in decentralized trust management and semantic web technologies . Section 3 introduces an Information Disclosure Agent architecture for...Norman Sadeh July 2005 CMU-ISRI-05-113 School of Computer Science, Carnegie Mellon University 5000 Forbes Avenue, Pittsburgh, PA, 15213

  7. Pervasive electronic nematicity in a cuprate superconductor

    NASA Astrophysics Data System (ADS)

    Wu, J.; Bollinger, A. T.; He, X.; Božović, I.

    2018-06-01

    We describe an extensive experimental study of La2-xSrxCuO4 films synthesized by molecular beam epitaxy and investigated by angle-resolved measurements of transverse resistivity (without applied magnetic field). The data show that an unusual metallic state, in which the rotational symmetry of the electron fluid is spontaneously broken, occurs in a large temperature and doping region. The superconducting state always emerges out of this nematic metal state.

  8. A privacy-strengthened scheme for E-Healthcare monitoring system.

    PubMed

    Huang, Chanying; Lee, Hwaseong; Lee, Dong Hoon

    2012-10-01

    Recent Advances in Wireless Body Area Networks (WBANs) offer unprecedented opportunities and challenges to the development of pervasive electronic healthcare (E-Healthcare) monitoring system. In E-Healthcare system, the processed data are patients' sensitive health data that are directly related to individuals' privacy. For this reason, privacy concern is of great importance for E-Healthcare system. Current existing systems for E-Healthcare services, however, have not yet provided sufficient privacy protection for patients. In order to offer adequate security and privacy, in this paper, we propose a privacy-enhanced scheme for patients' physical condition monitoring, which achieves dual effects: (1) providing unlinkability of health records and individual identity, and (2) supporting anonymous authentication and authorized data access. We also conduct a simulation experiment to evaluate the performance of the proposed scheme. The experimental results demonstrate that the proposed scheme achieves better performance in terms of computational complexity, communication overheads and querying efficiency compared with previous results.

  9. A Petrochemical Primer.

    ERIC Educational Resources Information Center

    Martin, Amy

    1991-01-01

    Informs the reader of the pervasiveness of petrochemicals in everyday life. Discusses the petroleum-to-petrochemical transformation at the refinery and issues related to how petroleum products will be utilized for fuel or nonfuel needs such as lubricants, computers, and medicine in the future. (MDH)

  10. Modeling Patterns of Activities using Activity Curves

    PubMed Central

    Dawadi, Prafulla N.; Cook, Diane J.; Schmitter-Edgecombe, Maureen

    2016-01-01

    Pervasive computing offers an unprecedented opportunity to unobtrusively monitor behavior and use the large amount of collected data to perform analysis of activity-based behavioral patterns. In this paper, we introduce the notion of an activity curve, which represents an abstraction of an individual’s normal daily routine based on automatically-recognized activities. We propose methods to detect changes in behavioral routines by comparing activity curves and use these changes to analyze the possibility of changes in cognitive or physical health. We demonstrate our model and evaluate our change detection approach using a longitudinal smart home sensor dataset collected from 18 smart homes with older adult residents. Finally, we demonstrate how big data-based pervasive analytics such as activity curve-based change detection can be used to perform functional health assessment. Our evaluation indicates that correlations do exist between behavior and health changes and that these changes can be automatically detected using smart homes, machine learning, and big data-based pervasive analytics. PMID:27346990

  11. Modeling Patterns of Activities using Activity Curves.

    PubMed

    Dawadi, Prafulla N; Cook, Diane J; Schmitter-Edgecombe, Maureen

    2016-06-01

    Pervasive computing offers an unprecedented opportunity to unobtrusively monitor behavior and use the large amount of collected data to perform analysis of activity-based behavioral patterns. In this paper, we introduce the notion of an activity curve , which represents an abstraction of an individual's normal daily routine based on automatically-recognized activities. We propose methods to detect changes in behavioral routines by comparing activity curves and use these changes to analyze the possibility of changes in cognitive or physical health. We demonstrate our model and evaluate our change detection approach using a longitudinal smart home sensor dataset collected from 18 smart homes with older adult residents. Finally, we demonstrate how big data-based pervasive analytics such as activity curve-based change detection can be used to perform functional health assessment. Our evaluation indicates that correlations do exist between behavior and health changes and that these changes can be automatically detected using smart homes, machine learning, and big data-based pervasive analytics.

  12. Pervasive electronic nematicity in a cuprate superconductor

    DOE PAGES

    Wu, J.; Bollinger, A. T.; He, X.; ...

    2018-03-07

    Here, we describe an extensive experimental study of La 2-xSr xCuO 4 films synthesized by molecular beam epitaxy and investigated by angle-resolved measurements of transverse resistivity (without applied magnetic field). The data show that an unusual metallic state, in which the rotational symmetry of the electron fluid is spontaneously broken, occurs in a large temperature and doping region. The superconducting state always emerges out of this nematic metal state.

  13. Deriving Requirements for Pervasive Well-Being Technology From Work Stress and Intervention Theory: Framework and Case Study.

    PubMed

    Koldijk, Saskia; Kraaij, Wessel; Neerincx, Mark A

    2016-07-05

    Stress in office environments is a big concern, often leading to burn-out. New technologies are emerging, such as easily available sensors, contextual reasoning, and electronic coaching (e-coaching) apps. In the Smart Reasoning for Well-being at Home and at Work (SWELL) project, we explore the potential of using such new pervasive technologies to provide support for the self-management of well-being, with a focus on individuals' stress-coping. Ideally, these new pervasive systems should be grounded in existing work stress and intervention theory. However, there is a large diversity of theories and they hardly provide explicit directions for technology design. The aim of this paper is to present a comprehensive and concise framework that can be used to design pervasive technologies that support knowledge workers to decrease stress. Based on a literature study we identify concepts relevant to well-being at work and select different work stress models to find causes of work stress that can be addressed. From a technical perspective, we then describe how sensors can be used to infer stress and the context in which it appears, and use intervention theory to further specify interventions that can be provided by means of pervasive technology. The resulting general framework relates several relevant theories: we relate "engagement and burn-out" to "stress", and describe how relevant aspects can be quantified by means of sensors. We also outline underlying causes of work stress and how these can be addressed with interventions, in particular utilizing new technologies integrating behavioral change theory. Based upon this framework we were able to derive requirements for our case study, the pervasive SWELL system, and we implemented two prototypes. Small-scale user studies proved the value of the derived technology-supported interventions. The presented framework can be used to systematically develop theory-based technology-supported interventions to address work stress. In the area of pervasive systems for well-being, we identified the following six key research challenges and opportunities: (1) performing multi-disciplinary research, (2) interpreting personal sensor data, (3) relating measurable aspects to burn-out, (4) combining strengths of human and technology, (5) privacy, and (6) ethics.

  14. Augmenting Trust Establishment in Dynamic Systems with Social Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lagesse, Brent J; Kumar, Mohan; Venkatesh, Svetha

    2010-01-01

    Social networking has recently flourished in popularity through the use of social websites. Pervasive computing resources have allowed people stay well-connected to each other through access to social networking resources. We take the position that utilizing information produced by relationships within social networks can assist in the establishment of trust for other pervasive computing applications. Furthermore, we describe how such a system can augment a sensor infrastructure used for event observation with information from mobile sensors (ie, mobile phones with cameras) controlled by potentially untrusted third parties. Pervasive computing systems are invisible systems, oriented around the user. As a result,more » many future pervasive systems are likely to include a social aspect to the system. The social communities that are developed in these systems can augment existing trust mechanisms with information about pre-trusted entities or entities to initially consider when beginning to establish trust. An example of such a system is the Collaborative Virtual Observation (CoVO) system fuses sensor information from disaparate sources in soft real-time to recreate a scene that provides observation of an event that has recently transpired. To accomplish this, CoVO must efficently access services whilst protecting the data from corruption from unknown remote nodes. CoVO combines dynamic service composition with virtual observation to utilize existing infrastructure with third party services available in the environment. Since these services are not under the control of the system, they may be unreliable or malicious. When an event of interest occurs, the given infrastructure (bus cameras, etc.) may not sufficiently cover the necessary information (be it in space, time, or sensor type). To enhance observation of the event, infrastructure is augmented with information from sensors in the environment that the infrastructure does not control. These sensors may be unreliable, uncooperative, or even malicious. Additionally, to execute queries in soft real-time, processing must be distributed to available systems in the environment. We propose to use information from social networks to satisfy these requirements. In this paper, we present our position that knowledge gained from social activities can be used to augment trust mechanisms in pervasive computing. The system uses social behavior of nodes to predict a subset that it wants to query for information. In this context, social behavior such as transit patterns and schedules (which can be used to determine if a queried node is likely to be reliable) or known relationships, such as a phone's address book, that can be used to determine networks of nodes that may also be able to assist in retrieving information. Neither implicit nor explicit relationships necessarily imply that the user trusts an entity, but rather will provide a starting place for establishing trust. The proposed framework utilizes social network information to assist in trust establishment when third-party sensors are used for sensing events.« less

  15. Mechanically flexible optically transparent silicon fabric with high thermal budget devices from bulk silicon (100)

    NASA Astrophysics Data System (ADS)

    Hussain, Muhammad M.; Rojas, Jhonathan P.; Torres Sevilla, Galo A.

    2013-05-01

    Today's information age is driven by silicon based electronics. For nearly four decades semiconductor industry has perfected the fabrication process of continuingly scaled transistor - heart of modern day electronics. In future, silicon industry will be more pervasive, whose application will range from ultra-mobile computation to bio-integrated medical electronics. Emergence of flexible electronics opens up interesting opportunities to expand the horizon of electronics industry. However, silicon - industry's darling material is rigid and brittle. Therefore, we report a generic batch fabrication process to convert nearly any silicon electronics into a flexible one without compromising its (i) performance; (ii) ultra-large-scale-integration complexity to integrate billions of transistors within small areas; (iii) state-of-the-art process compatibility, (iv) advanced materials used in modern semiconductor technology; (v) the most widely used and well-studied low-cost substrate mono-crystalline bulk silicon (100). In our process, we make trenches using anisotropic reactive ion etching (RIE) in the inactive areas (in between the devices) of a silicon substrate (after the devices have been fabricated following the regular CMOS process), followed by a dielectric based spacer formation to protect the sidewall of the trench and then performing an isotropic etch to create caves in silicon. When these caves meet with each other the top portion of the silicon with the devices is ready to be peeled off from the bottom silicon substrate. Release process does not need to use any external support. Released silicon fabric (25 μm thick) is mechanically flexible (5 mm bending radius) and the trenches make it semi-transparent (transparency of 7%).

  16. Computing technology in the 1980's. [computers

    NASA Technical Reports Server (NTRS)

    Stone, H. S.

    1978-01-01

    Advances in computing technology have been led by consistently improving semiconductor technology. The semiconductor industry has turned out ever faster, smaller, and less expensive devices since transistorized computers were first introduced 20 years ago. For the next decade, there appear to be new advances possible, with the rate of introduction of improved devices at least equal to the historic trends. The implication of these projections is that computers will enter new markets and will truly be pervasive in business, home, and factory as their cost diminishes and their computational power expands to new levels. The computer industry as we know it today will be greatly altered in the next decade, primarily because the raw computer system will give way to computer-based turn-key information and control systems.

  17. Pervasive sensing

    NASA Astrophysics Data System (ADS)

    Nagel, David J.

    2000-11-01

    The coordinated exploitation of modern communication, micro- sensor and computer technologies makes it possible to give global reach to our senses. Web-cameras for vision, web- microphones for hearing and web-'noses' for smelling, plus the abilities to sense many factors we cannot ordinarily perceive, are either available or will be soon. Applications include (1) determination of weather and environmental conditions on dense grids or over large areas, (2) monitoring of energy usage in buildings, (3) sensing the condition of hardware in electrical power distribution and information systems, (4) improving process control and other manufacturing, (5) development of intelligent terrestrial, marine, aeronautical and space transportation systems, (6) managing the continuum of routine security monitoring, diverse crises and military actions, and (7) medicine, notably the monitoring of the physiology and living conditions of individuals. Some of the emerging capabilities, such as the ability to measure remotely the conditions inside of people in real time, raise interesting social concerns centered on privacy issues. Methods for sensor data fusion and designs for human-computer interfaces are both crucial for the full realization of the potential of pervasive sensing. Computer-generated virtual reality, augmented with real-time sensor data, should be an effective means for presenting information from distributed sensors.

  18. A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks.

    PubMed

    Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N

    2015-12-01

    With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.

  19. A Pervasive Parallel Processing Framework for Data Visualization and Analysis at Extreme Scale

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma, Kwan-Liu

    Most of today’s visualization libraries and applications are based off of what is known today as the visualization pipeline. In the visualization pipeline model, algorithms are encapsulated as “filtering” components with inputs and outputs. These components can be combined by connecting the outputs of one filter to the inputs of another filter. The visualization pipeline model is popular because it provides a convenient abstraction that allows users to combine algorithms in powerful ways. Unfortunately, the visualization pipeline cannot run effectively on exascale computers. Experts agree that the exascale machine will comprise processors that contain many cores. Furthermore, physical limitations willmore » prevent data movement in and out of the chip (that is, between main memory and the processing cores) from keeping pace with improvements in overall compute performance. To use these processors to their fullest capability, it is essential to carefully consider memory access. This is where the visualization pipeline fails. Each filtering component in the visualization library is expected to take a data set in its entirety, perform some computation across all of the elements, and output the complete results. The process of iterating over all elements must be repeated in each filter, which is one of the worst possible ways to traverse memory when trying to maximize the number of executions per memory access. This project investigates a new type of visualization framework that exhibits a pervasive parallelism necessary to run on exascale machines. Our framework achieves this by defining algorithms in terms of functors, which are localized, stateless operations. Functors can be composited in much the same way as filters in the visualization pipeline. But, functors’ design allows them to be concurrently running on massive amounts of lightweight threads. Only with such fine-grained parallelism can we hope to fill the billions of threads we expect will be necessary for efficient computation on an exascale computer. This project concludes with a functional prototype containing pervasively parallel algorithms that perform demonstratively well on many-core processors. These algorithms are fundamental for performing data analysis and visualization at extreme scale.« less

  20. Understanding and Dealing with Bullying in Schools

    ERIC Educational Resources Information Center

    Yerger, William; Gehret, Cliff

    2011-01-01

    One of the most difficult problems that educators face today is dealing with bullying. This pervasive issue occurs in classrooms, lunch rooms, unsupervised areas, on playgrounds, and through electronic media. Based on the principles of protecting the child and establishing a safe environment for all students, this paper investigates the causes and…

  1. Data Integrity: Beware of Viruses

    ERIC Educational Resources Information Center

    Bergren, Martha Dewey

    2004-01-01

    School nurses and health office employees are the creators and caretakers of legal documentation. School nurses have an ethical and legal obligation to protect the integrity of electronic student health records. Although there are many threats to data integrity, from inadequate hardware to electrical surges, one of the most pervasive threats to…

  2. Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology

    PubMed Central

    Zao, John K.; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodríguez Méndez, Sergio José; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping

    2014-01-01

    EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system. PMID:24917804

  3. Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology.

    PubMed

    Zao, John K; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodríguez Méndez, Sergio José; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping

    2014-01-01

    EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system.

  4. Video and computer games: effect on children and implications for health education.

    PubMed

    Dorman, S M

    1997-04-01

    Video and computer-based games have assumed a prominent role in the culture of American children and adolescents. Given the pervasiveness of their influence, it is likely that these games may affect the health and well-being of children. This paper examines the health effects of these games on children, suggests criteria upon which parents and teachers may evaluate the games, and notes some implications for health educators.

  5. Investigating the Randomness of Numbers

    ERIC Educational Resources Information Center

    Pendleton, Kenn L.

    2009-01-01

    The use of random numbers is pervasive in today's world. Random numbers have practical applications in such far-flung arenas as computer simulations, cryptography, gambling, the legal system, statistical sampling, and even the war on terrorism. Evaluating the randomness of extremely large samples is a complex, intricate process. However, the…

  6. Not just fear and sadness: meta-analytic evidence of pervasive emotion recognition deficits for facial and vocal expressions in psychopathy.

    PubMed

    Dawel, Amy; O'Kearney, Richard; McKone, Elinor; Palermo, Romina

    2012-11-01

    The present meta-analysis aimed to clarify whether deficits in emotion recognition in psychopathy are restricted to certain emotions and modalities or whether they are more pervasive. We also attempted to assess the influence of other important variables: age, and the affective factor of psychopathy. A systematic search of electronic databases and a subsequent manual search identified 26 studies that included 29 experiments (N = 1376) involving six emotion categories (anger, disgust, fear, happiness, sadness, surprise) across three modalities (facial, vocal, postural). Meta-analyses found evidence of pervasive impairments across modalities (facial and vocal) with significant deficits evident for several emotions (i.e., not only fear and sadness) in both adults and children/adolescents. These results are consistent with recent theorizing that the amygdala, which is believed to be dysfunctional in psychopathy, has a broad role in emotion processing. We discuss limitations of the available data that restrict the ability of meta-analysis to consider the influence of age and separate the sub-factors of psychopathy, highlighting important directions for future research. Copyright © 2012 Elsevier Ltd. All rights reserved.

  7. Principled design for an integrated computational environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Disessa, A.A.

    Boxer is a computer language designed to be the base of an integrated computational environment providing a broad array of functionality -- from text editing to programming -- for naive and novice users. It stands in the line of Lisp inspired languages (Lisp, Logo, Scheme), but differs from these in achieving much of its understandability from pervasive use of a spatial metaphor reinforced through suitable graphics. This paper describes a set of learnability and understandability issues first and then uses them to motivate design decisions made concerning Boxer and the environment in which it is embedded.

  8. Screen Media and Young Children: Who Benefits?

    ERIC Educational Resources Information Center

    Cardany, Audrey Berger

    2010-01-01

    Since the airing of "Sesame Street" in 1985, television produced for children has expanded to more television shows and educational media that includes videos, DVDs, and computer products. Viewing screen media is pervasive in the environments of young children, and companies are designing products for our youngest viewers--infants and toddlers.…

  9. Interface Architecture for Testing in Foreign Language Education

    ERIC Educational Resources Information Center

    Laborda, Jesus Garcia

    2009-01-01

    The implications of new learning environments have been far-reaching and pervasive (Plass, 1998), at least in the field of interface design both in traditional computer and mobile devices (Fallahkhair, Pemberton, & Griffiths, 2007). Given the current status of efficient models, educators need the unproven unification of interfaces and working…

  10. The Gamification of Learning

    ERIC Educational Resources Information Center

    Renaud, Christian; Wagoner, Bridgette

    2011-01-01

    The use of computer-based gaming in education is not a new phenomenon. Many educators nostalgically remember green Apple II monitors displaying the games Lemonade Stand and Oregon Trail in the early 1980s. Technology in schools has evolved considerably since then, and gaming has become pervasive within all demographic subgroups. Gaming within…

  11. Collaborative Joins in a Pervasive Computing Environment

    DTIC Science & Technology

    2003-07-28

    the available resources of each device. For example, CQP allows a tourist to use her handheld device to ask for the closest cheapest laundromat that is...open, given her current location, time of the day and a price range. The protocol also allows the tourist to ask for the closest laundromat adjacent

  12. Programmer/Analyst Guide for the Army Unit Resiliency Analysis (AURA) computer Simulation Model. Volume 1. AURA Methodology

    DTIC Science & Technology

    1990-10-01

    involving a heavy artillery barrage, the impact point output alone could consume upwards of 10,000 pages of computer paper. For this reason, AURA provides...but pervasive factor: the asset allocation model must be compatible with the mathematical behavior of the input data. Thus, for example, if assets are...described as expendable during repair or decontamination activities, it must have HOMELINKS which appear in the consuming repair SUBCHAINs

  13. Engineering Amorphous Systems, Using Global-to-Local Compilation

    NASA Astrophysics Data System (ADS)

    Nagpal, Radhika

    Emerging technologies are making it possible to assemble systems that incorporate myriad of information-processing units at almost no cost: smart materials, selfassembling structures, vast sensor networks, pervasive computing. How does one engineer robust and prespecified global behavior from the local interactions of immense numbers of unreliable parts? We discuss organizing principles and programming methodologies that have emerged from Amorphous Computing research, that allow us to compile a specification of global behavior into a robust program for local behavior.

  14. Neural and Behavioral Evidence for a Link between Mobile Technology Engagement and Intertemporal Preference

    ERIC Educational Resources Information Center

    Wilmer, Henry H.

    2017-01-01

    Mobile electronic devices such as smartphones are playing an increasingly pervasive role in our daily activities. A growing body of literature is beginning to investigate how mobile technology habits might relate to individual differences in cognitive traits. The present study is an investigation into how individual differences in intertemporal…

  15. Deriving Requirements for Pervasive Well-Being Technology From Work Stress and Intervention Theory: Framework and Case Study

    PubMed Central

    Koldijk, Saskia; Kraaij, Wessel

    2016-01-01

    Background Stress in office environments is a big concern, often leading to burn-out. New technologies are emerging, such as easily available sensors, contextual reasoning, and electronic coaching (e-coaching) apps. In the Smart Reasoning for Well-being at Home and at Work (SWELL) project, we explore the potential of using such new pervasive technologies to provide support for the self-management of well-being, with a focus on individuals' stress-coping. Ideally, these new pervasive systems should be grounded in existing work stress and intervention theory. However, there is a large diversity of theories and they hardly provide explicit directions for technology design. Objective The aim of this paper is to present a comprehensive and concise framework that can be used to design pervasive technologies that support knowledge workers to decrease stress. Methods Based on a literature study we identify concepts relevant to well-being at work and select different work stress models to find causes of work stress that can be addressed. From a technical perspective, we then describe how sensors can be used to infer stress and the context in which it appears, and use intervention theory to further specify interventions that can be provided by means of pervasive technology. Results The resulting general framework relates several relevant theories: we relate “engagement and burn-out” to “stress”, and describe how relevant aspects can be quantified by means of sensors. We also outline underlying causes of work stress and how these can be addressed with interventions, in particular utilizing new technologies integrating behavioral change theory. Based upon this framework we were able to derive requirements for our case study, the pervasive SWELL system, and we implemented two prototypes. Small-scale user studies proved the value of the derived technology-supported interventions. Conclusions The presented framework can be used to systematically develop theory-based technology-supported interventions to address work stress. In the area of pervasive systems for well-being, we identified the following six key research challenges and opportunities: (1) performing multi-disciplinary research, (2) interpreting personal sensor data, (3) relating measurable aspects to burn-out, (4) combining strengths of human and technology, (5) privacy, and (6) ethics. PMID:27380749

  16. Cloud@Home: A New Enhanced Computing Paradigm

    NASA Astrophysics Data System (ADS)

    Distefano, Salvatore; Cunsolo, Vincenzo D.; Puliafito, Antonio; Scarpa, Marco

    Cloud computing is a distributed computing paradigm that mixes aspects of Grid computing, ("… hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities" (Foster, 2002)) Internet Computing ("…a computing platform geographically distributed across the Internet" (Milenkovic et al., 2003)), Utility computing ("a collection of technologies and business practices that enables computing to be delivered seamlessly and reliably across multiple computers, ... available as needed and billed according to usage, much like water and electricity are today" (Ross & Westerman, 2004)) Autonomic computing ("computing systems that can manage themselves given high-level objectives from administrators" (Kephart & Chess, 2003)), Edge computing ("… provides a generic template facility for any type of application to spread its execution across a dedicated grid, balancing the load …" Davis, Parikh, & Weihl, 2004) and Green computing (a new frontier of Ethical computing1 starting from the assumption that in next future energy costs will be related to the environment pollution).

  17. Real-Time Robust Adaptive Modeling and Scheduling for an Electronic Commerce Server

    NASA Astrophysics Data System (ADS)

    Du, Bing; Ruan, Chun

    With the increasing importance and pervasiveness of Internet services, it is becoming a challenge for the proliferation of electronic commerce services to provide performance guarantees under extreme overload. This paper describes a real-time optimization modeling and scheduling approach for performance guarantee of electronic commerce servers. We show that an electronic commerce server may be simulated as a multi-tank system. A robust adaptive server model is subject to unknown additive load disturbances and uncertain model matching. Overload control techniques are based on adaptive admission control to achieve timing guarantees. We evaluate the performance of the model using a complex simulation that is subjected to varying model parameters and massive overload.

  18. Smart Dust--Friend or Foe?

    ERIC Educational Resources Information Center

    Roman, Harry T.

    2012-01-01

    Nanotechnology is now making it possible to create radically new tiny machines and sensors on par with the size of dust motes. This technology is rapidly progressing and will make profound impacts on the nation's global competitiveness. It promises to be a most pervasive technological advance, comparable to what computers did for an individual's…

  19. E-Learning Today: A Review of Research on Hypertext Comprehension

    ERIC Educational Resources Information Center

    Hinesley, Gail A.

    2007-01-01

    Use of hypertext is pervasive in education today--it is used for all online course delivery as well as many stand-alone delivery methods such as educational computer software and compact discs (CDs). This article will review Kintsch's Construction-Integration and Anderson's Adaptive Control of Thought-Rational (ACT-R) cognitive architectures and…

  20. Institutional Expansion: The Case of Grid Computing

    ERIC Educational Resources Information Center

    Kertcher, Zack

    2010-01-01

    Evolutionary and revolutionary approaches have dominated the study of scientific, technological and institutional change. Yet, being focused on change within a single field, these approaches have been mute about a third, pervasive process. This process is found in a variety of cases that range from open source software to the Monte Carlo method to…

  1. The Role of Technology in Teaching Languages for Specific Purposes Courses

    ERIC Educational Resources Information Center

    Arno-Macia, Elisabet

    2012-01-01

    Within the integration of technology into language education, special attention needs to be paid to languages for specific purposes (LSP), drawing on developments in computer-assisted language learning and applied linguistics, on the one hand, and on the pervasive use of technology in academic and professional communication, on the other. From a…

  2. Pedagogic Transformation, Student-Directed Design and Computational Thinking

    ERIC Educational Resources Information Center

    Vallance, Michael; Towndrow, Phillip A.

    2016-01-01

    In a world where technology has become pervasive in our lives, the notion of IT integration in education practice is losing its significance. It is now more appropriate to discuss transforming pedagogy where technology is not considered a tool anymore but part of what we are. To advance this hypothesis, an enterprising, student-directed approach…

  3. QR Codes in Higher Ed: Fad or Functional Tool?

    ERIC Educational Resources Information Center

    Gradel, Kathleen; Edson, Alden J.

    2013-01-01

    As higher education grapples with addressing the 21st century needs of learners, technology is a pervasive concern. Waters (2012) painted a picture of three historical "screens," namely the television screen, the computer monitor, and today's mobile device screen. As mobile devices become increasingly commonplace in the workplace and on the…

  4. Wireless Sensor Node Data Gathering and Location Mapping

    DTIC Science & Technology

    2012-03-01

    adaptive two-phase approach to WiFi location sensing,” 4 th Int. Conf. on Pervasive Computing and Communications Workshops, Pisa, Italy, 2006, pp. 452...wrt.v24_micro_generic.bin, March 2010. [11] P. Asadoorian and L. Pesce, Linksys WRT54G Ultimate Hacking , Burlington, MA: Syngress, 2007, pp. 25. 32

  5. The Road to 24/7

    ERIC Educational Resources Information Center

    Briggs, Linda L.

    2006-01-01

    Wireless and mobile technologies are now everywhere, and 24/7 computing is as pervasive a term as the actual capability promises to be. Sometimes, in fact, the push toward mobile technologies can seem overwhelming. But every wireless project doesn't have to involve redesigning the network and investing in mega-dollars worth of hardware and…

  6. Integrating Digital and STEM Practices

    ERIC Educational Resources Information Center

    White, Tobin; Martin, Lee

    2012-01-01

    As mobile devices become increasingly pervasive among youth, the gap between students with and without access to personal computers at home may soon be replaced by a new digital divide: between one set of informal ways of using those tools that are familiar, personally meaningful, and relevant to their out-of-school lives, and another set of uses…

  7. Is Texting Ruining Intimacy? Exploring Perceptions among Sexuality Students in Higher Education

    ERIC Educational Resources Information Center

    McGee, Michael J.

    2014-01-01

    In the context of researchers' and educators' concerns about the pervasive use of technology to communicate with one another, this study explored whether the frequency of emerging adults' computer-mediated communication (CMC) is correlated with their perceptions of intimacy, relationship, and sexual satisfaction. The sample included 298 young…

  8. Media Literacy: What, Why, and How?

    ERIC Educational Resources Information Center

    Grace, Donna J.

    2005-01-01

    Literacy has traditionally been associated with the printed word. But today, print literacy is not enough. Children and youth need to learn to "read" and interpret visual images as well. Film, television, videos, DVDs, computer games, and the Internet all hold a prominent and pervasive place in one's culture. Its presence in people's lives is only…

  9. Optimal Software Strategies in the Presence of Network Externalities

    ERIC Educational Resources Information Center

    Liu, Yipeng

    2009-01-01

    Network externalities or alternatively termed network effects are pervasive in computer software markets. While software vendors consider pricing strategies, they must also take into account the impact of network externalities on their sales. My main interest in this research is to describe a firm's strategies and behaviors in the presence of…

  10. Codifying a Next-Generation Education System: New York City iSchool

    ERIC Educational Resources Information Center

    Education Development Center, Inc, 2009

    2009-01-01

    The world outside schools is changing rapidly with the advances of technology and economic requirements for a 21st-century global citizenry. Today, technology has moved into one's everyday life and is becoming a pervasive part of how one works, learns, and plays. Similarly, networked communications and computer technology have transformed the…

  11. Transformation in the pharmaceutical industry--a systematic review of the literature.

    PubMed

    Shafiei, Nader; Ford, James L; Morecroft, Charles W; Lisboa, Paulo J; Taylor, Mark J; Mouzughi, Yusra

    2013-01-01

    The evolutionary development of pharmaceutical transformation was studied through systematic review of the literature. Fourteen triggers were identified that will affect the pharmaceutical business, regulatory science, and enabling technologies in future years. The relative importance ranking of the transformation triggers was computed based on their prevalence within the articles studied. The four main triggers with the strongest literature evidence were Fully Integrated Pharma Network, Personalized Medicine, Translational Research, and Pervasive Computing. The theoretical quality risks for each of the four main transformation triggers are examined, and the remaining ten triggers are described. The pharmaceutical industry is currently going through changes that affect the way it performs its research, manufacturing, and regulatory activities (this is termed pharmaceutical transformation). The impact of these changes on the approaches to quality risk management requires more understanding. In this paper, a comprehensive review of the academic, regulatory, and industry literature were used to identify 14 triggers that influence pharmaceutical transformation. The four main triggers, namely Fully Integrated Pharma Network, Personalized Medicine, Translational Research, and Pervasive Computing, were selected as the most important based on the strength of the evidence found during the literature review activity described in this paper. Theoretical quality risks for each of the four main transformation triggers are examined, and the remaining ten triggers are described.

  12. Smart Classroom: Bringing Pervasive Computing into Distance Learning

    NASA Astrophysics Data System (ADS)

    Shi, Yuanchun; Qin, Weijun; Suo, Yue; Xiao, Xin

    In recent years, distance learning has increasingly become one of themost important applications on the internet and is being discussed and studied by various universities, institutes and companies. The Web/Internet provides relatively easy ways to publish hyper-linked multimedia content for more audiences. Yet, we find that most of the courseware are simply shifted from textbook to HTML files. However, in ost cases the teacher's live instruction is very important for catching the attention and interest of the students. That's why Real-Time Interactive Virtual Classroom (RTIVC) always plays an indispensable role in distance learning, where teachers nd students located in different places can take part in the class synchronously through certain multimedia communication systems and obtain real-time and mediarich interactions using Pervasive Computing technologies [1]. The Classroom 2000 project [2] at GIT has been devoted to the automated capturing of the classroom experience. Likewise, the Smart Classroom project [3] at our institute is focused on Tele-education. Most currently deployed real-time Tele-education systems are desktop-based, in which the teacher's experience is totally different from teaching in a real classroom.

  13. Fault detection and isolation in motion monitoring system.

    PubMed

    Kim, Duk-Jin; Suk, Myoung Hoon; Prabhakaran, B

    2012-01-01

    Pervasive computing becomes very active research field these days. A watch that can trace human movement to record motion boundary as well as to study of finding social life pattern by one's localized visiting area. Pervasive computing also helps patient monitoring. A daily monitoring system helps longitudinal study of patient monitoring such as Alzheimer's and Parkinson's or obesity monitoring. Due to the nature of monitoring sensor (on-body wireless sensor), however, signal noise or faulty sensors errors can be present at any time. Many research works have addressed these problems any with a large amount of sensor deployment. In this paper, we present the faulty sensor detection and isolation using only two on-body sensors. We have been investigating three different types of sensor errors: the SHORT error, the CONSTANT error, and the NOISY SENSOR error (see more details on section V). Our experimental results show that the success rate of isolating faulty signals are an average of over 91.5% on fault type 1, over 92% on fault type 2, and over 99% on fault type 3 with the fault prior of 30% sensor errors.

  14. Why I think Computational Physics has been the most valuable part of my undergraduate physics education

    NASA Astrophysics Data System (ADS)

    Parsons, Matthew

    2015-04-01

    Computational physics is a rich and vibrant field in its own right, but often not given the attention that it should receive in the typical undergraduate physics curriculum. It appears that the partisan theorist vs. experimentalist view is still pervasive in academia, or at least still portrayed to students, while in fact there is a continuous spectrum of opportunities in between these two extremes. As a case study, I'll give my perspective as a graduating physics student with examples of computational coursework at Drexel University and research opportunities that this experience has led to.

  15. Human-technology Integration

    NASA Astrophysics Data System (ADS)

    Mullen, Katharine M.

    Human-technology integration is the replacement of human parts and extension of human capabilities with engineered devices and substrates. Its result is hybrid biological-artificial systems. We discuss here four categories of products furthering human-technology integration: wearable computers, pervasive computing environments, engineered tissues and organs, and prosthetics, and introduce examples of currently realized systems in each category. We then note that realization of a completely artificial sytem via the path of human-technology integration presents the prospect of empirical confirmation of an aware artificially embodied system.

  16. Web-Based Machine Translation as a Tool for Promoting Electronic Literacy and Language Awareness

    ERIC Educational Resources Information Center

    Williams, Lawrence

    2006-01-01

    This article addresses a pervasive problem of concern to teachers of many foreign languages: the use of Web-Based Machine Translation (WBMT) by students who do not understand the complexities of this relatively new tool. Although networked technologies have greatly increased access to many language and communication tools, WBMT is still…

  17. Preparing Accounting Graduates for Digital Revolution: A Critical Review of Information Technology Competencies and Skills Development

    ERIC Educational Resources Information Center

    Pan, Gary; Seow, Poh-Sun

    2016-01-01

    The pervasiveness of information technology (IT) in businesses has altered the nature and economies of accounting activities. In particular, the emergence of cloud computing, eXtensible Business Reporting Language, and business analytics in recent years have transformed the way companies report financial performance and make business decisions. As…

  18. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    NASA Astrophysics Data System (ADS)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  19. Reading for the Purpose of Responding to Literature: EFL Students' Perceptions of E-Books

    ERIC Educational Resources Information Center

    Chou, I-Chia

    2016-01-01

    As electronic books continue to attract attention as a pedagogical tool in language classrooms, the impact that e-books are expected to have on higher education cannot be ignored. Despite the pervasiveness of e-book reading studies in higher education, most studies show that students' reactions to e-books are often negative. However, the effects…

  20. Multimodal and ubiquitous computing systems: supporting independent-living older users.

    PubMed

    Perry, Mark; Dowdall, Alan; Lines, Lorna; Hone, Kate

    2004-09-01

    We document the rationale and design of a multimodal interface to a pervasive/ubiquitous computing system that supports independent living by older people in their own homes. The Millennium Home system involves fitting a resident's home with sensors--these sensors can be used to trigger sequences of interaction with the resident to warn them about dangerous events, or to check if they need external help. We draw lessons from the design process and conclude the paper with implications for the design of multimodal interfaces to ubiquitous systems developed for the elderly and in healthcare, as well as for more general ubiquitous computing applications.

  1. Machine learning methods for classifying human physical activity from on-body accelerometers.

    PubMed

    Mannini, Andrea; Sabatini, Angelo Maria

    2010-01-01

    The use of on-body wearable sensors is widespread in several academic and industrial domains. Of great interest are their applications in ambulatory monitoring and pervasive computing systems; here, some quantitative analysis of human motion and its automatic classification are the main computational tasks to be pursued. In this paper, we discuss how human physical activity can be classified using on-body accelerometers, with a major emphasis devoted to the computational algorithms employed for this purpose. In particular, we motivate our current interest for classifiers based on Hidden Markov Models (HMMs). An example is illustrated and discussed by analysing a dataset of accelerometer time series.

  2. The MADE Reference Information Model for Interoperable Pervasive Telemedicine Systems.

    PubMed

    Fung, Nick L S; Jones, Valerie M; Hermens, Hermie J

    2017-03-23

    The main objective is to develop and validate a reference information model (RIM) to support semantic interoperability of pervasive telemedicine systems. The RIM is one component within a larger, computer-interpretable "MADE language" developed by the authors in the context of the MobiGuide project. To validate our RIM, we applied it to a clinical guideline for patients with gestational diabetes mellitus (GDM). The RIM is derived from a generic data flow model of disease management which comprises a network of four types of concurrent processes: Monitoring (M), Analysis (A), Decision (D) and Effectuation (E). This resulting MADE RIM, which was specified using the formal Vienna Development Method (VDM), includes six main, high-level data types representing measurements, observations, abstractions, action plans, action instructions and control instructions. The authors applied the MADE RIM to the complete GDM guideline and derived from it a domain information model (DIM) comprising 61 archetypes, specifically 1 measurement, 8 observation, 10 abstraction, 18 action plan, 3 action instruction and 21 control instruction archetypes. It was observed that there are six generic patterns for transforming different guideline elements into MADE archetypes, although a direct mapping does not exist in some cases. Most notable examples are notifications to the patient and/or clinician as well as decision conditions which pertain to specific stages in the therapy. The results provide evidence that the MADE RIM is suitable for modelling clinical data in the design of pervasive telemedicine systems. Together with the other components of the MADE language, the MADE RIM supports development of pervasive telemedicine systems that are interoperable and independent of particular clinical applications.

  3. Examining the Criterion-Related Validity of the Pervasive Developmental Disorder Behavior Inventory

    ERIC Educational Resources Information Center

    McMorris, Carly A.; Perry, Adrienne

    2015-01-01

    The Pervasive Developmental Disorder Behavior Inventory is a questionnaire designed to aid in the diagnosis of pervasive developmental disorders or autism spectrum disorders. The Pervasive Developmental Disorder Behavior Inventory assesses adaptive and maladaptive behaviors associated with pervasive developmental disorders and provides an…

  4. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Tests of pervasive poverty... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty is demonstrated by evidence that: (1...

  5. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Tests of pervasive poverty... ENTERPRISE COMMUNITIES: ROUND ONE DESIGNATIONS Area Requirements § 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the...

  6. Pervasive transcription: detecting functional RNAs in bacteria.

    PubMed

    Lybecker, Meghan; Bilusic, Ivana; Raghavan, Rahul

    2014-01-01

    Pervasive, or genome-wide, transcription has been reported in all domains of life. In bacteria, most pervasive transcription occurs antisense to protein-coding transcripts, although recently a new class of pervasive RNAs was identified that originates from within annotated genes. Initially considered to be non-functional transcriptional noise, pervasive transcription is increasingly being recognized as important in regulating gene expression. The function of pervasive transcription is an extensively debated question in the field of transcriptomics and regulatory RNA biology. Here, we highlight the most recent contributions addressing the purpose of pervasive transcription in bacteria and discuss their implications.

  7. Trusted measurement model based on multitenant behaviors.

    PubMed

    Ning, Zhen-Hu; Shen, Chang-Xiang; Zhao, Yong; Liang, Peng

    2014-01-01

    With a fast growing pervasive computing, especially cloud computing, the behaviour measurement is at the core and plays a vital role. A new behaviour measurement tailored for Multitenants in cloud computing is needed urgently to fundamentally establish trust relationship. Based on our previous research, we propose an improved trust relationship scheme which captures the world of cloud computing where multitenants share the same physical computing platform. Here, we first present the related work on multitenant behaviour; secondly, we give the scheme of behaviour measurement where decoupling of multitenants is taken into account; thirdly, we explicitly explain our decoupling algorithm for multitenants; fourthly, we introduce a new way of similarity calculation for deviation control, which fits the coupled multitenants under study well; lastly, we design the experiments to test our scheme.

  8. Trusted Measurement Model Based on Multitenant Behaviors

    PubMed Central

    Ning, Zhen-Hu; Shen, Chang-Xiang; Zhao, Yong; Liang, Peng

    2014-01-01

    With a fast growing pervasive computing, especially cloud computing, the behaviour measurement is at the core and plays a vital role. A new behaviour measurement tailored for Multitenants in cloud computing is needed urgently to fundamentally establish trust relationship. Based on our previous research, we propose an improved trust relationship scheme which captures the world of cloud computing where multitenants share the same physical computing platform. Here, we first present the related work on multitenant behaviour; secondly, we give the scheme of behaviour measurement where decoupling of multitenants is taken into account; thirdly, we explicitly explain our decoupling algorithm for multitenants; fourthly, we introduce a new way of similarity calculation for deviation control, which fits the coupled multitenants under study well; lastly, we design the experiments to test our scheme. PMID:24987731

  9. A Study of English Mobile Learning Applications at National Chengchi University

    ERIC Educational Resources Information Center

    Che, Pei-Chun; Lin, Han-Yi; Jang, Hung-Chin; Lien, Yao-Nan; Tsai, Tzu-Chieh

    2009-01-01

    The pervasive popularity of the Internet in the past decade has changed the way many students live and learn, in part, because modern technology has made it possible for learners to access Real-Time Multimedia information on the Internet, or research any topic of interest to them from virtually any computer anywhere in the world. Students can also…

  10. Designing Robust and Resilient Tactical MANETs

    DTIC Science & Technology

    2014-09-25

    Bounds on the Throughput Efficiency of Greedy Maximal Scheduling in Wireless Networks , IEEE/ACM Transactions on Networking , (06 2011): 0. doi: N... Wireless Sensor Networks and Effects of Long Range Dependant Data, Special IWSM Issue of Sequential Analysis, (11 2012): 0. doi: A. D. Dominguez...Bushnell, R. Poovendran. A Convex Optimization Approach for Clone Detection in Wireless Sensor Networks , Pervasive and Mobile Computing, (01 2012

  11. Comparing Learners' State Anxiety during Task-Based Interaction in Computer-Mediated and Face-to-Face Communication

    ERIC Educational Resources Information Center

    Baralt, Melissa; Gurzynski-Weiss, Laura

    2011-01-01

    The construct of anxiety is often believed to be the affective factor with the greatest potential to pervasively affect the learning process (Horwitz, 2001), and recent research has demonstrated that anxiety can mediate whether learners are able to notice feedback and subsequently produce output (Sheen, 2008). In order to reduce the negative…

  12. Grids: The Top Ten Questions

    DOE PAGES

    Schopf, Jennifer M.; Nitzberg, Bill

    2002-01-01

    The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A distributed infrastructure capable of sophisticated computational functions can bring many benefits to scientific work, but poses many challenges, both technical and socio-political. Technical challenges include having basic software tools, higher-level services, functioning and pervasive security, and standards, while socio-political issues include building a user community, adding incentives for sites to be part of a user-centric environment, and educating funding sources about the needs of this community. This paper details the areasmore » relating to Grid research that we feel still need to be addressed to fully leverage the advantages of the Grid.« less

  13. An element search ant colony technique for solving virtual machine placement problem

    NASA Astrophysics Data System (ADS)

    Srija, J.; Rani John, Rose; Kanaga, Grace Mary, Dr.

    2017-09-01

    The data centres in the cloud environment play a key role in providing infrastructure for ubiquitous computing, pervasive computing, mobile computing etc. This computing technique tries to utilize the available resources in order to provide services. Hence maintaining the resource utilization without wastage of power consumption has become a challenging task for the researchers. In this paper we propose the direct guidance ant colony system for effective mapping of virtual machines to the physical machine with maximal resource utilization and minimal power consumption. The proposed algorithm has been compared with the existing ant colony approach which is involved in solving virtual machine placement problem and thus the proposed algorithm proves to provide better result than the existing technique.

  14. E-waste: an assessment of global production and environmental impacts.

    PubMed

    Robinson, Brett H

    2009-12-20

    E-waste comprises discarded electronic appliances, of which computers and mobile telephones are disproportionately abundant because of their short lifespan. The current global production of E-waste is estimated to be 20-25 million tonnes per year, with most E-waste being produced in Europe, the United States and Australasia. China, Eastern Europe and Latin America will become major E-waste producers in the next ten years. Miniaturisation and the development of more efficient cloud computing networks, where computing services are delivered over the internet from remote locations, may offset the increase in E-waste production from global economic growth and the development of pervasive new technologies. E-waste contains valuable metals (Cu, platinum group) as well as potential environmental contaminants, especially Pb, Sb, Hg, Cd, Ni, polybrominated diphenyl ethers (PBDEs), and polychlorinated biphenyls (PCBs). Burning E-waste may generate dioxins, furans, polycyclic aromatic hydrocarbons (PAHs), polyhalogenated aromatic hydrocarbons (PHAHs), and hydrogen chloride. The chemical composition of E-waste changes with the development of new technologies and pressure from environmental organisations on electronics companies to find alternatives to environmentally damaging materials. Most E-waste is disposed in landfills. Effective reprocessing technology, which recovers the valuable materials with minimal environmental impact, is expensive. Consequently, although illegal under the Basel Convention, rich countries export an unknown quantity of E-waste to poor countries, where recycling techniques include burning and dissolution in strong acids with few measures to protect human health and the environment. Such reprocessing initially results in extreme localised contamination followed by migration of the contaminants into receiving waters and food chains. E-waste workers suffer negative health effects through skin contact and inhalation, while the wider community are exposed to the contaminants through smoke, dust, drinking water and food. There is evidence that E-waste associated contaminants may be present in some agricultural or manufactured products for export.

  15. Design and Development of Non-Contact Bio-Potential Electrodes for Pervasive Health Monitoring Applications.

    PubMed

    Portelli, Anthony J; Nasuto, Slawomir J

    2017-01-01

    For the advent of pervasive bio-potential monitoring, it will be necessary to utilize a combination of cheap, quick to apply, low-noise electrodes and compact electronics with wireless technologies. Once available, all electrical activity resulting from the processes of the human body could be actively and constantly monitored without the need for cumbersome application and maintenance. This could significantly improve the early diagnosis of a range of different conditions in high-risk individuals, opening the possibility for new treatments and interventions as conditions develop. This paper presents the design and implementation of compact, non-contact capacitive bio-potential electrodes utilising a low impedance current-to-voltage configuration and a bootstrapped voltage follower, demonstrating results applicable to research applications for capacitive electrocardiography and capacitive electromyography. The presented electrodes use few components, have a small surface area and are capable of acquiring a range of bio-potential signals.

  16. Design and Development of Non-Contact Bio-Potential Electrodes for Pervasive Health Monitoring Applications

    PubMed Central

    Portelli, Anthony J.; Nasuto, Slawomir J.

    2017-01-01

    For the advent of pervasive bio-potential monitoring, it will be necessary to utilize a combination of cheap, quick to apply, low-noise electrodes and compact electronics with wireless technologies. Once available, all electrical activity resulting from the processes of the human body could be actively and constantly monitored without the need for cumbersome application and maintenance. This could significantly improve the early diagnosis of a range of different conditions in high-risk individuals, opening the possibility for new treatments and interventions as conditions develop. This paper presents the design and implementation of compact, non-contact capacitive bio-potential electrodes utilising a low impedance current-to-voltage configuration and a bootstrapped voltage follower, demonstrating results applicable to research applications for capacitive electrocardiography and capacitive electromyography. The presented electrodes use few components, have a small surface area and are capable of acquiring a range of bio-potential signals. PMID:28045439

  17. Emerging and Future Computing Paradigms and Their Impact on the Research, Training, and Design Environments of the Aerospace Workforce

    NASA Technical Reports Server (NTRS)

    Noor, Ahmed K. (Compiler)

    2003-01-01

    The document contains the proceedings of the training workshop on Emerging and Future Computing Paradigms and their impact on the Research, Training and Design Environments of the Aerospace Workforce. The workshop was held at NASA Langley Research Center, Hampton, Virginia, March 18 and 19, 2003. The workshop was jointly sponsored by Old Dominion University and NASA. Workshop attendees came from NASA, other government agencies, industry and universities. The objectives of the workshop were to a) provide broad overviews of the diverse activities related to new computing paradigms, including grid computing, pervasive computing, high-productivity computing, and the IBM-led autonomic computing; and b) identify future directions for research that have high potential for future aerospace workforce environments. The format of the workshop included twenty-one, half-hour overview-type presentations and three exhibits by vendors.

  18. Ethical and regulatory challenges of research using pervasive sensing and other emerging technologies: IRB perspectives.

    PubMed

    Nebeker, Camille; Harlow, John; Espinoza Giacinto, Rebeca; Orozco-Linares, Rubi; Bloss, Cinnamon S; Weibel, Nadir

    2017-01-01

    Vast quantities of personal health information and private identifiable information are being created through mobile apps, wearable sensors, and social networks. While new strategies and tools for obtaining health data have expanded researchers' abilities to design and test personalized and adaptive health interventions, the deployment of pervasive sensing and computational techniques to gather research data is raising ethical challenges for Institutional Review Boards (IRBs) charged with protecting research participants. To explore experiences with, and perceptions about, technology-enabled research, and identify solutions for promoting responsible conduct of this research we conducted focus groups with human research protection program and IRB affiliates. Our findings outline the need for increased collaboration across stakeholders in terms of: (1) shared and dynamic resources that improve awareness of technologies and decrease potential threats to participant privacy and data confidentiality, and (2) development of appropriate and dynamic standards through collaboration with stakeholders in the research ethics community.

  19. Pervasive technology in Neonatal Intensive Care Unit: a prototype for newborns unobtrusive monitoring.

    PubMed

    Ciani, Oriana; Piccini, Luca; Parini, Sergio; Rullo, Alessia; Bagnoli, Franco; Marti, Patrizia; Andreoni, Giuseppe

    2008-01-01

    Pervasive computing research is introducing new perspectives in a wide range of applications, including healthcare domain. In this study we explore the possibility to realize a prototype of a system for unobtrusive recording and monitoring of multiple biological parameters on premature newborns hospitalized in the Neonatal Intensive Care Unit (NICU). It consists of three different units: a sensitized belt for Electrocardiogram (ECG) and chest dilatation monitoring, augmented with extrinsic transducers for temperature and respiratory activity measure, a device for signals pre-processing, sampling and transmission through Bluetooth(R) (BT) technology to a remote PC station and a software for data capture and post-processing. Preliminary results obtained by monitoring babies just discharged from the ward demonstrated the feasibility of the unobtrusive monitoring on this kind of subjects and open a new scenario for premature newborns monitoring and developmental cares practice in NICU.

  20. Scheduling of network access for feedback-based embedded systems

    NASA Astrophysics Data System (ADS)

    Liberatore, Vincenzo

    2002-07-01

    nd communication capabilities. Examples range from smart dust embedded in building materials to networks of appliances in the home. Embedded devices will be deployed in unprecedented numbers, will enable pervasive distributed computing, and will radically change the way people interact with the surrounding environment [EGH00a]. The paper targets embedded systems and their real-time (RT) communication requirements. RT requirements arise from the

  1. Preface to the special volume on the second Sandia Fracture Challenge

    DOE PAGES

    Kramer, Sharlotte Lorraine Bolyard; Boyce, Brad

    2016-01-01

    In this study, ductile failure of structural metals is a pervasive issue for applications such as automotive manufacturing, transportation infrastructures, munitions and armor, and energy generation. Experimental investigation of all relevant failure scenarios is intractable, requiring reliance on computation models. Our confidence in model predictions rests on unbiased assessments of the entire predictive capability, including the mathematical formulation, numerical implementation, calibration, and execution.

  2. Key Trends That Will Shape Army Installations of Tomorrow

    DTIC Science & Technology

    2013-01-01

    community college facilities, and the new international airport.187 In Bucks County, KIPC occupies a portion of the former U.S. Steel–Fairless Works...190 Federation of Canadian Municipalities, “Solid Waste as a Resource: Guide for Sustainable Communities ,” 2004. 191 For more information ...overseas oil. Information technology trends, such as pervasive computing and online community trends, may have a complex role in sustainable

  3. Social media fingerprints of unemployment.

    PubMed

    Llorente, Alejandro; Garcia-Herranz, Manuel; Cebrian, Manuel; Moro, Esteban

    2015-01-01

    Recent widespread adoption of electronic and pervasive technologies has enabled the study of human behavior at an unprecedented level, uncovering universal patterns underlying human activity, mobility, and interpersonal communication. In the present work, we investigate whether deviations from these universal patterns may reveal information about the socio-economical status of geographical regions. We quantify the extent to which deviations in diurnal rhythm, mobility patterns, and communication styles across regions relate to their unemployment incidence. For this we examine a country-scale publicly articulated social media dataset, where we quantify individual behavioral features from over 19 million geo-located messages distributed among more than 340 different Spanish economic regions, inferred by computing communities of cohesive mobility fluxes. We find that regions exhibiting more diverse mobility fluxes, earlier diurnal rhythms, and more correct grammatical styles display lower unemployment rates. As a result, we provide a simple model able to produce accurate, easily interpretable reconstruction of regional unemployment incidence from their social-media digital fingerprints alone. Our results show that cost-effective economical indicators can be built based on publicly-available social media datasets.

  4. Body area network--a key infrastructure element for patient-centered telemedicine.

    PubMed

    Norgall, Thomas; Schmidt, Robert; von der Grün, Thomas

    2004-01-01

    The Body Area Network (BAN) extends the range of existing wireless network technologies by an ultra-low range, ultra-low power network solution optimised for long-term or continuous healthcare applications. It enables wireless radio communication between several miniaturised, intelligent Body Sensor (or actor) Units (BSU) and a single Body Central Unit (BCU) worn at the human body. A separate wireless transmission link from the BCU to a network access point--using different technology--provides for online access to BAN components via usual network infrastructure. The BAN network protocol maintains dynamic ad-hoc network configuration scenarios and co-existence of multiple networks.BAN is expected to become a basic infrastructure element for electronic health services: By integrating patient-attached sensors and mobile actor units, distributed information and data processing systems, the range of medical workflow can be extended to include applications like wireless multi-parameter patient monitoring and therapy support. Beyond clinical use and professional disease management environments, private personal health assistance scenarios (without financial reimbursement by health agencies / insurance companies) enable a wide range of applications and services in future pervasive computing and networking environments.

  5. Social Media Fingerprints of Unemployment

    PubMed Central

    Llorente, Alejandro; Garcia-Herranz, Manuel; Cebrian, Manuel; Moro, Esteban

    2015-01-01

    Recent widespread adoption of electronic and pervasive technologies has enabled the study of human behavior at an unprecedented level, uncovering universal patterns underlying human activity, mobility, and interpersonal communication. In the present work, we investigate whether deviations from these universal patterns may reveal information about the socio-economical status of geographical regions. We quantify the extent to which deviations in diurnal rhythm, mobility patterns, and communication styles across regions relate to their unemployment incidence. For this we examine a country-scale publicly articulated social media dataset, where we quantify individual behavioral features from over 19 million geo-located messages distributed among more than 340 different Spanish economic regions, inferred by computing communities of cohesive mobility fluxes. We find that regions exhibiting more diverse mobility fluxes, earlier diurnal rhythms, and more correct grammatical styles display lower unemployment rates. As a result, we provide a simple model able to produce accurate, easily interpretable reconstruction of regional unemployment incidence from their social-media digital fingerprints alone. Our results show that cost-effective economical indicators can be built based on publicly-available social media datasets. PMID:26020628

  6. Pervasive mobile healthcare systems for chronic disease monitoring.

    PubMed

    Huzooree, Geshwaree; Kumar Khedo, Kavi; Joonas, Noorjehan

    2017-05-01

    Pervasive mobile healthcare system has the potential to improve healthcare and the quality of life of chronic disease patients through continuous monitoring. Recently, many articles related to pervasive mobile healthcare system focusing on health monitoring using wireless technologies have been published. The main aim of this review is to evaluate the state-of-the-art pervasive mobile healthcare systems to identify major technical requirements and design challenges associated with the realization of a pervasive mobile healthcare system. A systematic literature review was conducted over IEEE Xplore Digital Library to evaluate 20 pervasive mobile healthcare systems out of 683 articles from 2011 to 2016. The classification of the pervasive mobile healthcare systems and other important factors are discussed. Potential opportunities and challenges are pointed out for the further deployment of effective pervasive mobile healthcare systems. This article helps researchers in health informatics to have a holistic view toward understanding pervasive mobile healthcare systems and points out new technological trends and design challenges that researchers have to consider when designing such systems for better adoption, usability, and seamless integration.

  7. Extracting Depth From Motion Parallax in Real-World and Synthetic Displays

    NASA Technical Reports Server (NTRS)

    Hecht, Heiko; Kaiser, Mary K.; Aiken, William; Null, Cynthia H. (Technical Monitor)

    1994-01-01

    In psychophysical studies on human sensitivity to visual motion parallax (MP), the use of computer displays is pervasive. However, a number of potential problems are associated with such displays: cue conflicts arise when observers accommodate to the screen surface, and observer head and body movements are often not reflected in the displays. We investigated observers' sensitivity to depth information in MP (slant, depth order, relative depth) using various real-world displays and their computer-generated analogs. Angle judgments of real-world stimuli were consistently superior to judgments that were based on computer-generated stimuli. Similar results were found for perceived depth order and relative depth. Perceptual competence of observers tends to be underestimated in research that is based on computer generated displays. Such findings cannot be generalized to more realistic viewing situations.

  8. Biomechanisms of Comorbidity: Reviewing Integrative Analyses of Multi-omics Datasets and Electronic Health Records.

    PubMed

    Pouladi, N; Achour, I; Li, H; Berghout, J; Kenost, C; Gonzalez-Garay, M L; Lussier, Y A

    2016-11-10

    Disease comorbidity is a pervasive phenomenon impacting patients' health outcomes, disease management, and clinical decisions. This review presents past, current and future research directions leveraging both phenotypic and molecular information to uncover disease similarity underpinning the biology and etiology of disease comorbidity. We retrieved ~130 publications and retained 59, ranging from 2006 to 2015, that comprise a minimum number of five diseases and at least one type of biomolecule. We surveyed their methods, disease similarity metrics, and calculation of comorbidities in the electronic health records, if present. Among the surveyed studies, 44% generated or validated disease similarity metrics in context of comorbidity, with 60% being published in the last two years. As inputs, 87% of studies utilized intragenic loci and proteins while 13% employed RNA (mRNA, LncRNA or miRNA). Network modeling was predominantly used (35%) followed by statistics (28%) to impute similarity between these biomolecules and diseases. Studies with large numbers of biomolecules and diseases used network models or naïve overlap of disease-molecule associations, while machine learning, statistics, and information retrieval were utilized in smaller and moderate sized studies. Multiscale computations comprising shared function, network topology, and phenotypes were performed exclusively on proteins. This review highlighted the growing methods for identifying the molecular mechanisms underpinning comorbidities that leverage multiscale molecular information and patterns from electronic health records. The survey unveiled that intergenic polymorphisms have been overlooked for similarity imputation compared to their intragenic counterparts, offering new opportunities to bridge the mechanistic and similarity gaps of comorbidity.

  9. Pervasive healthcare: paving the way for a pervasive, user-centered and preventive healthcare model.

    PubMed

    Arnrich, B; Mayora, O; Bardram, J; Tröster, G

    2010-01-01

    The aging of the population creates pressure on the healthcare systems in various ways. A massive increase of chronic disease conditions and age-related illness are predicted as the dominant forces driving the future health care. The objective of this paper is to present future research demands in pervasive healthcare with the goal to meet the healthcare challenges by paving the way for a pervasive, user-centered and preventive healthcare model. This paper presents recent methodological approaches and proposes future research topics in three areas: i) pervasive, continuous and reliable long-term monitoring systems; ii) prevention through pervasive technology as a key element to maintain lifelong wellness; and iii) design and evaluation methods for ubiquitous, patient-centric technologies. Pervasive technology has been identified as a strong asset for achieving the vision of user-centered preventive healthcare. In order to make this vision a reality, new strategies for design, development and evaluation of technology have to find a common denominator and consequently interoperate. Moreover, the potential of pervasive healthcare technologies offers new opportunities beyond traditional disease treatment and may play a major role in prevention, e.g. motivate healthy behavior and disease prevention throughout all stages of life. In this sense, open challenges in future research have to be addressed such as the variability of health indicators between individuals and the manner in which relevant health indicators are provided to the users in order to maximize their motivation to mitigate or prevent unhealthy behaviors. Additionally, collecting evidence that pervasive technology improves health is seen as one of the toughest challenges. Promising approaches are recently introduced, such as "clinical proof-of-concept" and balanced observational studies. The paper concludes that pervasive healthcare will enable a paradigm shift from the established centralized healthcare model to a pervasive, user-centered and preventive overall lifestyle health management. In order to provide these new opportunities everywhere, anytime and to anyone, future research in the fields of pervasive sensing, pervasive prevention and evaluation of pervasive technology is inevitably needed.

  10. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be reasonably distributed throughout the entire nominated area...

  11. Access Control to Information in Pervasive Computing Environments

    DTIC Science & Technology

    2005-08-01

    for foo’s public key. (Digital signatures are omitted.) indicate a set of location and time intervals. A service will return location information only...stands for foo’s public key. (Digital signatures are omitted.) it describes the resource to which access is granted. Currently, we allow only resources...information relationship. Alice’s location information is bun- dled in her personal information. (The digital signature is omitted.) We use extended

  12. Addressing Security Challenges in Pervasive Computing Applications

    DTIC Science & Technology

    2010-10-10

    Personalized Privacy for Location - Based Services ", Transactions on Data Privacy, 2(1), 2009. 22. Indrakshi Ray, Indrajit Ray and Sudip Chakraborty, "An...Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Query m-Invariance: Pre- venting Query Disclosures in Continuous Location - Based Services ", Proceedings...location information is used to provide better services. Often such applications need continuous location - based services (LBS) where the mobile object must

  13. Survey on fall detection and fall prevention using wearable and external sensors.

    PubMed

    Delahoz, Yueng Santiago; Labrador, Miguel Angel

    2014-10-22

    According to nihseniorhealth.gov (a website for older adults), falling represents a great threat as people get older, and providing mechanisms to detect and prevent falls is critical to improve people's lives. Over 1.6 million U.S. adults are treated for fall-related injuries in emergency rooms every year suffering fractures, loss of independence, and even death. It is clear then, that this problem must be addressed in a prompt manner, and the use of pervasive computing plays a key role to achieve this. Fall detection (FD) and fall prevention (FP) are research areas that have been active for over a decade, and they both strive for improving people's lives through the use of pervasive computing. This paper surveys the state of the art in FD and FP systems, including qualitative comparisons among various studies. It aims to serve as a point of reference for future research on the mentioned systems. A general description of FD and FP systems is provided, including the different types of sensors used in both approaches. Challenges and current solutions are presented and described in great detail. A 3-level taxonomy associated with the risk factors of a fall is proposed. Finally, cutting edge FD and FP systems are thoroughly reviewed and qualitatively compared, in terms of design issues and other parameters.

  14. Dynamic Pervasive Storytelling in Long Lasting Learning Games

    ERIC Educational Resources Information Center

    Pløhn, Trygve; Louchart, Sandy; Aalberg, Trond

    2015-01-01

    Pervasive gaming is a reality-based gaming genre originating from alternative theatrical forms in which the performance becomes a part of the players' everyday life. In recent years much research has been done on pervasive gaming and its potential applications towards specific domains. Pervasive games have been effective with regards to…

  15. Brain-Computer Symbiosis

    PubMed Central

    Schalk, Gerwin

    2009-01-01

    The theoretical groundwork of the 1930’s and 1940’s and the technical advance of computers in the following decades provided the basis for dramatic increases in human efficiency. While computers continue to evolve, and we can still expect increasing benefits from their use, the interface between humans and computers has begun to present a serious impediment to full realization of the potential payoff. This article is about the theoretical and practical possibility that direct communication between the brain and the computer can be used to overcome this impediment by improving or augmenting conventional forms of human communication. It is about the opportunity that the limitations of our body’s input and output capacities can be overcome using direct interaction with the brain, and it discusses the assumptions, possible limitations, and implications of a technology that I anticipate will be a major source of pervasive changes in the coming decades. PMID:18310804

  16. On the usage of ultrasound computational models for decision making under ambiguity

    NASA Astrophysics Data System (ADS)

    Dib, Gerges; Sexton, Samuel; Prowant, Matthew; Crawford, Susan; Diaz, Aaron

    2018-04-01

    Computer modeling and simulation is becoming pervasive within the non-destructive evaluation (NDE) industry as a convenient tool for designing and assessing inspection techniques. This raises a pressing need for developing quantitative techniques for demonstrating the validity and applicability of the computational models. Computational models provide deterministic results based on deterministic and well-defined input, or stochastic results based on inputs defined by probability distributions. However, computational models cannot account for the effects of personnel, procedures, and equipment, resulting in ambiguity about the efficacy of inspections based on guidance from computational models only. In addition, ambiguity arises when model inputs, such as the representation of realistic cracks, cannot be defined deterministically, probabilistically, or by intervals. In this work, Pacific Northwest National Laboratory demonstrates the ability of computational models to represent field measurements under known variabilities, and quantify the differences using maximum amplitude and power spectrum density metrics. Sensitivity studies are also conducted to quantify the effects of different input parameters on the simulation results.

  17. Energy harvesting: small scale energy production from ambient sources

    NASA Astrophysics Data System (ADS)

    Yeatman, Eric M.

    2009-03-01

    Energy harvesting - the collection of otherwise unexploited energy in the local environment - is attracting increasing attention for the powering of electronic devices. While the power levels that can be reached are typically modest (microwatts to milliwatts), the key motivation is to avoid the need for battery replacement or recharging in portable or inaccessible devices. Wireless sensor networks are a particularly important application: the availability of essentially maintenance free sensor nodes, as enabled by energy harvesting, will greatly increase the feasibility of large scale networks, in the paradigm often known as pervasive sensing. Such pervasive sensing networks, used to monitor buildings, structures, outdoor environments or the human body, offer significant benefits for large scale energy efficiency, health and safety, and many other areas. Sources of energy for harvesting include light, temperature differences, and ambient motion, and a wide range of miniature energy harvesters based on these sources have been proposed or demonstrated. This paper reviews the principles and practice in miniature energy harvesters, and discusses trends, suitable applications, and possible future developments.

  18. The role of architecture and ontology for interoperability.

    PubMed

    Blobel, Bernd; González, Carolina; Oemig, Frank; Lopéz, Diego; Nykänen, Pirkko; Ruotsalainen, Pekka

    2010-01-01

    Turning from organization-centric to process-controlled or even to personalized approaches, advanced healthcare settings have to meet special interoperability challenges. eHealth and pHealth solutions must assure interoperability between actors cooperating to achieve common business objectives. Hereby, the interoperability chain also includes individually tailored technical systems, but also sensors and actuators. For enabling corresponding pervasive computing and even autonomic computing, individualized systems have to be based on an architecture framework covering many domains, scientifically managed by specialized disciplines using their specific ontologies in a formalized way. Therefore, interoperability has to advance from a communication protocol to an architecture-centric approach mastering ontology coordination challenges.

  19. An Approach to Dynamic Service Management in Pervasive Computing Systems

    DTIC Science & Technology

    2005-01-01

    standard interface to them that is easily accessible by any user. This paper outlines the design of Centaurus , an infrastructure for presenting...based on Extensi- ble Markup Language (XML) for communication, giving the system a uniform and easily adaptable interface. Centaurus defines a...easy and automatic usage. This is the vision that guides our re- search on the Centaurus system. We define a SmartSpace as a dynamic environment that

  20. Wireless local area network security.

    PubMed

    Bergeron, Bryan P

    2004-01-01

    Wireless local area networks (WLANs) are increasingly popular in clinical settings because they facilitate the use of wireless PDAs, laptops, and other pervasive computing devices at the point of care. However, because of the relative immaturity of wireless network technology and evolving standards, WLANs, if improperly configured, can present significant security risks. Understanding the security limitations of the technology and available fixes can help minimize the risks of clinical data loss and maintain compliance with HIPAA guidelines.

  1. Analysis in Motion Initiative – Human Machine Intelligence

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Blaha, Leslie

    As computers and machines become more pervasive in our everyday lives, we are looking for ways for humans and machines to work more intelligently together. How can we help machines understand their users so the team can do smarter things together? The Analysis in Motion Initiative is advancing the science of human machine intelligence — creating human-machine teams that work better together to make correct, useful, and timely interpretations of data.

  2. Parametric Study of Beta-Endpoint Energy in Direct Energy Converters

    DTIC Science & Technology

    2007-01-01

    Circuits for Ultra-high Efficiency Micro- power Generators using Nickel-63 Radioisotope . Technical Digest, ISSCC, February 2006, 418– 19. 8. Lal, A...Zakar, E.; Dubey, M.; Lal, A. MEMS Radioisotope - powered Piezoelectric Power Generator. IEEE MEMS 2006, Istanbul, Turkey, January 2006, 94–97. 16... Power : A Radioisotope - powered Piezoelectric Generator. IEEE Pervasive Computing Jan-Mar 2005, 4 (1), 53–61. Lee, C.; Guo, H.; Radhakrishnan, S.; Lal, A

  3. Improving Mobile Infrastructure for Pervasive Personal Computing

    DTIC Science & Technology

    2007-11-01

    fulfillment of the requirements for the degree of Master of Science. Copyright c© 2007 Ajay Surie This research was supported by the National Science Foundation...NSF) under grant number CNS-0509004 and by the Army Research Office (ARO) through grant number DAAD19-02-1-0389 (“Perpetually Available and Secure...efforts my final project could not have been successful. Working with the members of my research group, Niraj Tolia, Benjamin Gilbert, Jan Harkes, Adam

  4. High efficiency III-nitride light-emitting diodes

    DOEpatents

    Crawford, Mary; Koleske, Daniel; Cho, Jaehee; Zhu, Di; Noemaun, Ahmed; Schubert, Martin F; Schubert, E. Fred

    2013-05-28

    Tailored doping of barrier layers enables balancing of the radiative recombination among the multiple-quantum-wells in III-Nitride light-emitting diodes. This tailored doping enables more symmetric carrier transport and uniform carrier distribution which help to reduce electron leakage and thus reduce the efficiency droop in high-power III-Nitride LEDs. Mitigation of the efficiency droop in III-Nitride LEDs may enable the pervasive market penetration of solid-state-lighting technologies in high-power lighting and illumination.

  5. Pervasive Computing Technologies to Continuously Assess Alzheimer's Disease Progression and Intervention Efficacy.

    PubMed

    Lyons, Bayard E; Austin, Daniel; Seelye, Adriana; Petersen, Johanna; Yeargers, Jonathan; Riley, Thomas; Sharma, Nicole; Mattek, Nora; Wild, Katherine; Dodge, Hiroko; Kaye, Jeffrey A

    2015-01-01

    Traditionally, assessment of functional and cognitive status of individuals with dementia occurs in brief clinic visits during which time clinicians extract a snapshot of recent changes in individuals' health. Conventionally, this is done using various clinical assessment tools applied at the point of care and relies on patients' and caregivers' ability to accurately recall daily activity and trends in personal health. These practices suffer from the infrequency and generally short durations of visits. Since 2004, researchers at the Oregon Center for Aging and Technology (ORCATECH) at the Oregon Health and Science University have been working on developing technologies to transform this model. ORCATECH researchers have developed a system of continuous in-home monitoring using pervasive computing technologies that make it possible to more accurately track activities and behaviors and measure relevant intra-individual changes. We have installed a system of strategically placed sensors in over 480 homes and have been collecting data for up to 8 years. Using this continuous in-home monitoring system, ORCATECH researchers have collected data on multiple behaviors such as gait and mobility, sleep and activity patterns, medication adherence, and computer use. Patterns of intra-individual variation detected in each of these areas are used to predict outcomes such as low mood, loneliness, and cognitive function. These methods have the potential to improve the quality of patient health data and in turn patient care especially related to cognitive decline. Furthermore, the continuous real-world nature of the data may improve the efficiency and ecological validity of clinical intervention studies.

  6. A Pervasive Parallel Processing Framework for Data Visualization and Analysis at Extreme Scale

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moreland, Kenneth; Geveci, Berk

    2014-11-01

    The evolution of the computing world from teraflop to petaflop has been relatively effortless, with several of the existing programming models scaling effectively to the petascale. The migration to exascale, however, poses considerable challenges. All industry trends infer that the exascale machine will be built using processors containing hundreds to thousands of cores per chip. It can be inferred that efficient concurrency on exascale machines requires a massive amount of concurrent threads, each performing many operations on a localized piece of data. Currently, visualization libraries and applications are based off what is known as the visualization pipeline. In the pipelinemore » model, algorithms are encapsulated as filters with inputs and outputs. These filters are connected by setting the output of one component to the input of another. Parallelism in the visualization pipeline is achieved by replicating the pipeline for each processing thread. This works well for today’s distributed memory parallel computers but cannot be sustained when operating on processors with thousands of cores. Our project investigates a new visualization framework designed to exhibit the pervasive parallelism necessary for extreme scale machines. Our framework achieves this by defining algorithms in terms of worklets, which are localized stateless operations. Worklets are atomic operations that execute when invoked unlike filters, which execute when a pipeline request occurs. The worklet design allows execution on a massive amount of lightweight threads with minimal overhead. Only with such fine-grained parallelism can we hope to fill the billions of threads we expect will be necessary for efficient computation on an exascale machine.« less

  7. Pervasive Computing Technologies to Continuously Assess Alzheimer’s Disease Progression and Intervention Efficacy

    PubMed Central

    Lyons, Bayard E.; Austin, Daniel; Seelye, Adriana; Petersen, Johanna; Yeargers, Jonathan; Riley, Thomas; Sharma, Nicole; Mattek, Nora; Wild, Katherine; Dodge, Hiroko; Kaye, Jeffrey A.

    2015-01-01

    Traditionally, assessment of functional and cognitive status of individuals with dementia occurs in brief clinic visits during which time clinicians extract a snapshot of recent changes in individuals’ health. Conventionally, this is done using various clinical assessment tools applied at the point of care and relies on patients’ and caregivers’ ability to accurately recall daily activity and trends in personal health. These practices suffer from the infrequency and generally short durations of visits. Since 2004, researchers at the Oregon Center for Aging and Technology (ORCATECH) at the Oregon Health and Science University have been working on developing technologies to transform this model. ORCATECH researchers have developed a system of continuous in-home monitoring using pervasive computing technologies that make it possible to more accurately track activities and behaviors and measure relevant intra-individual changes. We have installed a system of strategically placed sensors in over 480 homes and have been collecting data for up to 8 years. Using this continuous in-home monitoring system, ORCATECH researchers have collected data on multiple behaviors such as gait and mobility, sleep and activity patterns, medication adherence, and computer use. Patterns of intra-individual variation detected in each of these areas are used to predict outcomes such as low mood, loneliness, and cognitive function. These methods have the potential to improve the quality of patient health data and in turn patient care especially related to cognitive decline. Furthermore, the continuous real-world nature of the data may improve the efficiency and ecological validity of clinical intervention studies. PMID:26113819

  8. Applying Utility Functions to Adaptation Planning for Home Automation Applications

    NASA Astrophysics Data System (ADS)

    Bratskas, Pyrros; Paspallis, Nearchos; Kakousis, Konstantinos; Papadopoulos, George A.

    A pervasive computing environment typically comprises multiple embedded devices that may interact together and with mobile users. These users are part of the environment, and they experience it through a variety of devices embedded in the environment. This perception involves technologies which may be heterogeneous, pervasive, and dynamic. Due to the highly dynamic properties of such environments, the software systems running on them have to face problems such as user mobility, service failures, or resource and goal changes which may happen in an unpredictable manner. To cope with these problems, such systems must be autonomous and self-managed. In this chapter we deal with a special kind of a ubiquitous environment, a smart home environment, and introduce a user-preference-based model for adaptation planning. The model, which dynamically forms a set of configuration plans for resources, reasons automatically and autonomously, based on utility functions, on which plan is likely to best achieve the user's goals with respect to resource availability and user needs.

  9. Current state and future direction of computer systems at NASA Langley Research Center

    NASA Technical Reports Server (NTRS)

    Rogers, James L. (Editor); Tucker, Jerry H. (Editor)

    1992-01-01

    Computer systems have advanced at a rate unmatched by any other area of technology. As performance has dramatically increased there has been an equally dramatic reduction in cost. This constant cost performance improvement has precipitated the pervasiveness of computer systems into virtually all areas of technology. This improvement is due primarily to advances in microelectronics. Most people are now convinced that the new generation of supercomputers will be built using a large number (possibly thousands) of high performance microprocessors. Although the spectacular improvements in computer systems have come about because of these hardware advances, there has also been a steady improvement in software techniques. In an effort to understand how these hardware and software advances will effect research at NASA LaRC, the Computer Systems Technical Committee drafted this white paper to examine the current state and possible future directions of computer systems at the Center. This paper discusses selected important areas of computer systems including real-time systems, embedded systems, high performance computing, distributed computing networks, data acquisition systems, artificial intelligence, and visualization.

  10. Optimized Materials From First Principles Simulations: Are We There Yet?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Galli, G; Gygi, F

    2005-07-26

    In the past thirty years, the use of scientific computing has become pervasive in all disciplines: collection and interpretation of most experimental data is carried out using computers, and physical models in computable form, with various degrees of complexity and sophistication, are utilized in all fields of science. However, full prediction of physical and chemical phenomena based on the basic laws of Nature, using computer simulations, is a revolution still in the making, and it involves some formidable theoretical and computational challenges. We illustrate the progress and successes obtained in recent years in predicting fundamental properties of materials in condensedmore » phases and at the nanoscale, using ab-initio, quantum simulations. We also discuss open issues related to the validation of the approximate, first principles theories used in large scale simulations, and the resulting complex interplay between computation and experiment. Finally, we describe some applications, with focus on nanostructures and liquids, both at ambient and under extreme conditions.« less

  11. Wireless Adaptive Therapeutic TeleGaming in a Pervasive Computing Environment

    NASA Astrophysics Data System (ADS)

    Peters, James F.; Szturm, Tony; Borkowski, Maciej; Lockery, Dan; Ramanna, Sheela; Shay, Barbara

    This chapter introduces a wireless, pervasive computing approach to adaptive therapeutic telegaming considered in the context of near set theory. Near set theory provides a formal basis for observation, comparison and classification of perceptual granules. A perceptual granule is defined by a collection of objects that are graspable by the senses or by the mind. In the proposed pervasive computing approach to telegaming, a handicapped person (e.g., stroke patient with limited hand, finger, arm function) plays a video game by interacting with familiar instrumented objects such as cups, cutlery, soccer balls, nozzles, screw top-lids, spoons, so that the technology that makes therapeutic exercise game-playing possible is largely invisible (Archives of Physical Medicine and Rehabilitation 89:2213-2217, 2008). The basic approach to adaptive learning (AL) in the proposed telegaming environment is ethology-inspired and is quite different from the traditional approach to reinforcement learning. In biologically-inspired learning, organisms learn to achieve some goal by durable modification of behaviours in response to signals from the environment resulting from specific experiences (Animal Behavior, 1995). The term adaptive is used here in an ethological sense, where learning by an organism results from modifying behaviour in response to perceived changes in the environment. To instill adaptivity in a video game, it is assumed that learning by a video game is episodic. During an episode, the behaviour of a player is measured indirectly by tracking the occurrence of gaming events such as a hit or a miss of a target (e.g., hitting a moving ball with a game paddle). An ethogram provides a record of behaviour feature values that provide a basis a functional registry for handicapped players for gaming adaptivity. An important practical application of adaptive gaming is therapeutic rehabilitation exercise carried out in parallel with playing action video games. Enjoyable and engaging interactive gaming will motivate patients to complete the rehabilitation process. Adaptivity is seen as a way to make action games more accessible to those who have physical and cognitive impairments. The telegaming system connects to the internet and implements a feed-and-forward mechanism that transmits gaming session tables after each gaming session to a remote registry accessible to therapists and researchers. The contribution of this chapter is the introduction of a framework for wireless telegaming useful in therapeutic rehabilitation.

  12. Pervasive and Non-Pervasive Conduct Problems in a Clinic Sample Aged 4-8 Years: Child, Family and Day-Care/School Factors

    ERIC Educational Resources Information Center

    Drugli, May Britt; Larsson, Bo; Clifford, Graham; Fossum, Sturla

    2007-01-01

    Differences between pervasive (home and day-care/school) versus non-pervasive (home only) conduct problems were examined in regard to various child, parent/family, and day-care/school characteristics in an outpatient clinic sample of 120 children aged 4-8 years. All children scored above the 90th percentile on the Eyberg Child Behavior Inventory…

  13. 'Designing Ambient Interactions - Pervasive Ergonomic Interfaces for Ageing Well' (DAI'10)

    NASA Astrophysics Data System (ADS)

    Geven, Arjan; Prost, Sebastian; Tscheligi, Manfred; Soldatos, John; Gonzalez, Mari Feli

    The workshop will focus on novel computer based interaction mechanisms and interfaces, which boost natural interactivity and obviate the need for conventional tedious interfaces. Such interfaces are increasingly used in ambient intelligence environments and related applications, including application boosting elderly cognitive support, cognitive rehabilitation and Ambient Assisted Living (AAL). The aim of the workshop is to provide insights on the technological underpinnings of such interfaces, along with tools and techniques for their design and evaluation.

  14. HPC Annual Report: Emulytics.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crussell, Jonathan; Boote, Jeffrey W.; Fritz, David Jakob

    Networked Information Technology systems play a key role supporting critical government, military, and private computer installations. Many of today's critical infrastructure systems have strong dependencies on secure information exchange among geographically dispersed facilities. As operations become increasingly dependent on the information exchange they also become targets for exploitation. The need to protect data and defend these systems from external attack has become increasingly vital while the nature of the threats has become sophisticated and pervasive making the challenges daunting. Enter Emulytics.

  15. Survey on Fall Detection and Fall Prevention Using Wearable and External Sensors

    PubMed Central

    Delahoz, Yueng Santiago; Labrador, Miguel Angel

    2014-01-01

    According to nihseniorhealth.gov (a website for older adults), falling represents a great threat as people get older, and providing mechanisms to detect and prevent falls is critical to improve people's lives. Over 1.6 million U.S. adults are treated for fall-related injuries in emergency rooms every year suffering fractures, loss of independence, and even death. It is clear then, that this problem must be addressed in a prompt manner, and the use of pervasive computing plays a key role to achieve this. Fall detection (FD) and fall prevention (FP) are research areas that have been active for over a decade, and they both strive for improving people's lives through the use of pervasive computing. This paper surveys the state of the art in FD and FP systems, including qualitative comparisons among various studies. It aims to serve as a point of reference for future research on the mentioned systems. A general description of FD and FP systems is provided, including the different types of sensors used in both approaches. Challenges and current solutions are presented and described in great detail. A 3-level taxonomy associated with the risk factors of a fall is proposed. Finally, cutting edge FD and FP systems are thoroughly reviewed and qualitatively compared, in terms of design issues and other parameters. PMID:25340452

  16. Coseismic Damage Generation in Fault Zones by Successive High Strain Rate Loading Experiments

    NASA Astrophysics Data System (ADS)

    Aben, F. M.; Doan, M. L.; Renard, F.; Toussaint, R.; Reuschlé, T.; Gratier, J. P.

    2014-12-01

    Damage zones of active faults control both resistance to rupture and transport properties of the fault. Hence, knowing the rock damage's origin is important to constrain its properties. Here we study experimentally the damage generated by a succession of dynamic loadings, a process mimicking the stress history of a rock sample located next to an active fault. A propagating rupture generates high frequency stress perturbations next to its tip. This dynamic loading creates pervasive damage (pulverization), as multiple fractures initiate and grow simultaneously. Previous single loading experiments have shown a strain rate threshold for pulverization. Here, we focus on conditions below this threshold and the dynamic peak stress to constrain: 1) if there is dynamic fracturing at these conditions and 2) if successive loadings (cumulative seismic events) result in pervasive fracturing, effectively reducing the pulverization threshold to milder conditions. Monzonite samples were dynamically loaded (strain rate > 50 s-1) several times below the dynamic peak strength, using a Split Hopkinson Pressure Bar apparatus. Several quasi-static experiments were conducted as well (strain rate < 10-5-s). Samples loaded up to stresses above the quasi-static uniaxial compressive strength (qsUCS) systematically fragmented or pulverized after four successive loadings. We measured several damage proxies (P-wave velocity, porosity), that show a systematic increase in damage with each load. In addition, micro-computed tomography acquisition on several damage samples revealed the growth of a pervasive fracture network between ensuing loadings. Samples loaded dynamically below the qsUCS failed along one fracture after a variable amount of loadings and damage proxies do not show any a systematic trend. Our conclusions is that milder dynamic loading conditions, below the dynamic peak strength, result in pervasive dynamic fracturing. Also, successive loadings effectively lower the pulverization threshold of the rock. However, the peak loading stress must exceed the qsUCS of the rock, otherwise quasi-static fracturing occurs. Pulverized rocks found in the field are therefore witnesses of previous large earthquakes.

  17. Pervasive access to MRI bias artifact suppression service on a grid.

    PubMed

    Ardizzone, Edoardo; Gambino, Orazio; Genco, Alessandro; Pirrone, Roberto; Sorce, Salvatore

    2009-01-01

    Bias artifact corrupts MRIs in such a way that the image is afflicted by illumination variations. Some of the authors proposed the exponential entropy-driven homomorphic unsharp masking ( E(2)D-HUM) algorithm that corrects this artifact without any a priori hypothesis about the tissues or the MRI modality. Moreover, E(2)D-HUM does not care about the body part under examination and does not require any particular training task. People who want to use this algorithm, which is Matlab-based, have to set their own computers in order to execute it. Furthermore, they have to be Matlab-skilled to exploit all the features of the algorithm. In this paper, we propose to make such algorithm available as a service on a grid infrastructure, so that people can use it almost from everywhere, in a pervasive fashion, by means of a suitable user interface running on smartphones. The proposed solution allows physicians to use the E(2)D-HUM algorithm (or any other kind of algorithm, given that it is available as a service on the grid), being it remotely executed somewhere in the grid, and the results are sent back to the user's device. This way, physicians do not need to be aware of how to use Matlab to process their images. The pervasive service provision for medical image enhancement is presented, along with some experimental results obtained using smartphones connected to an existing Globus-based grid infrastructure.

  18. Textural constraints on the formation of alteration phases in CM chondrites

    NASA Technical Reports Server (NTRS)

    Joseph, L. H.; Browning, L. B.; Zolensky, M. E.

    1994-01-01

    Although it is generally believed that the secondary alteration phases observed in CM chondrites resulted from parent body reactions, the influence of nebular processing can not yet be dismissed. We have analyzed 5 CM falls using optical and electron microscopy to construct a comprehensive pictorial reference set of textural and mineralogical associations bearing on the origin of alteration products in these meteorites. Our analyses support pervasive aqueous alteration on the CM parent body, but they do not exclude the possibility of minor nebular alteration.

  19. Withdrawal Study of Memantine in Pediatric Patients With Autism, Asperger's Disorder, or Pervasive Developmental Disorder Not Otherwise Specified Previously Treated With Memantine

    ClinicalTrials.gov

    2013-10-31

    Autism Spectrum Disorder (ASD); Autism; Autistic Disorder; Asperger's Disorder; Asperger's; Pediatric Autism; Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS); Pervasive Child Development Disorder

  20. A Security Architecture Based on Trust Management for Pervasive Computing Systems

    DTIC Science & Technology

    2005-01-01

    SmartSpace framework, we extended the C2 [16] ar- chitecture, which in turn is based on the Centaurus [10] model. In Centaurus a Client can access...the services provided by the nearest Centaurus Service Manager (SM) via some short-range communi- cation. The SM acts as an active proxy by executing...The In the Centaurus project [10], the main design goal is the development of a framework for building portals to services using various types of

  1. Using OWL in a Pervasive Computing Broker

    DTIC Science & Technology

    2005-01-01

    carries or wears (e.g., cell phones , PDAs and headphones), services that are provided by de- vices in a room (e.g., projector service, light controller...ence of the users’ devices and clothing. As Alice enters the room, these sensors inform the R210 broker that a cell phone belonging to her is present and...the broker adds this fact in its knowledge base. As she sits, the agent on Alice’s Bluetooth enabled cell phone discovers R210’s broker and engages

  2. NEXUS - Resilient Intelligent Middleware

    NASA Astrophysics Data System (ADS)

    Kaveh, N.; Hercock, R. Ghanea

    Service-oriented computing, a composition of distributed-object computing, component-based, and Web-based concepts, is becoming the widespread choice for developing dynamic heterogeneous software assets available as services across a network. One of the major strengths of service-oriented technologies is the high abstraction layer and large granularity level at which software assets are viewed compared to traditional object-oriented technologies. Collaboration through encapsulated and separately defined service interfaces creates a service-oriented environment, whereby multiple services can be linked together through their interfaces to compose a functional system. This approach enables better integration of legacy and non-legacy services, via wrapper interfaces, and allows for service composition at a more abstract level especially in cases such as vertical market stacks. The heterogeneous nature of service-oriented technologies and the granularity of their software components makes them a suitable computing model in the pervasive domain.

  3. New paradigms in telemedicine: ambient intelligence, wearable, pervasive and personalized.

    PubMed

    Rubel, Paul; Fayn, Jocelyne; Simon-Chautemps, Lucas; Atoui, Hussein; Ohlsson, Mattias; Telisson, David; Adami, Stefano; Arod, Sébastien; Forlini, Marie Claire; Malossi, Cesare; Placide, Joël; Ziliani, Gian Luca; Assanelli, Deodato; Chevalier, Philippe

    2004-01-01

    After decades of development of information systems dedicated to health professionals, there is an increasing demand for personalized and non-hospital based care. An especially critical domain is cardiology: almost two third of cardiac deaths occur out of hospital, and victims do not survive long enough to benefit from in-hospital treatments. We need to reduce the time before treatment. But symptoms are often interpreted wrongly. The only immediate diagnostic tool to assess the possibility of a cardiac event is the electrocardiogram (ECG). Event and transtelephonic ECG recorders are used to improve decision making but require setting up new infrastructures. The European EPI-MEDICS project has developed an intelligent Personal ECG Monitor (PEM) for the early detection of cardiac events. The PEM embeds advanced decision making techniques, generates different alarm levels and forwards alarm messages to the relevant care providers by means of new generation wireless communication. It is cost saving, involving care provider only if necessary and requiring no specific infrastructure. This solution is a typical example of pervasive computing and ambient intelligence that demonstrates how personalized, wearable, ubiquitous devices could improve healthcare.

  4. Minimizing the Pervasiveness of Women's Personal Experiences of Gender Discrimination

    ERIC Educational Resources Information Center

    Foster, Mindi D.; Jackson, Lydia C.; Hartmann, Ryan; Woulfe, Shannon

    2004-01-01

    Given the Rejection-Identification Model (Branscombe, Schmitt, & Harvey, 1999), which shows that perceiving discrimination to be pervasive is a negative experience, it was suggested that there would be conditions under which women would instead minimize the pervasiveness of discrimination. Study 1 (N= 91) showed that when women envisioned…

  5. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 1 2011-01-01 2011-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...

  6. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 1 2014-01-01 2014-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...

  7. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 1 2013-01-01 2013-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...

  8. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...

  9. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...

  10. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...

  11. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...

  12. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 1 2012-01-01 2012-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...

  13. Using Instructional Pervasive Game for School Children's Cultural Learning

    ERIC Educational Resources Information Center

    Chen, Cheng-Ping; Shih, Ju-Ling; Ma, Yi-Chun

    2014-01-01

    In the past ten years, mobile learning (m-learning) has created a new learning environment that enables learners, through active learning aids. Instructional pervasive gaming (IPG) seems to be an innovative way introduced to enhance m-learning. This study employed a theoretical IPG model to construct a cultural-based pervasive game. Individual and…

  14. On Designing a Pervasive Mobile Learning Platform

    ERIC Educational Resources Information Center

    Laine, Teemu H.; Vinni, Mikko; Sedano, Carolina Islas; Joy, Mike

    2010-01-01

    This article presents the features, design and architecture of the Myst pervasive game platform that has been applied in creating pervasive mobile learning games in various contexts such as science festivals and museums in Finland. Based on our experiences with the development, we draw a set of design principles for creating successfully a…

  15. Health-enabling technologies for pervasive health care: on services and ICT architecture paradigms.

    PubMed

    Haux, Reinhold; Howe, Jurgen; Marschollek, Michael; Plischke, Maik; Wolf, Klaus-Hendrik

    2008-06-01

    Progress in information and communication technologies (ICT) is providing new opportunities for pervasive health care services in aging societies. To identify starting points of health-enabling technologies for pervasive health care. To describe typical services of and contemporary ICT architecture paradigms for pervasive health care. Summarizing outcomes of literature analyses and results from own research projects in this field. Basic functions for pervasive health care with respect to home care comprise emergency detection and alarm, disease management, as well as health status feedback and advice. These functions are complemented by optional (non-health care) functions. Four major paradigms for contemporary ICT architectures are person-centered ICT architectures, home-centered ICT architectures, telehealth service-centered ICT architectures and health care institution-centered ICT architectures. Health-enabling technologies may lead to both new ways of living and new ways of health care. Both ways are interwoven. This has to be considered for appropriate ICT architectures of sensor-enhanced health information systems. IMIA, the International Medical Informatics Association, may be an appropriate forum for interdisciplinary research exchange on health-enabling technologies for pervasive health care.

  16. A pervasive parallel framework for visualization: final report for FWP 10-014707

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moreland, Kenneth D.

    2014-01-01

    We are on the threshold of a transformative change in the basic architecture of highperformance computing. The use of accelerator processors, characterized by large core counts, shared but asymmetrical memory, and heavy thread loading, is quickly becoming the norm in high performance computing. These accelerators represent significant challenges in updating our existing base of software. An intrinsic problem with this transition is a fundamental programming shift from message passing processes to much more fine thread scheduling with memory sharing. Another problem is the lack of stability in accelerator implementation; processor and compiler technology is currently changing rapidly. This report documentsmore » the results of our three-year ASCR project to address these challenges. Our project includes the development of the Dax toolkit, which contains the beginnings of new algorithms for a new generation of computers and the underlying infrastructure to rapidly prototype and build further algorithms as necessary.« less

  17. Framework model and principles for trusted information sharing in pervasive health.

    PubMed

    Ruotsalainen, Pekka; Blobel, Bernd; Nykänen, Pirkko; Seppälä, Antto; Sorvari, Hannu

    2011-01-01

    Trustfulness (i.e. health and wellness information is processed ethically, and privacy is guaranteed) is one of the cornerstones for future Personal Health Systems, ubiquitous healthcare and pervasive health. Trust in today's healthcare is organizational, static and predefined. Pervasive health takes place in an open and untrusted information space where person's lifelong health and wellness information together with contextual data are dynamically collected and used by many stakeholders. This generates new threats that do not exist in today's eHealth systems. Our analysis shows that the way security and trust are implemented in today's healthcare cannot guarantee information autonomy and trustfulness in pervasive health. Based on a framework model of pervasive health and risks analysis of ubiquitous information space, we have formulated principles which enable trusted information sharing in pervasive health. Principles imply that the data subject should have the right to dynamically verify trust and to control the use of her health information, as well as the right to set situation based context-aware personal policies. Data collectors and processors have responsibilities including transparency of information processing, and openness of interests, policies and environmental features. Our principles create a base for successful management of privacy and information autonomy in pervasive health. They also imply that it is necessary to create new data models for personal health information and new architectures which support situation depending trust and privacy management.

  18. Test Review: Siegel, B. (2004). "Pervasive Developmental Disorder Screening Test--II (PDDST-II)." San Antonio, TX: Harcourt

    ERIC Educational Resources Information Center

    Montgomery, Janine M.; Duncan, C. Randy; Francis, Garnett C.

    2007-01-01

    The "Pervasive Developmental Disorder Screening Test-II (PDDST-II)--Early Childhood Screener for Autistic Spectrum Disorders" is a clinical screening tool for pervasive developmental disorders (PDD) or autism spectrum disorders (ASD) designed for use by nonspecialist clinicians. It was designed to differentiate children as young as 18 months who…

  19. Feasibility, strategy, methodology, and analysis of probe measurements in plasma under high gas pressure

    NASA Astrophysics Data System (ADS)

    Demidov, V. I.; Koepke, M. E.; Kurlyandskaya, I. P.; Malkov, M. A.

    2018-02-01

    This paper reviews existing theories for interpreting probe measurements of electron distribution functions (EDF) at high gas pressure when collisions of electrons with atoms and/or molecules near the probe are pervasive. An explanation of whether or not the measurements are realizable and reliable, an enumeration of the most common sources of measurement error, and an outline of proper probe-experiment design elements that inherently limit or avoid error is presented. Additionally, we describe recent expanded plasma-condition compatibility for EDF measurement, including in applications of large wall probe plasma diagnostics. This summary of the authors’ experiences gained over decades of practicing and developing probe diagnostics is intended to inform, guide, suggest, and detail the advantages and disadvantages of probe application in plasma research.

  20. REVIEW: Widespread access to predictive models in the motor system: a short review

    NASA Astrophysics Data System (ADS)

    Davidson, Paul R.; Wolpert, Daniel M.

    2005-09-01

    Recent behavioural and computational studies suggest that access to internal predictive models of arm and object dynamics is widespread in the sensorimotor system. Several systems, including those responsible for oculomotor and skeletomotor control, perceptual processing, postural control and mental imagery, are able to access predictions of the motion of the arm. A capacity to make and use predictions of object dynamics is similarly widespread. Here, we review recent studies looking at the predictive capacity of the central nervous system which reveal pervasive access to forward models of the environment.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Oberkampf, William Louis; Tucker, W. Troy; Zhang, Jianzhong

    This report summarizes methods to incorporate information (or lack of information) about inter-variable dependence into risk assessments that use Dempster-Shafer theory or probability bounds analysis to address epistemic and aleatory uncertainty. The report reviews techniques for simulating correlated variates for a given correlation measure and dependence model, computation of bounds on distribution functions under a specified dependence model, formulation of parametric and empirical dependence models, and bounding approaches that can be used when information about the intervariable dependence is incomplete. The report also reviews several of the most pervasive and dangerous myths among risk analysts about dependence in probabilistic models.

  2. A powered vascular staple for the application of segmental bronchial closure in thoracoscopic anatomic segmentectomy.

    PubMed

    Kuroda, Hiroaki; Yoshida, Tatsuya; Sakao, Yukinori

    2017-12-01

    We used the powered vascular staple (PVS) instead of the conventional staple technique [the utilization of the powered linier cutter (PLC)] or ligation for total 23 segmental or subsegmental bronchi with less than 10 mm in the bronchial luminal size on computed tomography (CT) in thoracoscopic segmentectomy. Our results suggested that the availability of the PVS represents a novel advance in the armamentarium and may have a possibility of being pervasive widely however, more observative periods and further sample accumulation are needed.

  3. No Pervasive Computing Without Intelligent Systems

    NASA Astrophysics Data System (ADS)

    Thompson, S. G.; Azvine, B.

    It is interesting to think about the technologies that have become part of our everyday lives and compare their invention and development with those that have fallen by the wayside. Examples of failed technologies such as electrical cars and satellite mobile telephones are not uncommon, but more interestingly numerous other technologies such as instant messaging, text messaging, and b2c eCommerce have moved through the cycle of initial rejection, adoptionby a new user community, and adaptation to its needs, despite the early scepticism of many users and commentators.

  4. Intrinsic neuromodulation: altering neuronal circuits from within.

    PubMed

    Katz, P S; Frost, W N

    1996-02-01

    There are two sources of neuromodulation for neuronal circuits: extrinsic inputs and intrinsic components of the circuits themselves. Extrinsic neuromodulation is known to be pervasive in nervous systems, but intrinsic neuromodulation is less recognized, despite the fact that it has now been demonstrated in sensory and neuromuscular circuits and in central pattern generators. By its nature, intrinsic neuromodulation produces local changes in neuronal computation, whereas extrinsic neuromodulation can cause global changes, often affecting many circuits simultaneously. Studies in a number of systems are defining the different properties of these two forms of neuromodulation.

  5. Vehicle Lightweighting: Challenges and Opportunities with Aluminum

    NASA Astrophysics Data System (ADS)

    Sachdev, Anil K.; Mishra, Raja K.; Mahato, Anirban; Alpas, Ahmet

    Rising energy costs, consumer preferences and regulations drive requirements for fuel economy, performance, comfort, safety and cost of future automobiles. These conflicting situations offer challenges for vehicle lightweighting, for which aluminum applications are key. This paper describes product design needs and materials and process development opportunities driven by theoretical, experimental and modeling tools in the area of sheet and castings. Computational tools and novel experimental techniques used in their development are described. The paper concludes with challenges that lie ahead for pervasive use of aluminum and the necessary fundamental R&D that is still needed.

  6. Forecasting Occurrences of Activities.

    PubMed

    Minor, Bryan; Cook, Diane J

    2017-07-01

    While activity recognition has been shown to be valuable for pervasive computing applications, less work has focused on techniques for forecasting the future occurrence of activities. We present an activity forecasting method to predict the time that will elapse until a target activity occurs. This method generates an activity forecast using a regression tree classifier and offers an advantage over sequence prediction methods in that it can predict expected time until an activity occurs. We evaluate this algorithm on real-world smart home datasets and provide evidence that our proposed approach is most effective at predicting activity timings.

  7. Algebraic properties of automata associated to Petri nets and applications to computation in biological systems.

    PubMed

    Egri-Nagy, Attila; Nehaniv, Chrystopher L

    2008-01-01

    Biochemical and genetic regulatory networks are often modeled by Petri nets. We study the algebraic structure of the computations carried out by Petri nets from the viewpoint of algebraic automata theory. Petri nets comprise a formalized graphical modeling language, often used to describe computation occurring within biochemical and genetic regulatory networks, but the semantics may be interpreted in different ways in the realm of automata. Therefore, there are several different ways to turn a Petri net into a state-transition automaton. Here, we systematically investigate different conversion methods and describe cases where they may yield radically different algebraic structures. We focus on the existence of group components of the corresponding transformation semigroups, as these reflect symmetries of the computation occurring within the biological system under study. Results are illustrated by applications to the Petri net modelling of intermediary metabolism. Petri nets with inhibition are shown to be computationally rich, regardless of the particular interpretation method. Along these lines we provide a mathematical argument suggesting a reason for the apparent all-pervasiveness of inhibitory connections in living systems.

  8. The Evolution of Digital Chemistry at Southampton.

    PubMed

    Bird, Colin; Coles, Simon J; Frey, Jeremy G

    2015-09-01

    In this paper we take a historical view of e-Science and e-Research developments within the Chemical Sciences at the University of Southampton, showing the development of several stages of the evolving data ecosystem as Chemistry moves into the digital age of the 21(st) Century. We cover our research on aspects of the representation of chemical information in the context of the world wide web (WWW) and its semantic enhancement (the Semantic Web) and illustrate this with the example of the representation of quantities and units within the Semantic Web. We explore the changing nature of laboratories as computing power becomes increasing powerful and pervasive and specifically look at the function and role of electronic or digital notebooks. Having focussed on the creation of chemical data and information in context, we finish the paper by following the use and reuse of this data as facilitated by the features provided by digital repositories and their importance in facilitating the exchange of chemical information touching on the issues of open and or intelligent access to the data. © 2015 The Authors. Published by Wiley-VCH Verlag GmbH & Co. KGaA. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

  9. A Learning Outcome-Oriented Approach towards Classifying Pervasive Games for Learning Using Game Design Patterns and Contextual Information

    ERIC Educational Resources Information Center

    Schmitz, Birgit; Klemke, Roland; Specht, Marcus

    2013-01-01

    Mobile and in particular pervasive games are a strong component of future scenarios for teaching and learning. Based on results from a previous review of practical papers, this work explores the educational potential of pervasive games for learning by analysing underlying game mechanisms. In order to determine and classify cognitive and affective…

  10. A Formalisation of Adaptable Pervasive Flows

    NASA Astrophysics Data System (ADS)

    Bucchiarone, Antonio; Lafuente, Alberto Lluch; Marconi, Annapaola; Pistore, Marco

    Adaptable Pervasive Flows is a novel workflow-based paradigm for the design and execution of pervasive applications, where dynamic workflows situated in the real world are able to modify their execution in order to adapt to changes in their environment. In this paper, we study a formalisation of such flows by means of a formal flow language. More precisely, we define APFoL (Adaptable Pervasive Flow Language) and formalise its textual notation by encoding it in Blite, a formalisation of WS-BPEL. The encoding in Blite equips the language with a formal semantics and enables the use of automated verification techniques. We illustrate the approach with an example of a Warehouse Case Study.

  11. Pervasive Transcription of a Herpesvirus Genome Generates Functionally Important RNAs

    PubMed Central

    Canny, Susan P.; Reese, Tiffany A.; Johnson, L. Steven; Zhang, Xin; Kambal, Amal; Duan, Erning; Liu, Catherine Y.; Virgin, Herbert W.

    2014-01-01

    ABSTRACT Pervasive transcription is observed in a wide range of organisms, including humans, mice, and viruses, but the functional significance of the resulting transcripts remains uncertain. Current genetic approaches are often limited by their emphasis on protein-coding open reading frames (ORFs). We previously identified extensive pervasive transcription from the murine gammaherpesvirus 68 (MHV68) genome outside known ORFs and antisense to known genes (termed expressed genomic regions [EGRs]). Similar antisense transcripts have been identified in many other herpesviruses, including Kaposi’s sarcoma-associated herpesvirus and human and murine cytomegalovirus. Despite their prevalence, whether these RNAs have any functional importance in the viral life cycle is unknown, and one interpretation is that these are merely “noise” generated by functionally unimportant transcriptional events. To determine whether pervasive transcription of a herpesvirus genome generates RNA molecules that are functionally important, we used a strand-specific functional approach to target transcripts from thirteen EGRs in MHV68. We found that targeting transcripts from six EGRs reduced viral protein expression, proving that pervasive transcription can generate functionally important RNAs. We characterized transcripts emanating from EGRs 26 and 27 in detail using several methods, including RNA sequencing, and identified several novel polyadenylated transcripts that were enriched in the nuclei of infected cells. These data provide the first evidence of the functional importance of regions of pervasive transcription emanating from MHV68 EGRs. Therefore, studies utilizing mutation of a herpesvirus genome must account for possible effects on RNAs generated by pervasive transcription. PMID:24618256

  12. Pervasive influence of idiosyncratic associative biases during facial emotion recognition.

    PubMed

    El Zein, Marwa; Wyart, Valentin; Grèzes, Julie

    2018-06-11

    Facial morphology has been shown to influence perceptual judgments of emotion in a way that is shared across human observers. Here we demonstrate that these shared associations between facial morphology and emotion coexist with strong variations unique to each human observer. Interestingly, a large part of these idiosyncratic associations does not vary on short time scales, emerging from stable inter-individual differences in the way facial morphological features influence emotion recognition. Computational modelling of decision-making and neural recordings of electrical brain activity revealed that both shared and idiosyncratic face-emotion associations operate through a common biasing mechanism rather than an increased sensitivity to face-associated emotions. Together, these findings emphasize the underestimated influence of idiosyncrasies on core social judgments and identify their neuro-computational signatures.

  13. Pervasive Learning--Using Games to Tear down the Classroom Walls

    ERIC Educational Resources Information Center

    Pløhn, Trygve

    2014-01-01

    Pervasive gaming is a new and emerging gaming genre where the physical and social aspects of the real world are integrated into the game and blends into the player's everyday life. Given the nature of pervasive games, it may be possible to use that type of game as a tool to support learning in a university course by providing a gameplay where the…

  14. Evolution and Control of 2219 Aluminum Microstructural Features Through Electron Beam Freeform Fabrication

    NASA Technical Reports Server (NTRS)

    Taminger, Karen M.; Hafley, Robert A.; Domack, Marcia S.

    2006-01-01

    The layer-additive nature of the electron beam freeform fabrication (EBF3) process results in a tortuous thermal path producing complex microstructures including: small homogeneous equiaxed grains; dendritic growth contained within larger grains; and/or pervasive dendritic formation in the interpass regions of the deposits. Several process control variables contribute to the formation of these different microstructures, including translation speed, wire feed rate, beam current and accelerating voltage. In electron beam processing, higher accelerating voltages embed the energy deeper below the surface of the substrate. Two EBF3 systems have been established at NASA Langley, one with a low-voltage (10-30kV) and the other a high-voltage (30-60 kV) electron beam gun. Aluminum alloy 2219 was processed over a range of different variables to explore the design space and correlate the resultant microstructures with the processing parameters. This report is specifically exploring the impact of accelerating voltage. Of particular interest is correlating energy to the resultant material characteristics to determine the potential of achieving microstructural control through precise management of the heat flux and cooling rates during deposition.

  15. Transformation in the pharmaceutical industry--a systematic analysis of operational evidence.

    PubMed

    Shafiei, Nader; Ford, James L; Morecroft, Charles W; Lisboa, Paulo J; Taylor, Mark J; Mouzughi, Yusra

    2013-01-01

    Through systematic collection and trending of pharmaceutical data, operational evidence to verify existence of 14 factors affecting the ongoing pharmaceutical transformation has been compiled. These 14 factors are termed transformation triggers. The theoretical evidence in support of these triggers is carried forward from a systematic review of the literature that was conducted previously. Trends in operational evidence and the associated theoretical evidence were compared to identify areas of similarity and contrast. Areas of strong correlation between theoretical evidence and operational evidence included four transformation triggers: a fully integrated pharma network, personalized medicine, translational research, and pervasive computing. Key areas of contrast included three transformation triggers-namely, healthcare management focus, adaptive trials, and regulatory enforcement-for which the operational evidence was stronger than the theoretical evidence. The intent of this paper is to provide proof to demonstrate if there is any operational evidence that supports the 14 transformation triggers previously identified during the theoretical part of this research. The theoretical evidence for these triggers was carried forward to this paper for study from an operational perspective. The practical evidence established in this paper was compared with the corresponding theoretical evidence to identify areas of similarity and difference. This resulted in four triggers that had strong relationship between operational and theoretical evidence; they are a fully integrated pharma network, personalized medicine, translational research, and pervasive computing. The areas of difference included three transformation triggers for which the operational evidence was stronger than the theoretical evidence. These were healthcare management focus, adaptive trials, and regulatory enforcement.

  16. Evidence of pervasive biologically functional secondary structures within the genomes of eukaryotic single-stranded DNA viruses.

    PubMed

    Muhire, Brejnev Muhizi; Golden, Michael; Murrell, Ben; Lefeuvre, Pierre; Lett, Jean-Michel; Gray, Alistair; Poon, Art Y F; Ngandu, Nobubelo Kwanele; Semegni, Yves; Tanov, Emil Pavlov; Monjane, Adérito Luis; Harkins, Gordon William; Varsani, Arvind; Shepherd, Dionne Natalie; Martin, Darren Patrick

    2014-02-01

    Single-stranded DNA (ssDNA) viruses have genomes that are potentially capable of forming complex secondary structures through Watson-Crick base pairing between their constituent nucleotides. A few of the structural elements formed by such base pairings are, in fact, known to have important functions during the replication of many ssDNA viruses. Unknown, however, are (i) whether numerous additional ssDNA virus genomic structural elements predicted to exist by computational DNA folding methods actually exist and (ii) whether those structures that do exist have any biological relevance. We therefore computationally inferred lists of the most evolutionarily conserved structures within a diverse selection of animal- and plant-infecting ssDNA viruses drawn from the families Circoviridae, Anelloviridae, Parvoviridae, Nanoviridae, and Geminiviridae and analyzed these for evidence of natural selection favoring the maintenance of these structures. While we find evidence that is consistent with purifying selection being stronger at nucleotide sites that are predicted to be base paired than at sites predicted to be unpaired, we also find strong associations between sites that are predicted to pair with one another and site pairs that are apparently coevolving in a complementary fashion. Collectively, these results indicate that natural selection actively preserves much of the pervasive secondary structure that is evident within eukaryote-infecting ssDNA virus genomes and, therefore, that much of this structure is biologically functional. Lastly, we provide examples of various highly conserved but completely uncharacterized structural elements that likely have important functions within some of the ssDNA virus genomes analyzed here.

  17. Evidence of Pervasive Biologically Functional Secondary Structures within the Genomes of Eukaryotic Single-Stranded DNA Viruses

    PubMed Central

    Muhire, Brejnev Muhizi; Golden, Michael; Murrell, Ben; Lefeuvre, Pierre; Lett, Jean-Michel; Gray, Alistair; Poon, Art Y. F.; Ngandu, Nobubelo Kwanele; Semegni, Yves; Tanov, Emil Pavlov; Monjane, Adérito Luis; Harkins, Gordon William; Varsani, Arvind; Shepherd, Dionne Natalie

    2014-01-01

    Single-stranded DNA (ssDNA) viruses have genomes that are potentially capable of forming complex secondary structures through Watson-Crick base pairing between their constituent nucleotides. A few of the structural elements formed by such base pairings are, in fact, known to have important functions during the replication of many ssDNA viruses. Unknown, however, are (i) whether numerous additional ssDNA virus genomic structural elements predicted to exist by computational DNA folding methods actually exist and (ii) whether those structures that do exist have any biological relevance. We therefore computationally inferred lists of the most evolutionarily conserved structures within a diverse selection of animal- and plant-infecting ssDNA viruses drawn from the families Circoviridae, Anelloviridae, Parvoviridae, Nanoviridae, and Geminiviridae and analyzed these for evidence of natural selection favoring the maintenance of these structures. While we find evidence that is consistent with purifying selection being stronger at nucleotide sites that are predicted to be base paired than at sites predicted to be unpaired, we also find strong associations between sites that are predicted to pair with one another and site pairs that are apparently coevolving in a complementary fashion. Collectively, these results indicate that natural selection actively preserves much of the pervasive secondary structure that is evident within eukaryote-infecting ssDNA virus genomes and, therefore, that much of this structure is biologically functional. Lastly, we provide examples of various highly conserved but completely uncharacterized structural elements that likely have important functions within some of the ssDNA virus genomes analyzed here. PMID:24284329

  18. Towards Pervasive Augmented Reality: Context-Awareness in Augmented Reality.

    PubMed

    Grubert, Jens; Langlotz, Tobias; Zollmann, Stefanie; Regenbrecht, Holger

    2017-06-01

    Augmented Reality is a technique that enables users to interact with their physical environment through the overlay of digital information. While being researched for decades, more recently, Augmented Reality moved out of the research labs and into the field. While most of the applications are used sporadically and for one particular task only, current and future scenarios will provide a continuous and multi-purpose user experience. Therefore, in this paper, we present the concept of Pervasive Augmented Reality, aiming to provide such an experience by sensing the user's current context and adapting the AR system based on the changing requirements and constraints. We present a taxonomy for Pervasive Augmented Reality and context-aware Augmented Reality, which classifies context sources and context targets relevant for implementing such a context-aware, continuous Augmented Reality experience. We further summarize existing approaches that contribute towards Pervasive Augmented Reality. Based our taxonomy and survey, we identify challenges for future research directions in Pervasive Augmented Reality.

  19. Mobile Autonomous Sensing Unit (MASU): A Framework That Supports Distributed Pervasive Data Sensing

    PubMed Central

    Medina, Esunly; Lopez, David; Meseguer, Roc; Ochoa, Sergio F.; Royo, Dolors; Santos, Rodrigo

    2016-01-01

    Pervasive data sensing is a major issue that transverses various research areas and application domains. It allows identifying people’s behaviour and patterns without overwhelming the monitored persons. Although there are many pervasive data sensing applications, they are typically focused on addressing specific problems in a single application domain, making them difficult to generalize or reuse. On the other hand, the platforms for supporting pervasive data sensing impose restrictions to the devices and operational environments that make them unsuitable for monitoring loosely-coupled or fully distributed work. In order to help address this challenge this paper present a framework that supports distributed pervasive data sensing in a generic way. Developers can use this framework to facilitate the implementations of their applications, thus reducing complexity and effort in such an activity. The framework was evaluated using simulations and also through an empirical test, and the obtained results indicate that it is useful to support such a sensing activity in loosely-coupled or fully distributed work scenarios. PMID:27409617

  20. Electronics design of a multi-rate DPSK modem for free-space optical communications

    NASA Astrophysics Data System (ADS)

    Rao, H. G.; Browne, C. A.; Caplan, D. O.; Carney, J. J.; Chavez, M. L.; Fletcher, A. S.; Fitzgerald, J. J.; Kaminsky, R. D.; Lund, G.; Hamilton, S. A.; Magliocco, R. J.; Mikulina, O. V.; Murphy, R. J.; Seaver, M. M.; Scheinbart, M. S.; Spellmeyer, N. W.; Wang, J. P.

    2014-03-01

    We have designed and experimentally demonstrated a radiation-hardened modem suitable for NASA's Laser Communications Relay Demonstration. The modem supports free-space DPSK communication over a wide range of channel rates, from 72 Mb/s up to 2.88 Gb/s. The modem transmitter electronics generate a bursty DPSK waveform, such that only one optical modulator is required. The receiver clock recovery is capable of operating over all channel rates at average optical signal levels below -70 dBm. The modem incorporates a radiation-hardened Xilinx Virtex 5 FPGA and a radiation-hardened Aeroflex UT699 CPU. The design leverages unique capabilities of each device, such as the FPGA's multi-gigabit transceivers. The modem scrubs itself against radiation events, but does not require pervasive triple-mode redundant logic. The modem electronics include automatic stabilization functions for its optical components, and software to control its initialization and operation. The design allows the modem to be put into a low-power standby mode.

  1. Gigahertz Electromagnetic Structures via Direct Ink Writing for Radio-Frequency Oscillator and Transmitter Applications.

    PubMed

    Zhou, Nanjia; Liu, Chengye; Lewis, Jennifer A; Ham, Donhee

    2017-04-01

    Radio-frequency (RF) electronics, which combine passive electromagnetic devices and active transistors to generate and process gigahertz (GHz) signals, provide a critical basis of ever-pervasive wireless networks. While transistors are best realized by top-down fabrication, relatively larger electromagnetic passives are within the reach of printing techniques. Here, direct writing of viscoelastic silver-nanoparticle inks is used to produce a broad array of RF passives operating up to 45 GHz. These include lumped devices such as inductors and capacitors, and wave-based devices such as transmission lines, their resonant networks, and antennas. Moreover, to demonstrate the utility of these printed RF passive structures in active RF electronic circuits, they are combined with discrete transistors to fabricate GHz self-sustained oscillators and synchronized oscillator arrays that provide RF references, and wireless transmitters clocked by the oscillators. This work demonstrates the synergy of direct ink writing and RF electronics for wireless applications. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  2. Converging, pervasive technologies: chronic and emerging issues and policy adequacy.

    PubMed

    Seelman, Katherine D

    2008-01-01

    This article is a thought piece with the expansive goal of identifying policy facilitators and barriers to the development of usable and accessible advanced information and communications technology for people with disabilities across the age span at the research and development and marketing stages. The working hypothesis is as follows: The lack of participation in and representation of the interests of people with disabilities in the technology resource system is a barrier to availability of affordable consumer goods that enable independence and community integration. Converging, pervasive computing technology, especially in housing applications, is used as a case example, drawing especially from research and development conducted by the National Science Foundation Quality of Life Technology Engineering Research Center. A critical theory approach is used to identify problems and seek solutions to the apparent lack of balance between the demand and needs of disabled users and the supply and availability of usable, affordable consumer goods produced by the technology resource system in which allocation decisions are made. The approach uses policy analysis tools such as a technology assessment framework; the participation and environment components of the World Health Organization's International Classification of Functioning, Disability and Health; and participatory action research.

  3. Wearable Therapy - Detecting Information from Wearables and Mobiles that are Relevant to Clinical and Self-directed Therapy.

    PubMed

    Arnrich, Bert; Ersoy, Cem; Mayora, Oscar; Dey, Anind; Berthouze, Nadia; Kunze, Kai

    2017-01-09

    This accompanying editorial provides a brief introduction into the focus theme "Wearable Therapy". The focus theme "Wearable Therapy" aims to present contributions which target wearable and mobile technologies to support clinical and self-directed therapy. A call for papers was announced to all participants of the "9th International Conference on Pervasive Computing Technologies for Healthcare" and was published in November 2015. A peer review process was conducted to select the papers for the focus theme. Six papers were selected to be included in this focus theme. The paper topics cover a broad range including an approach to build a health informatics research program, a comprehensive literature review of self-quantification for health self-management, methods for affective state detection of informal care givers, social-aware handling of falls, smart shoes for supporting self-directed therapy of alcohol addicts, and reference information model for pervasive health systems. More empirical evidence is needed that confirms sustainable effects of employing wearable and mobile technology for clinical and self-directed therapy. Inconsistencies between different conceptual approaches need to be revealed in order to enable more systematic investigations and comparisons.

  4. The mixed reality of things: emerging challenges for human-information interaction

    NASA Astrophysics Data System (ADS)

    Spicer, Ryan P.; Russell, Stephen M.; Rosenberg, Evan Suma

    2017-05-01

    Virtual and mixed reality technology has advanced tremendously over the past several years. This nascent medium has the potential to transform how people communicate over distance, train for unfamiliar tasks, operate in challenging environments, and how they visualize, interact, and make decisions based on complex data. At the same time, the marketplace has experienced a proliferation of network-connected devices and generalized sensors that are becoming increasingly accessible and ubiquitous. As the "Internet of Things" expands to encompass a predicted 50 billion connected devices by 2020, the volume and complexity of information generated in pervasive and virtualized environments will continue to grow exponentially. The convergence of these trends demands a theoretically grounded research agenda that can address emerging challenges for human-information interaction (HII). Virtual and mixed reality environments can provide controlled settings where HII phenomena can be observed and measured, new theories developed, and novel algorithms and interaction techniques evaluated. In this paper, we describe the intersection of pervasive computing with virtual and mixed reality, identify current research gaps and opportunities to advance the fundamental understanding of HII, and discuss implications for the design and development of cyber-human systems for both military and civilian use.

  5. Positives and negatives of online dating according to women 50.

    PubMed

    Vandeweerd, Carla; Myers, Jaime; Coulter, Martha; Yalcin, Ali; Corvin, Jaime

    2016-01-01

    To understand the positives and negatives of online dating according to the lived experience of older women, telephone interviews were conducted with 45 women ages 50+ who date online. Interviews were audio recorded, transcribed verbatim, and thematically team coded. The opportunity to expand one's social network for both friendships and romantic partners, the ability to control dating risks and pace of relationship formation, and knowing more about one's partner were significant reported benefits of online dating. Dating online also includes unique risks, such as pervasive lying, attempted financial exploitation in the form of scammers, and unwanted electronic sexual aggression.

  6. Today's CIO: catalyst for managed care change.

    PubMed

    Sanchez, P

    1997-05-01

    As the impact of managed care increases and capitation becomes all pervasive, healthcare providers' attention to cost control will intensify. For integrated delivery networks (IDNs) to be competitive, today's CIO must leverage managed care as a catalyst for change, and use a sophisticated information system toolset as the means to an integrated end. An area many CIOs target for fast results and maximum cost savings in resource management. This article reviews how Dick Escue, chief information officer at Baptist Memorial Health Care Corporation (Memphis, TN), uses electronic information management systems to integrate and conserve the resources of Baptist's widespread healthcare organization.

  7. Applied nursing informatics research - state-of-the-art methodologies using electronic health record data.

    PubMed

    Park, Jung In; Pruinelli, Lisiane; Westra, Bonnie L; Delaney, Connie W

    2014-01-01

    With the pervasive implementation of electronic health records (EHR), new opportunities arise for nursing research through use of EHR data. Increasingly, comparative effectiveness research within and across health systems is conducted to identify the impact of nursing for improving health, health care, and lowering costs of care. Use of EHR data for this type of research requires use of national and internationally recognized nursing terminologies to normalize data. Research methods are evolving as large data sets become available through EHRs. Little is known about the types of research and analytic methods for applied to nursing research using EHR data normalized with nursing terminologies. The purpose of this paper is to report on a subset of a systematic review of peer reviewed studies related to applied nursing informatics research involving EHR data using standardized nursing terminologies.

  8. Using Digital Computer Field Mapping of Outcrops to Examine the Preservation of High-P Rocks During Pervasive, Retrograde Greenschist Fluid Infiltration, Tinos, Cyclades Archipelago, Greece

    NASA Astrophysics Data System (ADS)

    Breeding, C. M.; Ague, J. J.; Broecker, M.

    2001-12-01

    Digital field mapping of outcrops on the island of Tinos, Greece, was undertaken to investigate the nature of retrograde fluid infiltration during exhumation of high-P metamorphic rocks of the Attic-Cycladic blueschist belt. High-resolution digital photographs of outcrops were taken and loaded into graphics editing software on a portable, belt-mounted computer in the field. Geologic features from outcrops were drawn and labeled on the digital images using the software in real-time. The ability to simultaneously identify geologic features in outcrops and digitize those features onto digital photographs in the field allows the creation of detailed, field-verified, outcrop-scale maps that aid in geologic interpretation. During Cretaceous-Eocene subduction in the Cyclades, downgoing crustal material was metamorphosed to eclogite and blueschist facies. Subsequent Oligocene-Miocene exhumation of the high-P rocks was accompanied by pervasive, retrograde fluid infiltration resulting in nearly complete greenschist facies overprinting. On Tinos, most high-P rocks have undergone intense retrogression; however, adjacent to thick marble horizons with completely retrograded contact zones, small (sub km-scale) enclaves of high-P rocks (blueschist and minor eclogite facies) were preserved. Field observations suggest that the remnant high-P zones consist mostly of massive metabasic rocks and minor adjacent metasediments. Within the enclaves, detailed digital outcrop maps reveal that greenschist retrogression increases in intensity outward from the center, implying interaction with a fluid flowing along enclave perimeters. Permeability contrasts could not have been solely responsible for preservation of the high-P rocks, as similar rock suites distal to marble contacts were completely overprinted. We conclude that the retrograded contacts of the marble units served as high-permeability conduits for regional retrograde fluid flow. Pervasive, layer-parallel flow through metasediments would have been drawn into these more permeable flow channels. Deflections in fluid flow paths toward the high flux contacts likely caused retrograde fluids to flow around the enclaves, preserving the zones of "dry," unretrograded high-P rocks near marble horizons. Digital mapping of outcrops is a unique method for direct examination of the relationships between geologic structure, lithology, and mineral assemblage variation in the field. Outcrop mapping in the Attic-Cycladic blueschist belt has revealed that regional fluid flow along contacts can have important implications for the large-scale distribution of mineral assemblages in metamorphic terranes.

  9. Computing through Scientific Abstractions in SysBioPS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chin, George; Stephan, Eric G.; Gracio, Deborah K.

    2004-10-13

    Today, biologists and bioinformaticists have a tremendous amount of computational power at their disposal. With the availability of supercomputers, burgeoning scientific databases and digital libraries such as GenBank and PubMed, and pervasive computational environments such as the Grid, biologists have access to a wealth of computational capabilities and scientific data at hand. Yet, the rapid development of computational technologies has far exceeded the typical biologist’s ability to effectively apply the technology in their research. Computational sciences research and development efforts such as the Biology Workbench, BioSPICE (Biological Simulation Program for Intra-Cellular Evaluation), and BioCoRE (Biological Collaborative Research Environment) are importantmore » in connecting biologists and their scientific problems to computational infrastructures. On the Computational Cell Environment and Heuristic Entity-Relationship Building Environment projects at the Pacific Northwest National Laboratory, we are jointly developing a new breed of scientific problem solving environment called SysBioPSE that will allow biologists to access and apply computational resources in the scientific research context. In contrast to other computational science environments, SysBioPSE operates as an abstraction layer above a computational infrastructure. The goal of SysBioPSE is to allow biologists to apply computational resources in the context of the scientific problems they are addressing and the scientific perspectives from which they conduct their research. More specifically, SysBioPSE allows biologists to capture and represent scientific concepts and theories and experimental processes, and to link these views to scientific applications, data repositories, and computer systems.« less

  10. Data compression for sequencing data

    PubMed Central

    2013-01-01

    Post-Sanger sequencing methods produce tons of data, and there is a general agreement that the challenge to store and process them must be addressed with data compression. In this review we first answer the question “why compression” in a quantitative manner. Then we also answer the questions “what” and “how”, by sketching the fundamental compression ideas, describing the main sequencing data types and formats, and comparing the specialized compression algorithms and tools. Finally, we go back to the question “why compression” and give other, perhaps surprising answers, demonstrating the pervasiveness of data compression techniques in computational biology. PMID:24252160

  11. A cloud computing based 12-lead ECG telemedicine service

    PubMed Central

    2012-01-01

    Background Due to the great variability of 12-lead ECG instruments and medical specialists’ interpretation skills, it remains a challenge to deliver rapid and accurate 12-lead ECG reports with senior cardiologists’ decision making support in emergency telecardiology. Methods We create a new cloud and pervasive computing based 12-lead Electrocardiography (ECG) service to realize ubiquitous 12-lead ECG tele-diagnosis. Results This developed service enables ECG to be transmitted and interpreted via mobile phones. That is, tele-consultation can take place while the patient is on the ambulance, between the onsite clinicians and the off-site senior cardiologists, or among hospitals. Most importantly, this developed service is convenient, efficient, and inexpensive. Conclusions This cloud computing based ECG tele-consultation service expands the traditional 12-lead ECG applications onto the collaboration of clinicians at different locations or among hospitals. In short, this service can greatly improve medical service quality and efficiency, especially for patients in rural areas. This service has been evaluated and proved to be useful by cardiologists in Taiwan. PMID:22838382

  12. A cloud computing based 12-lead ECG telemedicine service.

    PubMed

    Hsieh, Jui-Chien; Hsu, Meng-Wei

    2012-07-28

    Due to the great variability of 12-lead ECG instruments and medical specialists' interpretation skills, it remains a challenge to deliver rapid and accurate 12-lead ECG reports with senior cardiologists' decision making support in emergency telecardiology. We create a new cloud and pervasive computing based 12-lead Electrocardiography (ECG) service to realize ubiquitous 12-lead ECG tele-diagnosis. This developed service enables ECG to be transmitted and interpreted via mobile phones. That is, tele-consultation can take place while the patient is on the ambulance, between the onsite clinicians and the off-site senior cardiologists, or among hospitals. Most importantly, this developed service is convenient, efficient, and inexpensive. This cloud computing based ECG tele-consultation service expands the traditional 12-lead ECG applications onto the collaboration of clinicians at different locations or among hospitals. In short, this service can greatly improve medical service quality and efficiency, especially for patients in rural areas. This service has been evaluated and proved to be useful by cardiologists in Taiwan.

  13. PCA method for automated detection of mispronounced words

    NASA Astrophysics Data System (ADS)

    Ge, Zhenhao; Sharma, Sudhendu R.; Smith, Mark J. T.

    2011-06-01

    This paper presents a method for detecting mispronunciations with the aim of improving Computer Assisted Language Learning (CALL) tools used by foreign language learners. The algorithm is based on Principle Component Analysis (PCA). It is hierarchical with each successive step refining the estimate to classify the test word as being either mispronounced or correct. Preprocessing before detection, like normalization and time-scale modification, is implemented to guarantee uniformity of the feature vectors input to the detection system. The performance using various features including spectrograms and Mel-Frequency Cepstral Coefficients (MFCCs) are compared and evaluated. Best results were obtained using MFCCs, achieving up to 99% accuracy in word verification and 93% in native/non-native classification. Compared with Hidden Markov Models (HMMs) which are used pervasively in recognition application, this particular approach is computational efficient and effective when training data is limited.

  14. The fission yeast CENP-B protein Abp1 prevents pervasive transcription of repetitive DNA elements.

    PubMed

    Daulny, Anne; Mejía-Ramírez, Eva; Reina, Oscar; Rosado-Lugo, Jesus; Aguilar-Arnal, Lorena; Auer, Herbert; Zaratiegui, Mikel; Azorin, Fernando

    2016-10-01

    It is well established that eukaryotic genomes are pervasively transcribed producing cryptic unstable transcripts (CUTs). However, the mechanisms regulating pervasive transcription are not well understood. Here, we report that the fission yeast CENP-B homolog Abp1 plays an important role in preventing pervasive transcription. We show that loss of abp1 results in the accumulation of CUTs, which are targeted for degradation by the exosome pathway. These CUTs originate from different types of genomic features, but the highest increase corresponds to Tf2 retrotransposons and rDNA repeats, where they map along the entire elements. In the absence of abp1, increased RNAPII-Ser5P occupancy is observed throughout the Tf2 coding region and, unexpectedly, RNAPII-Ser5P is enriched at rDNA repeats. Loss of abp1 also results in Tf2 derepression and increased nucleolus size. Altogether these results suggest that Abp1 prevents pervasive RNAPII transcription of repetitive DNA elements (i.e., Tf2 and rDNA repeats) from internal cryptic sites. Copyright © 2016 Elsevier B.V. All rights reserved.

  15. Landau-Kleffner Syndrome

    MedlinePlus

    ... difficult to diagnose and may be misdiagnosed as autism, pervasive developmental disorder, hearing impairment, learning disability, auditory/ ... difficult to diagnose and may be misdiagnosed as autism, pervasive developmental disorder, hearing impairment, learning disability, auditory/ ...

  16. Mobile technology habits: patterns of association among device usage, intertemporal preference, impulse control, and reward sensitivity.

    PubMed

    Wilmer, Henry H; Chein, Jason M

    2016-10-01

    Mobile electronic devices are playing an increasingly pervasive role in our daily activities. Yet, there has been very little empirical research investigating how mobile technology habits might relate to individual differences in cognition and affect. The research presented in this paper provides evidence that heavier investment in mobile devices is correlated with a relatively weaker tendency to delay gratification (as measured by a delay discounting task) and a greater inclination toward impulsive behavior (i.e., weaker impulse control, assessed behaviorally and through self-report) but is not related to individual differences in sensitivity to reward. Analyses further demonstrated that individual variation in impulse control mediates the relationship between mobile technology usage and delay of gratification. Although based on correlational results, these findings lend some backing to concerns that increased use of portable electronic devices could have negative impacts on impulse control and the ability to appropriately valuate delayed rewards.

  17. Utilizing electronic health records to predict acute kidney injury risk and outcomes: workgroup statements from the 15(th) ADQI Consensus Conference.

    PubMed

    Sutherland, Scott M; Chawla, Lakhmir S; Kane-Gill, Sandra L; Hsu, Raymond K; Kramer, Andrew A; Goldstein, Stuart L; Kellum, John A; Ronco, Claudio; Bagshaw, Sean M

    2016-01-01

    The data contained within the electronic health record (EHR) is "big" from the standpoint of volume, velocity, and variety. These circumstances and the pervasive trend towards EHR adoption have sparked interest in applying big data predictive analytic techniques to EHR data. Acute kidney injury (AKI) is a condition well suited to prediction and risk forecasting; not only does the consensus definition for AKI allow temporal anchoring of events, but no treatments exist once AKI develops, underscoring the importance of early identification and prevention. The Acute Dialysis Quality Initiative (ADQI) convened a group of key opinion leaders and stakeholders to consider how best to approach AKI research and care in the "Big Data" era. This manuscript addresses the core elements of AKI risk prediction and outlines potential pathways and processes. We describe AKI prediction targets, feature selection, model development, and data display.

  18. "What Are You Viewing?" Exploring the Pervasive Social TV Experience

    NASA Astrophysics Data System (ADS)

    Schatz, Raimund; Baillie, Lynne; Fröhlich, Peter; Egger, Sebastian; Grechenig, Thomas

    The vision of pervasive TV foresees users engaging with interactive video services across a variety of contexts and user interfaces. Following this idea, this chapter extends traditional Social TV toward the notion of pervasive Social TV (PSTV) by including mobile viewing scenarios. We discuss social interaction enablers that integrate TV content consumption and communication in the context of two case studies that evaluate Social TV on mobile smartphones as well as the traditional set-top-box-based setup. We report on the impact of social features such as text-chat, audio-chat, and synchronized channel-choice on the end-user's media experience. By analyzing the commonalities and the differences between mobile and living-room Social TV that we found, we provide guidance on the design of pervasive Social TV systems as well as on future research issues.

  19. ICT and the future of healthcare: Aspects of pervasive health monitoring.

    PubMed

    Haluza, Daniela; Jungwirth, David

    2018-01-01

    Along with the digital revolution, information and communication technology applications are currently transforming the delivery of health and social care services. This paper investigates prevailing opinions toward future technology-based healthcare solutions among Austrian healthcare professionals. During a biphasic online Delphi survey, panelists rated expected outcomes of two future scenarios describing pervasive health monitoring applications. Experts perceived that the scenarios were highly innovative, but only moderately desirable, and that their implementation could especially improve patients' knowledge, quality of healthcare, and living standard. Contrarily, monetary aspects, technical prerequisites, and data security were identified as key obstacles. We further compared the impact of professional affiliation. Clearly, opinions toward pervasive healthcare differed between the interest groups, medical professionals, patient advocates, and administrative personnel. These data suggest closer collaborations between stakeholder groups to harmonize differences in expectations regarding pervasive health monitoring.

  20. Kinetic instabilities in the solar wind driven by temperature anisotropies

    NASA Astrophysics Data System (ADS)

    Yoon, Peter H.

    2017-12-01

    The present paper comprises a review of kinetic instabilities that may be operative in the solar wind, and how they influence the dynamics thereof. The review is limited to collective plasma instabilities driven by the temperature anisotropies. To limit the scope even further, the discussion is restricted to the temperature anisotropy-driven instabilities within the model of bi-Maxwellian plasma velocity distribution function. The effects of multiple particle species or the influence of field-aligned drift will not be included. The field-aligned drift or beam is particularly prominent for the solar wind electrons, and thus ignoring its effect leaves out a vast portion of important physics. Nevertheless, for the sake of limiting the scope, this effect will not be discussed. The exposition is within the context of linear and quasilinear Vlasov kinetic theories. The discussion does not cover either computer simulations or data analyses of observations, in any systematic manner, although references will be made to published works pertaining to these methods. The scientific rationale for the present analysis is that the anisotropic temperatures associated with charged particles are pervasively detected in the solar wind, and it is one of the key contemporary scientific research topics to correctly characterize how such anisotropies are generated, maintained, and regulated in the solar wind. The present article aims to provide an up-to-date theoretical development on this research topic, largely based on the author's own work.

  1. High performance MPEG-audio decoder IC

    NASA Technical Reports Server (NTRS)

    Thorn, M.; Benbassat, G.; Cyr, K.; Li, S.; Gill, M.; Kam, D.; Walker, K.; Look, P.; Eldridge, C.; Ng, P.

    1993-01-01

    The emerging digital audio and video compression technology brings both an opportunity and a new challenge to IC design. The pervasive application of compression technology to consumer electronics will require high volume, low cost IC's and fast time to market of the prototypes and production units. At the same time, the algorithms used in the compression technology result in complex VLSI IC's. The conflicting challenges of algorithm complexity, low cost, and fast time to market have an impact on device architecture and design methodology. The work presented in this paper is about the design of a dedicated, high precision, Motion Picture Expert Group (MPEG) audio decoder.

  2. Computer Conferencing and Electronic Messaging. Conference Proceedings (Guelph, Ontario, Canada, January 22-23, 1985).

    ERIC Educational Resources Information Center

    Guelph Univ. (Ontario).

    This 21-paper collection examines various issues in electronic networking and conferencing with computers, including design issues, conferencing in education, electronic messaging, computer conferencing applications, social issues of computer conferencing, and distributed computer conferencing. In addition to a keynote address, "Computer…

  3. [Obsessive-compulsive symptoms, tics, stereotypic movements or need for absolute consistency? The occurrence of repetitive activities in patients with pervasive developmental disorders--case studies].

    PubMed

    Bryńska, Anita; Lipińska, Elzbieta; Matelska, Monika

    2011-01-01

    Repetitive and stereotyped behaviours in the form of stereotyped interests or specific routine activities are one ofthe diagnostic criteria in pervasive developmental disorders. The occurrence of repetitive behaviours in patients with pervasive developmental disorders is a starting point for questions about the type and classification criteria of such behaviours. The aim of the article is to present case studies of patients with pervasive developmental disorders and co-morbid symptoms in the form of routine activities, tics, obsessive-compulsive symptoms or stereotyped behaviours. The first case study describes a patient with Asperger's syndrome and obsessive compulsive symptoms. The diagnostic problems regarding complex motor tics are discussed in the second case study which describes a patient with Asperger's syndrome and Gilles de la Tourette syndrome. The third and fourth case study describes mono-zygotic twins with so called High Functioning Autism whose repetitive activities point to either obsessive compulsive symptoms, stereotypic movements, need for absolute consistency or echopraxia. The possible comorbidity of pervasive developmental disorders and symptoms in the form of repetitive behaviours, possible interactions as well as diagnostic challenges is discussed in the article.

  4. The 'Biologically-Inspired Computing' Column

    NASA Technical Reports Server (NTRS)

    Hinchey, Mike

    2006-01-01

    The field of Biology changed dramatically in 1953, with the determination by Francis Crick and James Dewey Watson of the double helix structure of DNA. This discovery changed Biology for ever, allowing the sequencing of the human genome, and the emergence of a "new Biology" focused on DNA, genes, proteins, data, and search. Computational Biology and Bioinformatics heavily rely on computing to facilitate research into life and development. Simultaneously, an understanding of the biology of living organisms indicates a parallel with computing systems: molecules in living cells interact, grow, and transform according to the "program" dictated by DNA. Moreover, paradigms of Computing are emerging based on modelling and developing computer-based systems exploiting ideas that are observed in nature. This includes building into computer systems self-management and self-governance mechanisms that are inspired by the human body's autonomic nervous system, modelling evolutionary systems analogous to colonies of ants or other insects, and developing highly-efficient and highly-complex distributed systems from large numbers of (often quite simple) largely homogeneous components to reflect the behaviour of flocks of birds, swarms of bees, herds of animals, or schools of fish. This new field of "Biologically-Inspired Computing", often known in other incarnations by other names, such as: Autonomic Computing, Pervasive Computing, Organic Computing, Biomimetics, and Artificial Life, amongst others, is poised at the intersection of Computer Science, Engineering, Mathematics, and the Life Sciences. Successes have been reported in the fields of drug discovery, data communications, computer animation, control and command, exploration systems for space, undersea, and harsh environments, to name but a few, and augur much promise for future progress.

  5. Pervasive Sensing: Addressing the Heterogeneity Problem

    NASA Astrophysics Data System (ADS)

    O'Grady, Michael J.; Murdoch, Olga; Kroon, Barnard; Lillis, David; Carr, Dominic; Collier, Rem W.; O'Hare, Gregory M. P.

    2013-06-01

    Pervasive sensing is characterized by heterogeneity across a number of dimensions. This raises significant problems for those designing, implementing and deploying sensor networks, irrespective of application domain. Such problems include for example, issues of data provenance and integrity, security, and privacy amongst others. Thus engineering a network that is fit-for-purpose represents a significant challenge. In this paper, the issue of heterogeneity is explored from the perspective of those who seek to harness a pervasive sensing element in their applications. A initial solution is proposed based on the middleware construct.

  6. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  7. Sixth SIAM conference on applied linear algebra: Final program and abstracts. Final technical report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1997-12-31

    Linear algebra plays a central role in mathematics and applications. The analysis and solution of problems from an amazingly wide variety of disciplines depend on the theory and computational techniques of linear algebra. In turn, the diversity of disciplines depending on linear algebra also serves to focus and shape its development. Some problems have special properties (numerical, structural) that can be exploited. Some are simply so large that conventional approaches are impractical. New computer architectures motivate new algorithms, and fresh ways to look at old ones. The pervasive nature of linear algebra in analyzing and solving problems means that peoplemore » from a wide spectrum--universities, industrial and government laboratories, financial institutions, and many others--share an interest in current developments in linear algebra. This conference aims to bring them together for their mutual benefit. Abstracts of papers presented are included.« less

  8. Cyber-Security Issues in Healthcare Information Technology.

    PubMed

    Langer, Steve G

    2017-02-01

    In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.

  9. Permanency analysis on human electroencephalogram signals for pervasive Brain-Computer Interface systems.

    PubMed

    Sadeghi, Koosha; Junghyo Lee; Banerjee, Ayan; Sohankar, Javad; Gupta, Sandeep K S

    2017-07-01

    Brain-Computer Interface (BCI) systems use some permanent features of brain signals to recognize their corresponding cognitive states with high accuracy. However, these features are not perfectly permanent, and BCI system should be continuously trained over time, which is tedious and time consuming. Thus, analyzing the permanency of signal features is essential in determining how often to repeat training. In this paper, we monitor electroencephalogram (EEG) signals, and analyze their behavior through continuous and relatively long period of time. In our experiment, we record EEG signals corresponding to rest state (eyes open and closed) from one subject everyday, for three and a half months. The results show that signal features such as auto-regression coefficients remain permanent through time, while others such as power spectral density specifically in 5-7 Hz frequency band are not permanent. In addition, eyes open EEG data shows more permanency than eyes closed data.

  10. Radiology: "killer app" for next generation networks?

    PubMed

    McNeill, Kevin M

    2004-03-01

    The core principles of digital radiology were well developed by the end of the 1980 s. During the following decade tremendous improvements in computer technology enabled realization of those principles at an affordable cost. In this decade work can focus on highly distributed radiology in the context of the integrated health care enterprise. Over the same period computer networking has evolved from a relatively obscure field used by a small number of researchers across low-speed serial links to a pervasive technology that affects nearly all facets of society. Development directions in network technology will ultimately provide end-to-end data paths with speeds that match or exceed the speeds of data paths within the local network and even within workstations. This article describes key developments in Next Generation Networks, potential obstacles, and scenarios in which digital radiology can become a "killer app" that helps to drive deployment of new network infrastructure.

  11. Dynamic detection of window starting positions and its implementation within an activity recognition framework.

    PubMed

    Ni, Qin; Patterson, Timothy; Cleland, Ian; Nugent, Chris

    2016-08-01

    Activity recognition is an intrinsic component of many pervasive computing and ambient intelligent solutions. This has been facilitated by an explosion of technological developments in the area of wireless sensor network, wearable and mobile computing. Yet, delivering robust activity recognition, which could be deployed at scale in a real world environment, still remains an active research challenge. Much of the existing literature to date has focused on applying machine learning techniques to pre-segmented data collected in controlled laboratory environments. Whilst this approach can provide valuable ground truth information from which to build recognition models, these techniques often do not function well when implemented in near real time applications. This paper presents the application of a multivariate online change detection algorithm to dynamically detect the starting position of windows for the purposes of activity recognition. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. Hybrid expert system for decision supporting in the medical area: complexity and cognitive computing.

    PubMed

    Brasil, L M; de Azevedo, F M; Barreto, J M

    2001-09-01

    This paper proposes a hybrid expert system (HES) to minimise some complexity problems pervasive to the artificial intelligence such as: the knowledge elicitation process, known as the bottleneck of expert systems; the model choice for knowledge representation to code human reasoning; the number of neurons in the hidden layer and the topology used in the connectionist approach; the difficulty to obtain the explanation on how the network arrived to a conclusion. Two algorithms applied to developing of HES are also suggested. One of them is used to train the fuzzy neural network and the other to obtain explanations on how the fuzzy neural network attained a conclusion. To overcome these difficulties the cognitive computing was integrated to the developed system. A case study is presented (e.g. epileptic crisis) with the problem definition and simulations. Results are also discussed.

  13. Discrete Thermodynamics

    DOE PAGES

    Margolin, L. G.; Hunter, A.

    2017-10-18

    Here, we consider the dependence of velocity probability distribution functions on the finite size of a thermodynamic system. We are motivated by applications to computational fluid dynamics, hence discrete thermodynamics. We then begin by describing a coarsening process that represents geometric renormalization. Then, based only on the requirements of conservation, we demonstrate that the pervasive assumption of local thermodynamic equilibrium is not form invariant. We develop a perturbative correction that restores form invariance to second-order in a small parameter associated with macroscopic gradients. Finally, we interpret the corrections in terms of unresolved kinetic energy and discuss the implications of ourmore » results both in theory and as applied to numerical simulation.« less

  14. Discrete Thermodynamics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Margolin, L. G.; Hunter, A.

    Here, we consider the dependence of velocity probability distribution functions on the finite size of a thermodynamic system. We are motivated by applications to computational fluid dynamics, hence discrete thermodynamics. We then begin by describing a coarsening process that represents geometric renormalization. Then, based only on the requirements of conservation, we demonstrate that the pervasive assumption of local thermodynamic equilibrium is not form invariant. We develop a perturbative correction that restores form invariance to second-order in a small parameter associated with macroscopic gradients. Finally, we interpret the corrections in terms of unresolved kinetic energy and discuss the implications of ourmore » results both in theory and as applied to numerical simulation.« less

  15. Dependence in probabilistic modeling Dempster-Shafer theory and probability bounds analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ferson, Scott; Nelsen, Roger B.; Hajagos, Janos

    2015-05-01

    This report summarizes methods to incorporate information (or lack of information) about inter-variable dependence into risk assessments that use Dempster-Shafer theory or probability bounds analysis to address epistemic and aleatory uncertainty. The report reviews techniques for simulating correlated variates for a given correlation measure and dependence model, computation of bounds on distribution functions under a specified dependence model, formulation of parametric and empirical dependence models, and bounding approaches that can be used when information about the intervariable dependence is incomplete. The report also reviews several of the most pervasive and dangerous myths among risk analysts about dependence in probabilistic models.

  16. HERA: A New Platform for Embedding Agents in Heterogeneous Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Alonso, Ricardo S.; de Paz, Juan F.; García, Óscar; Gil, Óscar; González, Angélica

    Ambient Intelligence (AmI) based systems require the development of innovative solutions that integrate distributed intelligent systems with context-aware technologies. In this sense, Multi-Agent Systems (MAS) and Wireless Sensor Networks (WSN) are two key technologies for developing distributed systems based on AmI scenarios. This paper presents the new HERA (Hardware-Embedded Reactive Agents) platform, that allows using dynamic and self-adaptable heterogeneous WSNs on which agents are directly embedded on the wireless nodes This approach facilitates the inclusion of context-aware capabilities in AmI systems to gather data from their surrounding environments, achieving a higher level of ubiquitous and pervasive computing.

  17. Undesirable Effects of Media on Children: Why Limitation is Necessary?

    PubMed

    Karaagac, Aysu Turkmen

    2015-06-01

    Pervasive media environment is a social problem shared by most of the countries around the world. Several studies have been performed to highlight the undesired effects of media on children. Some of these studies have focused on the time spent by children watching television, playing with computers or using mobile media devices while some others have tried to explain the associations between the obesity, postural abnormalities or psychological problems of children, and their media use. This article discusses the recent approaches to curb influence of media on children, and the importance of family media literacy education programs with particular relevance to developing countries.

  18. 77 FR 50726 - Software Requirement Specifications for Digital Computer Software and Complex Electronics Used in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-22

    ... Computer Software and Complex Electronics Used in Safety Systems of Nuclear Power Plants AGENCY: Nuclear...-1209, ``Software Requirement Specifications for Digital Computer Software and Complex Electronics used... Electronics Engineers (ANSI/IEEE) Standard 830-1998, ``IEEE Recommended Practice for Software Requirements...

  19. "Double crap!" abuse and harmed identity in Fifty Shades of Grey.

    PubMed

    Bonomi, Amy E; Altenburger, Lauren E; Walton, Nicole L

    2013-09-01

    While intimate partner violence (IPV) affects 25% of women and impairs health, current societal conditions-including the normalization of abuse in popular culture such as novels, film, and music-create the context to support such violence. Fifty Shades of Grey, a best-selling novel, depicts a "romantic" and "erotic" relationship involving 28-year-old megamillionaire, Christian Grey, and a 22-year-old college student, Anastasia Steele. We argue that the relationship is characterized by IPV, which is harmful to Anastasia. All authors engaged in iterative readings of the text, and wrote narrative summaries to elucidate themes. Validity checks included double review of the first eight chapters of the novel to establish consistency in our analysis approach, iterative discussions in-person and electronically to arbitrate discrepancies, and review of our analysis with other abuse and sexual practice experts. To characterize IPV, we used the U.S. Centers for Disease Control and Prevention's definitions of emotional abuse (intimidation/threats; isolation; stalking; and humiliation) and sexual violence (forced sex acts/contact against a person's will, including using alcohol/drugs or intimidation/pressure). To characterize harm, we used Smith's conceptualizations of perceived threat, managing, altered identity, yearning, entrapment, and disempowerment experienced by abused women. Emotional abuse is present in nearly every interaction, including: stalking (Christian deliberately follows Anastasia and appears in unusual places, uses a phone and computer to track Anastasia's whereabouts, and delivers expensive gifts); intimidation (Christian uses intimidating verbal and nonverbal behaviors, such as routinely commanding Anastasia to eat and threatening to punish her); and isolation (Christian limits Anastasia's social contact). Sexual violence is pervasive-including using alcohol to compromise Anastasia's consent, as well as intimidation (Christian initiates sexual encounters when genuinely angry, dismisses Anastasia's requests for boundaries, and threatens her). Anastasia experiences reactions typical of abused women, including: constant perceived threat ("my stomach churns from his threats"); altered identity (describes herself as a "pale, haunted ghost"); and stressful managing (engages in behaviors to "keep the peace," such as withholding information about her social whereabouts to avoid Christian's anger). Anastasia becomes disempowered and entrapped in the relationship as her behaviors become mechanized in response to Christian's abuse. Our analysis identified patterns in Fifty Shades that reflect pervasive intimate partner violence-one of the biggest problems of our time. Further, our analysis adds to a growing body of literature noting dangerous violence standards being perpetuated in popular culture.

  20. Fragile X Syndrome: Genetic Predisposition to Psychopathology.

    ERIC Educational Resources Information Center

    Bregman, Joel D.; And Others

    1988-01-01

    Psychiatric evaluation of 14 males (ages 3-27 years) with the fragile X syndrome found pervasive hyperactivity, impulsivity, and attentional deficits, and a significant degree of anxiety. However, diagnostic criteria for persistent pervasive developmental disorder and autism were not met. (Author/DB)

  1. Pervasive Developmental Disorders: Distinguishing among Subtypes.

    ERIC Educational Resources Information Center

    Harris, Sandra L.; Glasberg, Beth; Ricca, Donna

    1996-01-01

    Describes pervasive developmental disorders (PPDs), which are severe conditions that begin in early life and influence multiple areas of development. Conditions include autistic disorders, Asperger's disorder, Rett's disorder, childhood disintegrative disorder, and PPDs "not otherwise specified." Intensive behavioral intervention at an early age…

  2. Polytopol computing for multi-core and distributed systems

    NASA Astrophysics Data System (ADS)

    Spaanenburg, Henk; Spaanenburg, Lambert; Ranefors, Johan

    2009-05-01

    Multi-core computing provides new challenges to software engineering. The paper addresses such issues in the general setting of polytopol computing, that takes multi-core problems in such widely differing areas as ambient intelligence sensor networks and cloud computing into account. It argues that the essence lies in a suitable allocation of free moving tasks. Where hardware is ubiquitous and pervasive, the network is virtualized into a connection of software snippets judiciously injected to such hardware that a system function looks as one again. The concept of polytopol computing provides a further formalization in terms of the partitioning of labor between collector and sensor nodes. Collectors provide functions such as a knowledge integrator, awareness collector, situation displayer/reporter, communicator of clues and an inquiry-interface provider. Sensors provide functions such as anomaly detection (only communicating singularities, not continuous observation), they are generally powered or self-powered, amorphous (not on a grid) with generation-and-attrition, field re-programmable, and sensor plug-and-play-able. Together the collector and the sensor are part of the skeleton injector mechanism, added to every node, and give the network the ability to organize itself into some of many topologies. Finally we will discuss a number of applications and indicate how a multi-core architecture supports the security aspects of the skeleton injector.

  3. Context-awareness in ubiquitous computing and the mobile devices

    NASA Astrophysics Data System (ADS)

    Akçit, Nuhcan; Tomur, Emrah; Karslıoǧlu, Mahmut Onur

    2015-06-01

    Mobile device use has vastly increased in the last few years. Many people use many mobile devices in their daily lives. Context-aware computing is the main feature of pervasive and ubiquitous computing. Context awareness is also an important topic that becomes more available with ubiquitous computing. As the sensors increase, the data collected via mobile device sensors and sensor networks do not have much value because of the difficulty in analysis and understanding the data. Context-aware computing helps us store contextual information and use or search it by mobile devices when we want to see or analyze it. Contextual data can be made more meaningful by context-aware processing. There are different types of data and context information that must be considered. By combining spatial and contextual data, we obtain more meaningful data based on the entities. Contextual data is any information that can be used to characterize the situation of the entity. The entity is a person, place, or object considered relevant to the interaction between the user and an application, including the users and the applications. Using contextual data and good integration to mobile devices adds great value to this data, and combining these with our other data sets will allow us to obtain more useful information and analysis.

  4. Integrating Intelligent Systems Domain Knowledge Into the Earth Science Curricula

    NASA Astrophysics Data System (ADS)

    Güereque, M.; Pennington, D. D.; Pierce, S. A.

    2017-12-01

    High-volume heterogeneous datasets are becoming ubiquitous, migrating to center stage over the last ten years and transcending the boundaries of computationally intensive disciplines into the mainstream, becoming a fundamental part of every science discipline. Despite the fact that large datasets are now pervasive across industries and academic disciplines, the array of skills is generally absent from earth science programs. This has left the bulk of the student population without access to curricula that systematically teach appropriate intelligent-systems skills, creating a void for skill sets that should be universal given their need and marketability. While some guidance regarding appropriate computational thinking and pedagogy is appearing, there exist few examples where these have been specifically designed and tested within the earth science domain. Furthermore, best practices from learning science have not yet been widely tested for developing intelligent systems-thinking skills. This research developed and tested evidence based computational skill modules that target this deficit with the intention of informing the earth science community as it continues to incorporate intelligent systems techniques and reasoning into its research and classrooms.

  5. Explicit Content Caching at Mobile Edge Networks with Cross-Layer Sensing

    PubMed Central

    Chen, Lingyu; Su, Youxing; Luo, Wenbin; Hong, Xuemin; Shi, Jianghong

    2018-01-01

    The deployment density and computational power of small base stations (BSs) are expected to increase significantly in the next generation mobile communication networks. These BSs form the mobile edge network, which is a pervasive and distributed infrastructure that can empower a variety of edge/fog computing applications. This paper proposes a novel edge-computing application called explicit caching, which stores selective contents at BSs and exposes such contents to local users for interactive browsing and download. We formulate the explicit caching problem as a joint content recommendation, caching, and delivery problem, which aims to maximize the expected user quality-of-experience (QoE) with varying degrees of cross-layer sensing capability. Optimal and effective heuristic algorithms are presented to solve the problem. The theoretical performance bounds of the explicit caching system are derived in simplified scenarios. The impacts of cache storage space, BS backhaul capacity, cross-layer information, and user mobility on the system performance are simulated and discussed in realistic scenarios. Results suggest that, compared with conventional implicit caching schemes, explicit caching can better exploit the mobile edge network infrastructure for personalized content dissemination. PMID:29565313

  6. Explicit Content Caching at Mobile Edge Networks with Cross-Layer Sensing.

    PubMed

    Chen, Lingyu; Su, Youxing; Luo, Wenbin; Hong, Xuemin; Shi, Jianghong

    2018-03-22

    The deployment density and computational power of small base stations (BSs) are expected to increase significantly in the next generation mobile communication networks. These BSs form the mobile edge network, which is a pervasive and distributed infrastructure that can empower a variety of edge/fog computing applications. This paper proposes a novel edge-computing application called explicit caching, which stores selective contents at BSs and exposes such contents to local users for interactive browsing and download. We formulate the explicit caching problem as a joint content recommendation, caching, and delivery problem, which aims to maximize the expected user quality-of-experience (QoE) with varying degrees of cross-layer sensing capability. Optimal and effective heuristic algorithms are presented to solve the problem. The theoretical performance bounds of the explicit caching system are derived in simplified scenarios. The impacts of cache storage space, BS backhaul capacity, cross-layer information, and user mobility on the system performance are simulated and discussed in realistic scenarios. Results suggest that, compared with conventional implicit caching schemes, explicit caching can better exploit the mobile edge network infrastructure for personalized content dissemination.

  7. Autism Spectrum Disorders (Pervasive Developmental Disorders)

    ERIC Educational Resources Information Center

    Strock, Margaret

    2007-01-01

    This booklet focuses on classic autism, pervasive developmental disorder not otherwise specified (PDD-NOS), and Asperger syndrome, with brief descriptions of Rett syndrome and childhood disintegrative disorder. The booklet describes possible indicators of autism spectrum disorders (ASD), their diagnosis, available aids, treatment options, adults…

  8. Catatonic features in adolescents with schizophrenia with and without a comorbid pervasive developmental disorder

    PubMed Central

    2014-01-01

    Background Catatonia has been associated with both schizophrenia and pervasive developmental disorders. The aim of this study was to evaluate catatonic features among adolescents suffering from schizophrenia. Further, we compared these features between adolescents with a comorbid pervasive developmental disorder and those without one. Finally, we wanted to compare the profile of catatonia-like features of our schizophrenia patients to that described earlier among persons with autism spectrum disorders. Methods The study comprised a consecutive sample of 18 adolescents with schizophrenia (mean age 15.6 years, SD 1.4) and their families. Diagnosis of schizophrenia was assessed with the Schedule for Affective Disorders and Schizophrenia for School-Aged Children – Present and Life-Time (K-SADS-PL) for the DSM-IV. The Diagnostic Interview for Social and Communication Disorders version 11 was used to assess catatonic features. Results All adolescents with schizophrenia had showed some lifetime catatonic features. Approximately 78% of them had already expressed these features before the age of 10. The number of catatonic features before the age of 10 was significantly higher among the adolescents with a comorbid pervasive developmental disorder compared to those without one. The numbers of catatonic features after the age of 10 did not significantly differ between the two groups. Over three-quarters of schizophrenia patients shared four lifetime catatonic features: “lacks facial expression”, “odd intonation”, “poor eye contact” and “lack of cooperation”. Conclusions Adolescent schizophrenia patients with a comorbid pervasive developmental disorder show many catatonic features in childhood whereas those without one seem to develop these features first in adolescence. Catatonic features exhibited by adolescents with schizophrenia resemble those described among persons with pervasive developmental disorders without schizophrenia. PMID:24914405

  9. Catatonic features in adolescents with schizophrenia with and without a comorbid pervasive developmental disorder.

    PubMed

    Waris, Petra; Lindberg, Nina; Kettunen, Kirsi; Lipsanen, Jari; Tani, Pekka

    2014-01-01

    Catatonia has been associated with both schizophrenia and pervasive developmental disorders. The aim of this study was to evaluate catatonic features among adolescents suffering from schizophrenia. Further, we compared these features between adolescents with a comorbid pervasive developmental disorder and those without one. Finally, we wanted to compare the profile of catatonia-like features of our schizophrenia patients to that described earlier among persons with autism spectrum disorders. The study comprised a consecutive sample of 18 adolescents with schizophrenia (mean age 15.6 years, SD 1.4) and their families. Diagnosis of schizophrenia was assessed with the Schedule for Affective Disorders and Schizophrenia for School-Aged Children - Present and Life-Time (K-SADS-PL) for the DSM-IV. The Diagnostic Interview for Social and Communication Disorders version 11 was used to assess catatonic features. All adolescents with schizophrenia had showed some lifetime catatonic features. Approximately 78% of them had already expressed these features before the age of 10. The number of catatonic features before the age of 10 was significantly higher among the adolescents with a comorbid pervasive developmental disorder compared to those without one. The numbers of catatonic features after the age of 10 did not significantly differ between the two groups. Over three-quarters of schizophrenia patients shared four lifetime catatonic features: "lacks facial expression", "odd intonation", "poor eye contact" and "lack of cooperation". Adolescent schizophrenia patients with a comorbid pervasive developmental disorder show many catatonic features in childhood whereas those without one seem to develop these features first in adolescence. Catatonic features exhibited by adolescents with schizophrenia resemble those described among persons with pervasive developmental disorders without schizophrenia.

  10. Relation of large-scale coronal X-ray structure and cosmic rays. II - Coronal control of interplanetary injection of 300 keV protons

    NASA Technical Reports Server (NTRS)

    Roelof, E. C.; Gold, R. E.; Krimigis, S. M.; Krieger, A. S.; Nolte, J. T.; Mcintosh, P. S.; Lazarus, A. J.; Sullivan, J. D.

    1975-01-01

    We report the striking coronal control of low-energy solar particles from the solar flare of September 7, 1973. The flare was at S18, W46 (Carrington longitude 188 deg) in McMath Plage Region 12307. We find strong intensity gradients in heliolongitude (about 10% per deg) that are nearly identical in protons, helium, and medium nuclei at energies about 0.5 MeV/nuc, as well as relativistic electrons and 3 MeV protons. This pervasive gradient occurs at longitudes over bright X-ray emission structures east of the flare site which interconnect large-scale chromospheric polarity regions identifiable in H-alpha filtergrams.

  11. Youth Screen Media Habits and Sleep: Sleep-Friendly Screen Behavior Recommendations for Clinicians, Educators, and Parents.

    PubMed

    Hale, Lauren; Kirschen, Gregory W; LeBourgeois, Monique K; Gradisar, Michael; Garrison, Michelle M; Montgomery-Downs, Hawley; Kirschen, Howard; McHale, Susan M; Chang, Anne-Marie; Buxton, Orfeu M

    2018-04-01

    With the widespread use of portable electronic devices and the normalization of screen media devices in the bedroom, insufficient sleep has become commonplace. In a recent literature review, 90% of included studies found an association between screen media use and delayed bedtime and/or decreased total sleep time. This pervasive phenomenon of pediatric sleep loss has widespread implications. There is a need for basic, translational, and clinical research examining the effects of screen media on sleep loss and health consequences in children and adolescents to educate and motivate clinicians, teachers, parents and youth themselves to foster healthy sleep habits. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Brief Report: Representational Momentum for Dynamic Facial Expressions in Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Uono, Shota; Sato, Wataru; Toichi, Motomi

    2010-01-01

    Individuals with pervasive developmental disorder (PDD) have difficulty with social communication via emotional facial expressions, but behavioral studies involving static images have reported inconsistent findings about emotion recognition. We investigated whether dynamic presentation of facial expression would enhance subjective perception of…

  13. [Review of assessment methods used to evaluate feeding for children with pervasive developmental disorder].

    PubMed

    Nadon, G; Ehrmann Feldman, D; Gisel, E

    2008-08-01

    Current evaluations used by occupational therapists to assess and treat feeding problems derive mainly from the domain of dysphagia. The purpose of this article is to familiarize the reader with tools used, in research, for children with pervasive developmental disorders (PDD) and to determine if any of these meet the needs of occupational therapists. The following data bases were searched: Medline, CINAHL, HAPI and PsyINFO, using the terms pervasive developmental disorder, autism, Asperger syndrome, pervasive developmental disorder not otherwise specified, eating behavior, eating disorder, food preference, food selectivity, feeding disorders, picky eater and child. All articles published between 1980 and 2006 (n=27) were reviewed. A total of 20 studies met our selection criteria. Assessment methods are compared using the Disability Creation Model (DCP). The DCP is the Quebec alternative to the International Classification of Functioning, Disability and Health (ICF). None of the evaluation tools reviewed met all factors that may influence eating in children with PDD. Implications for research and practice in occupational therapy are discussed.

  14. 76 FR 49753 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... Defense. DHA 14 System name: Computer/Electronics Accommodations Program for People with Disabilities... with ``Computer/Electronic Accommodations Program.'' System location: Delete entry and replace with ``Computer/Electronic Accommodations Program, Skyline 5, Suite 302, 5111 Leesburg Pike, Falls Church, VA...

  15. Trends in Autism Spectrum Disorder Diagnoses: 1994-2007

    ERIC Educational Resources Information Center

    Rosenberg, Rebecca E.; Daniels, Amy M.; Law, J. Kiely; Law, Paul A.; Kaufmann, Walter E.

    2009-01-01

    We analyzed predictors of parent-reported initial diagnosis (autistic disorder [AD], pervasive developmental disorder-not otherwise specified [PDD-NOS], pervasive developmental disorder ["PDD"] and autism spectrum disorder ["ASD"], and Asperger syndrome [AS]), among 6,176 individuals with autism spectrum disorders diagnosed from 1994 through 2007.…

  16. Pervasive Agility and Agile Fires in Support of Decisive Action

    DTIC Science & Technology

    2012-03-29

    Pervasive Agility and Agile Fires in Support of Decisive Action FORMAT: Civilian Research Project DATE: 29 March 2012 WORD COUNT : 12,599 PAGES: 54...will face, this pollenization may require creative measures, perhaps virtual or constructive scenarios. The National Training Center at Fort Irwin

  17. An enhanced mobile-healthcare emergency system based on extended chaotic maps.

    PubMed

    Lee, Cheng-Chi; Hsu, Che-Wei; Lai, Yan-Ming; Vasilakos, Athanasios

    2013-10-01

    Mobile Healthcare (m-Healthcare) systems, namely smartphone applications of pervasive computing that utilize wireless body sensor networks (BSNs), have recently been proposed to provide smartphone users with health monitoring services and received great attentions. An m-Healthcare system with flaws, however, may leak out the smartphone user's personal information and cause security, privacy preservation, or user anonymity problems. In 2012, Lu et al. proposed a secure and privacy-preserving opportunistic computing (SPOC) framework for mobile-Healthcare emergency. The brilliant SPOC framework can opportunistically gather resources on the smartphone such as computing power and energy to process the computing-intensive personal health information (PHI) in case of an m-Healthcare emergency with minimal privacy disclosure. To balance between the hazard of PHI privacy disclosure and the necessity of PHI processing and transmission in m-Healthcare emergency, in their SPOC framework, Lu et al. introduced an efficient user-centric privacy access control system which they built on the basis of an attribute-based access control mechanism and a new privacy-preserving scalar product computation (PPSPC) technique. However, we found out that Lu et al.'s protocol still has some secure flaws such as user anonymity and mutual authentication. To fix those problems and further enhance the computation efficiency of Lu et al.'s protocol, in this article, the authors will present an improved mobile-Healthcare emergency system based on extended chaotic maps. The new system is capable of not only providing flawless user anonymity and mutual authentication but also reducing the computation cost.

  18. 77 FR 32996 - Certain Handheld Electronic Computing Devices, Related Software, and Components Thereof...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-04

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-769] Certain Handheld Electronic Computing Devices, Related Software, and Components Thereof; Termination of the Investigation Based on... electronic computing devices, related software, and components thereof by reason of infringement of certain...

  19. Addressing the vulnerabilities of pass-thoughts

    NASA Astrophysics Data System (ADS)

    Fernandez, Gabriel C.; Danko, Amanda S.

    2016-05-01

    As biometrics become increasingly pervasive, consumer electronics are reaping the benefits of improved authentication methods. Leveraging the physical characteristics of a user reduces the burden of setting and remembering complex passwords, while enabling stronger security. Multi-factor systems lend further credence to this model, increasing security via multiple passive data points. In recent years, brainwaves have been shown to be another feasible source for biometric authentication. Physically unique to an individual in certain circumstances, the signals can also be changed by the user at will, making them more robust than static physical characteristics. No paradigm is impervious however, and even well-established medical technologies have deficiencies. In this work, a system for biometric authentication via brainwaves is constructed with electroencephalography (EEG). The efficacy of EEG biometrics via existing consumer electronics is evaluated, and vulnerabilities of such a system are enumerated. Impersonation attacks are performed to expose the extent to which the system is vulnerable. Finally, a multimodal system combining EEG with additional factors is recommended and outlined.

  20. Wave energy budget analysis in the Earth’s radiation belts uncovers a missing energy

    PubMed Central

    Artemyev, A.V.; Agapitov, O.V.; Mourenas, D.; Krasnoselskikh, V.V.; Mozer, F.S.

    2015-01-01

    Whistler-mode emissions are important electromagnetic waves pervasive in the Earth’s magnetosphere, where they continuously remove or energize electrons trapped by the geomagnetic field, controlling radiation hazards to satellites and astronauts and the upper-atmosphere ionization or chemical composition. Here, we report an analysis of 10-year Cluster data, statistically evaluating the full wave energy budget in the Earth’s magnetosphere, revealing that a significant fraction of the energy corresponds to hitherto generally neglected very oblique waves. Such waves, with 10 times smaller magnetic power than parallel waves, typically have similar total energy. Moreover, they carry up to 80% of the wave energy involved in wave–particle resonant interactions. It implies that electron heating and precipitation into the atmosphere may have been significantly under/over-valued in past studies considering only conventional quasi-parallel waves. Very oblique waves may turn out to be a crucial agent of energy redistribution in the Earth’s radiation belts, controlled by solar activity. PMID:25975615

  1. Wave energy budget analysis in the Earth's radiation belts uncovers a missing energy.

    PubMed

    Artemyev, A V; Agapitov, O V; Mourenas, D; Krasnoselskikh, V V; Mozer, F S

    2015-05-15

    Whistler-mode emissions are important electromagnetic waves pervasive in the Earth's magnetosphere, where they continuously remove or energize electrons trapped by the geomagnetic field, controlling radiation hazards to satellites and astronauts and the upper-atmosphere ionization or chemical composition. Here, we report an analysis of 10-year Cluster data, statistically evaluating the full wave energy budget in the Earth's magnetosphere, revealing that a significant fraction of the energy corresponds to hitherto generally neglected very oblique waves. Such waves, with 10 times smaller magnetic power than parallel waves, typically have similar total energy. Moreover, they carry up to 80% of the wave energy involved in wave-particle resonant interactions. It implies that electron heating and precipitation into the atmosphere may have been significantly under/over-valued in past studies considering only conventional quasi-parallel waves. Very oblique waves may turn out to be a crucial agent of energy redistribution in the Earth's radiation belts, controlled by solar activity.

  2. Mean consumption, poverty and inequality in rural India in the 60th round of the National Sample Survey.

    PubMed

    Jha, Raghbendra; Gaiha, Raghav; Sharma, Anurag

    2010-01-01

    This article reports on mean consumption, poverty (all three FGT measures) and inequality during 2004 for rural India using National Sample Survey (NSS) data for the 60th Round. Mean consumption at the national level is much higher than the poverty line. However, the Gini coefficient is higher than in recent earlier rounds. The headcount ratio is 22.9 per cent. Mean consumption, all three measures of poverty and the Gini coefficient are computed at the level of 20 states and 63 agro-climatic zones in these 20 states. It is surmised that despite impressive growth rates deprivation is pervasive, pockets of severe poverty persist, and inequality is rampant.

  3. The (un)coupling between action execution and observation. Comment on "Grasping synergies: A motor-control approach to the mirror neuron mechanism" by D'Ausilio, Bartoli and Maffongelli

    NASA Astrophysics Data System (ADS)

    Cavallo, Andrea; Ansuini, Caterina; Becchio, Cristina

    2015-03-01

    When we observe actions performed by others, our motor system resonates along with that of the observed agent [1]. The exact features of this resonant motor response, however, are unclear. Do we mirror the goal of others' actions or rather the low-kinematic features of their movements? D'Ausilio et al. suggest that this is an ill-defined problem: the mirror system plausibly replicates the same computational mechanisms implicated by motor control. Accordingly, motor synergies may not only constitute a pervasive element of motor control, but also form the fundamental unit of action observation.

  4. Contact centers, pervasive computing and telemedicine: a quality health care triangle.

    PubMed

    Maglaveras, Nicos

    2004-01-01

    The Citizen Health System (CHS) is a European Commission (CEC) funded project in the field of IST for Health. Its main goal is to develop a generic contact center which in its pilot stage can be used in the monitoring, treatment and management of chronically ill patients at home in Greece, Spain, and Germany. Such contact centers, using any type of communication technology, and providing timely and preventive prompting to the patients are envisaged in the future to evolve into well-being contact centers providing services to all citizens. In this paper, we present the structure of such a generic contact center and present its major achievements, and their impact to the quality of health delivery.

  5. Anharmonic effects in simple physical models: introducing undergraduates to nonlinearity

    NASA Astrophysics Data System (ADS)

    Christian, J. M.

    2017-09-01

    Given the pervasive character of nonlinearity throughout the physical universe, a case is made for introducing undergraduate students to its consequences and signatures earlier rather than later. The dynamics of two well-known systems—a spring and a pendulum—are reviewed when the standard textbook linearising assumptions are relaxed. Some qualitative effects of nonlinearity can be anticipated from symmetry (e.g., inspection of potential energy functions), and further physical insight gained by applying a simple successive-approximation method that might be taught in parallel with courses on classical mechanics, ordinary differential equations, and computational physics. We conclude with a survey of how these ideas have been deployed on programmes at a UK university.

  6. Conceptual Knowledge Acquisition in Biomedicine: A Methodological Review

    PubMed Central

    Payne, Philip R.O.; Mendonça, Eneida A.; Johnson, Stephen B.; Starren, Justin B.

    2007-01-01

    The use of conceptual knowledge collections or structures within the biomedical domain is pervasive, spanning a variety of applications including controlled terminologies, semantic networks, ontologies, and database schemas. A number of theoretical constructs and practical methods or techniques support the development and evaluation of conceptual knowledge collections. This review will provide an overview of the current state of knowledge concerning conceptual knowledge acquisition, drawing from multiple contributing academic disciplines such as biomedicine, computer science, cognitive science, education, linguistics, semiotics, and psychology. In addition, multiple taxonomic approaches to the description and selection of conceptual knowledge acquisition and evaluation techniques will be proposed in order to partially address the apparent fragmentation of the current literature concerning this domain. PMID:17482521

  7. Achieving TASAR Operational Readiness

    NASA Technical Reports Server (NTRS)

    Wing, David J.

    2015-01-01

    NASA has been developing and testing the Traffic Aware Strategic Aircrew Requests (TASAR) concept for aircraft operations featuring a NASA-developed cockpit automation tool, the Traffic Aware Planner (TAP), which computes traffic/hazard-compatible route changes to improve flight efficiency. The TAP technology is anticipated to save fuel and flight time and thereby provide immediate and pervasive benefits to the aircraft operator, as well as improving flight schedule compliance, passenger comfort, and pilot and controller workload. Previous work has indicated the potential for significant benefits for TASAR-equipped aircraft, and a flight trial of the TAP software application in the National Airspace System has demonstrated its technical viability. This paper reviews previous and ongoing activities to prepare TASAR for operational use.

  8. Toward genome-enabled mycology.

    PubMed

    Hibbett, David S; Stajich, Jason E; Spatafora, Joseph W

    2013-01-01

    Genome-enabled mycology is a rapidly expanding field that is characterized by the pervasive use of genome-scale data and associated computational tools in all aspects of fungal biology. Genome-enabled mycology is integrative and often requires teams of researchers with diverse skills in organismal mycology, bioinformatics and molecular biology. This issue of Mycologia presents the first complete fungal genomes in the history of the journal, reflecting the ongoing transformation of mycology into a genome-enabled science. Here, we consider the prospects for genome-enabled mycology and the technical and social challenges that will need to be overcome to grow the database of complete fungal genomes and enable all fungal biologists to make use of the new data.

  9. Predictors and Moderators of Psychological Distress in Mothers of Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Tobing, Lauren E.; Glenwick, David S.

    2006-01-01

    This study explored potential predictors of psychological distress and moderators of the relation between parenting stress and psychological distress in mothers of children with pervasive developmental disorders (PDDs). Ninety-seven mothers of children diagnosed with autism spectrum disorders completed measures assessing children's functional…

  10. Pervasive Developmental Disorders. NICHCY Briefing Paper FS20.

    ERIC Educational Resources Information Center

    Tsai, Luke Y.

    This briefing paper is intended to provide basic information about the diagnosis, educational programming, and special needs of children and youth with Pervasive Developmental Disorders (PDD), a group of neurological disorders usually evident by age 3 and characterized by impairments in social interaction, imaginative activity, and verbal and…

  11. Structure of the Autism Symptom Phenotype: A Proposed Multidimensional Model

    ERIC Educational Resources Information Center

    Georgiades, Stelios; Szatmari, Peter; Zwaigenbaum, Lonnie; Duku, Eric; Bryson, Susan; Roberts, Wendy; Goldberg, Jeremy; Mahoney, William

    2007-01-01

    Background: The main objective of this study was to develop a comprehensive, empirical model that would allow the reorganization of the structure of the pervasive developmental disorder symptom phenotype through factor analysis into more homogeneous dimensions. Method: The sample consisted of 209 children with pervasive developmental disorder…

  12. Understanding Pervasive Language Impairment in Young Children: Exploring Patterns in Narrative Language and Functional Communication

    ERIC Educational Resources Information Center

    Waters, Anna Jeddeloh

    2013-01-01

    Research has identified language impairment as a pervasive disability (Bishop & Edmundson, 1987; Greenhalgh & Strong, 2001). Classroom communication behaviors have a role in the maintenance of special education eligibility and functional communication difficulties for young children with language impairment. This paper reviews the…

  13. A Divided Attention Experiment with Pervasively Hyperactive Children.

    ERIC Educational Resources Information Center

    van der Meere, Jaap; Sergeant, Joseph

    1987-01-01

    Task performance of 12 pervasive hyperactives and controls (ages 8-13) was studied in a divided attention reaction time experiment. Hyperactives were slower than controls, had more variable reaction times, and made more frequent errors. Task inefficiency in hyperactives could not be explained by a divided attention deficiency or impulsive…

  14. Prevalence of Gastrointestinal Disorders in Adult Clients with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Galli-Carminati, G.; Chauvet, I.; Deriaz, N.

    2006-01-01

    Background: In clients with pervasive developmental disorders (PDD), some authors have noticed the presence of gastrointestinal disorders and behavioural disorders. An augmented prevalence of different histological anomalies has also been reported. The aim of our study is to highlight the prevalence of gastrointestinal disorders in this adult with…

  15. Symbolization Levels in Communicative Behaviors of Children Showing Pervasive Developmental Disorders.

    ERIC Educational Resources Information Center

    Atlas, Jeffrey A.; Lapidus, Leah Blumberg

    1988-01-01

    A total of 48 children (aged 4-14) with severe pervasive developmental disturbance, exhibiting mutism, echolalia, or nonecholalic speech, were observed in their communicative behaviors across modalities. Levels of symbolization in gesture, play, and drawing were significantly intercorrelated and were most strongly correlated with the criterion…

  16. Autism Spectrum Disorder and Young Children. AECA Research in Practice Series.

    ERIC Educational Resources Information Center

    Roe, Diana

    This booklet provides an overview of the characteristics and needs of young children with autism spectrum disorders or pervasive developmental disorders. It addresses: (1) different disabilities under the classification of autism spectrum disorders or pervasive developmental disorders; (2) characteristics of autism; (3) characteristics of children…

  17. Brief Report: Pervasive Developmental Disorder Can Evolve into ADHD--Case Illustrations

    ERIC Educational Resources Information Center

    Fein, Deborah; Dixon, Pamela; Paul, Jennifer; Levin, Harriet

    2005-01-01

    Despite prominent attentional symptoms in Pervasive Developmental Disorders (PDD) the relationship between PDD and Attention Deficit Hyperactivity Disorder (ADHD) has received little direct examination. In addition, outcome studies of children with PDD often focus on language, educational placement, or adaptive skills, but seldom on loss of the…

  18. ERPs and Eye Movements Reflect Atypical Visual Perception in Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Kemner, Chantal; van Engeland, Herman

    2006-01-01

    Many studies of eye tracking or event-related brain potentials (ERPs) in subjects with Pervasive Developmental Disorder (PDD) have yielded inconsistent results on attentional processing. However, recent studies have indicated that there are specific abnormalities in early processing that are probably related to perception. ERP amplitudes in…

  19. Fragmented Visuospatial Processing in Children with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Schlooz, Wim A. J. M.; Hulstijn, Wouter; van den Broek, Pieter J. A.; van der Pijll, Angela C. A. M.; Gabreels, Fons; van der Gaag, Rutger J.; Rotteveel, Jan J.

    2006-01-01

    Children diagnosed with Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS) and Asperger Syndrome (AS) may be characterised by a similar perceptual focus on details as children with autistic disorder (AD). This was tested by analysing their performance in a visuoperceptual task [the Children's Embedded Figure Test (CEFT)] and a…

  20. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., unemployment and general distress. 598.110 Section 598.110 Housing and Urban Development Regulations Relating... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment...) Unemployment. Unemployment is demonstrated by: (1) The most recent data available indicating that the annual...

  1. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., unemployment and general distress. 598.110 Section 598.110 Housing and Urban Development Regulations Relating... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment...) Unemployment. Unemployment is demonstrated by: (1) The most recent data available indicating that the annual...

  2. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., unemployment and general distress. 598.110 Section 598.110 Housing and Urban Development Regulations Relating... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment...) Unemployment. Unemployment is demonstrated by: (1) The most recent data available indicating that the annual...

  3. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., unemployment and general distress. 598.110 Section 598.110 Housing and Urban Development Regulations Relating... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment...) Unemployment. Unemployment is demonstrated by: (1) The most recent data available indicating that the annual...

  4. Audiovisual Speech Integration in Pervasive Developmental Disorder: Evidence from Event-Related Potentials

    ERIC Educational Resources Information Center

    Magnee, Maurice J. C. M.; de Gelder, Beatrice; van Engeland, Herman; Kemner, Chantal

    2008-01-01

    Background: Integration of information from multiple sensory sources is an important prerequisite for successful social behavior, especially during face-to-face conversation. It has been suggested that communicative impairments among individuals with pervasive developmental disorders (PDD) might be caused by an inability to integrate synchronously…

  5. Gastrointestinal Symptoms in a Sample of Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Nikolov, Roumen N.; Bearss, Karen E.; Lettinga, Jelle; Erickson, Craig; Rodowski, Maria; Aman, Michael G.; McCracken, James T.; McDougle, Christopher J.; Tierney, Elaine; Vitiello, Benedetto; Arnold, L. Eugene; Shah, Bhavik; Posey, David J.; Ritz, Louise; Scahill, Lawrence

    2009-01-01

    Objective: To evaluate gastrointestinal (GI) problems in a large, well-characterized sample of children with pervasive developmental disorders (PDDs). Methods: One hundred seventy two children entering one of two trials conducted by the Research Units on Pediatric Psychopharmacology (RUPP) Autism Network were assessed comprehensively prior to…

  6. Impact of the DSM-V Attention Deficit Hyperactivity Disorder Criteria for Diagnosing Children With High IQ.

    PubMed

    Thongseiratch, Therdpong; Worachotekamjorn, Juthamas

    2016-10-01

    This study compared the number of attention deficit hyperactivity disorder (ADHD) cases defined by Diagnostic and Statistical Manual (DSM)-IV versus DSM-V criterion in children who have learning or behavioral problems with high IQ. The medical records of children ≤15 years of age who presented with learning or behavioral problems and underwent a Wechsler Intelligence Scale for Children (WISC)-III IQ test at the Pediatric Outpatient Clinic unit between 2010 and 2015 were reviewed. Information on DSM-IV and DSM-V criteria for ADHD were derived from computer-based medical records. Twenty-eight children who had learning or behavioral problems were identified to have a full-scale IQ ≥120. Sixteen of these high-IQ children met the DSM-IV criteria diagnosis for ADHD. Applying the extension of the age-of-onset criterion from 7 to 12 years in DSM-V led to an increase of three cases, all of which were the inattentive type ADHD. Including the pervasive developmental disorder criterion led to an increase of one case. The total number of ADHD cases also increased from 16 to 20 in this group. The data supported the hypothesis that applying the extension of the age-of-onset ADHD criterion and enabling the diagnosis of children with pervasive developmental disorders will increase the number of ADHD diagnoses among children with high IQ. © The Author(s) 2016.

  7. Electronic Publishing.

    ERIC Educational Resources Information Center

    Lancaster, F. W.

    1989-01-01

    Describes various stages involved in the applications of electronic media to the publishing industry. Highlights include computer typesetting, or photocomposition; machine-readable databases; the distribution of publications in electronic form; computer conferencing and electronic mail; collaborative authorship; hypertext; hypermedia publications;…

  8. Pervasive Muslim-Hindu fertility differences in India.

    PubMed

    Dharmalingam, A; Morgan, S Philip

    2004-08-01

    Using the 1993 Indian Family and Health Survey, we examined Muslim-Hindu differences in (1) the parity-specific intent to have another child and (2) given a stated intent for no more children, reports of the current use of contraceptives. We found that Muslims are much more likely than Hindus to intend to have additional children and, among those who do not want more children, Muslims are much less likely than Hindus to use contraceptives. These findings are robust to model specification and pervasive across the states of India. This national study provides the context within which local studies should be enmeshed and begs for general (as opposed to place-specific) explanations for these pervasive differences.

  9. 77 FR 27078 - Certain Electronic Devices, Including Mobile Phones and Tablet Computers, and Components Thereof...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-08

    ... Phones and Tablet Computers, and Components Thereof; Notice of Receipt of Complaint; Solicitation of... entitled Certain Electronic Devices, Including Mobile Phones and Tablet Computers, and Components Thereof... the United States after importation of certain electronic devices, including mobile phones and tablet...

  10. 77 FR 66729 - National Oil and Hazardous Substances Pollution Contingency Plan; Revision To Increase Public...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-07

    ... technology, to include computer telecommunications or other electronic means, that the lead agency is... assess the capacity and resources of the public to utilize and maintain an electronic- or computer... the technology, to include computer telecommunications or other electronic means, that the lead agency...

  11. Information and Communicative Technology--Computers as Research Tools

    ERIC Educational Resources Information Center

    Sarsani, Mahender Reddy

    2007-01-01

    The emergence of "the electronic age,/electronic cottages/the electronic world" has affected the whole world; particularly the emergence of computers has penetrated everyone's life to a remarkable degree. They are being used in various fields including education. Recent advances, especially in the area of computer technology have…

  12. Pervasive Vulnerabilities: Sexual Harassment in School. Adolescent Cultures, School, and Society. Volume 54

    ERIC Educational Resources Information Center

    Rahimi, Regina; Liston, Delores D.

    2012-01-01

    "Pervasive Vulnerabilities" explores the beliefs, attitudes, and behaviors of adolescent girls and boys and female teachers in order to expose the continuing persistence of sexual harassment in the United States. The book addresses the sexual double standard that continues to hold girls and women accountable for male sexual aggression, and…

  13. Mental Development and Autistic Behavior in Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Suzuki, Mayo

    2011-01-01

    The aim of this study was to clarify the features of mental development and autistic behavior in children with pervasive developmental disorders (PDD) from the viewpoint of remedial therapy. The Tokyo Child Development Schedule (TCDS) and the Tokyo Autistic Behavior Scale (TABS), designed to be completed by children's caregivers, were used. A…

  14. Housing Honors. National Collegiate Honors Council Monograph Series

    ERIC Educational Resources Information Center

    Frost, Linda, Ed.; Kay, Lisa W., Ed.; Poe, Rachael, Ed.

    2015-01-01

    Honors administrators spend much of their time explaining and describing what honors is and does. When they talk about what honors looks like nationally, they should have answers to the following important questions: How pervasive is the model of separate honors facilities?; How pervasive are the legendary closets that honors programs have so…

  15. Quality of Life of Adults with Pervasive Developmental Disorders and Intellectual Disabilities

    ERIC Educational Resources Information Center

    Gerber, F.; Baud, M. A.; Giroud, M.; Carminati, G. Galli

    2008-01-01

    The purpose of this study was to observe quality of life (QoL) and global evolution of persons with Pervasive Developmental Disorders (PDD) in three different groups. Individualized programs for PDD were compared to traditional programs for intellectual disabilities. Behavioural disorders were repeatedly evaluated using the Aberrant Behaviour…

  16. Automatic Processing of Emotional Faces in High-Functioning Pervasive Developmental Disorders: An Affective Priming Study

    ERIC Educational Resources Information Center

    Kamio, Yoko; Wolf, Julie; Fein, Deborah

    2006-01-01

    This study examined automatic processing of emotional faces in individuals with high-functioning Pervasive Developmental Disorders (HFPDD) using an affective priming paradigm. Sixteen participants (HFPDD and matched controls) were presented with happy faces, fearful faces or objects in both subliminal and supraliminal exposure conditions, followed…

  17. Pervasive Developmental Disorder: Client-Centered Approach. A Guide for Parents and Teachers.

    ERIC Educational Resources Information Center

    Stewart, Bonnie C.

    This guide to pervasive developmental disorder (PDD) or autistic spectrum disorder (ASD) first provides a review of the literature on defining characteristics of PDD/ASD, causes of PDD, and diagnosis of PDD. Review of intervention and treatment comprises the major portion of the paper. After briefly considering parent education, this section…

  18. Processing Capacity in Children and Adolescents with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Hoeksma, Marco R.; Kemner, Chantal; Verbaten, Marinus N.; van Engeland, Herman

    2004-01-01

    This study sought to investigate whether the abnormally small P3 amplitudes observed in pervasive developmental disorder (PDD) are related to differences in processing capacity. PDD children and adolescents and their control groups participated in the study. Visual probe stimuli were presented during an auditory task with two levels of difficulty.…

  19. Promoting Social Skill Development in Children with Pervasive Developmental Disorders: A Feasibility and Efficacy Study

    ERIC Educational Resources Information Center

    Koenig, Kathleen; White, Susan Williams; Pachler, Maryellen; Lau, Monika; Lewis, Moira; Klin, Ami; Scahill, Lawrence

    2010-01-01

    A randomized controlled design was employed to evaluate a social skills intervention for children with pervasive developmental disorders. Aims included evaluating the acceptability of the program and gathering preliminary evidence on efficacy. Forty-four children, ages 8-11 years, were randomly assigned to treatment or wait list. Treatment…

  20. A SCORM Compliant Courseware Authoring Tool for Supporting Pervasive Learning

    ERIC Educational Resources Information Center

    Wang, Te-Hua; Chang, Flora Chia-I

    2007-01-01

    The sharable content object reference model (SCORM) includes a representation of distance learning contents and a behavior definition of how users should interact with the contents. Generally, SCORMcompliant systems were based on multimedia and Web technologies on PCs. We further build a pervasive learning environment, which allows users to read…

  1. Pervasive Developmental Disorders: PDD-NOS, Asperger's Disorder and Autism. Parent Information Booklet.

    ERIC Educational Resources Information Center

    Levine, Karen

    This information booklet is designed for parents who have a child who has been diagnosed with Pervasive Developmental Disorder (PDD) or Asperger's Disorder. It provides information on: (1) the definition of PDD; (2) the five subtypes of PDD, including PDD "not otherwise specified," Asperger's disorder, autistic disorder, childhood…

  2. Brief Report: Prevalence of Pervasive Developmental Disorder in Brazil--A Pilot Study

    ERIC Educational Resources Information Center

    Paula, Cristiane S.; Ribeiro, Sabrina H.; Fombonne, Eric; Mercadante, Marcos T.

    2011-01-01

    This pilot study presents preliminary results concerning the prevalence of Pervasive Developmental Disorder (PDD) in South America. It was a three-phase study conducted in a typical town in Southeast Brazil. Case definition was based in a combination of standardized instruments and clinical evaluations by experts. The prevalence of PDD was…

  3. Developmental Specificity in Targeting and Teaching Play Activities to Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Lifter, Karin; Ellis, James; Cannon, Barbara; Anderson, Stephen R.

    2005-01-01

    Developmentally specific play programs were designed for three children with pervasive developmental disorders being served in a home-based program. Using the Developmental Play Assessment, six activities for each of three adjacent developmentally sequenced play categories were targeted for direct instruction using different toy sets. A modified…

  4. Parent Perceptions of Time Spent Meaningfully by Young Adults with Pervasive Support Needs

    ERIC Educational Resources Information Center

    Rossetti, Zachary; Lehr, Donna; Lederer, Leslie; Pelerin, Dana; Huang, Shuoxi

    2015-01-01

    This article describes a qualitative study that examined how 23 young adults with pervasive support needs and limited functional communication spent their time and how their parents (n = 23) and direct support professionals (DSPs; n = 2) defined meaningfulness in relation to the young adults' experiences. Data were collected through…

  5. Pervasive Learning Games: Explorations of Hybrid Educational Gamescapes

    ERIC Educational Resources Information Center

    Thomas, Siobhan

    2006-01-01

    Pervasive gaming has tremendous potential as a learning tool and represents an interesting development in the field of video games and education. The literature surrounding video games and education is vast: For more than 20 years, educationalists have been discussing the potential that exists for the application of video games to learning.…

  6. Sleep Correlates of Pervasive Developmental Disorders: A Review of the Literature

    ERIC Educational Resources Information Center

    Hollway, Jill A.; Aman, Michael G.

    2011-01-01

    Sleep disturbance is a significant problem in the general pediatric population, and it occurs even more frequently in children with pervasive developmental disorders (PDDs). Much time and energy have been spent examining the characteristics that predispose children to insomnia and it is likely that equivalent factors influence sleep in PDDs.…

  7. Prevalence of Pervasive Developmental Disorders in Two Canadian Provinces

    ERIC Educational Resources Information Center

    Ouellette-Kuntz, Helene; Coo, Helen; Yu, C. T.; Chudley, Albert E.; Noonan, Andrea; Breitenbach, Marlene; Ramji, Nasreen; Prosick, Talia; Bedard, Angela; Holden, Jeanette J. A.

    2006-01-01

    Although it is generally accepted that the proportion of children diagnosed with pervasive developmental disorders (PDDs) has increased in the past two decades, there is no consensus on the prevalence of these conditions. The accompanying large rise in demand for services, together with uncertainty regarding the extent to which the observed…

  8. Injury Treatment among Children with Autism or Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    McDermott, Suzanne; Zhou, Li; Mann, Joshua

    2008-01-01

    This study examined the differences in the frequency and type of injury for children with autism and pervasive developmental disorder (PDD) compared with typically developing peers, when both groups are insured by Medicaid. The relative rate (RR) of emergency/hospital treatment of injury for children with autism or PDD compared to controls was…

  9. Donepezil in the Treatment of ADHD-Like Symptoms in Youths with Pervasive Developmental Disorder: A Case Series

    ERIC Educational Resources Information Center

    Doyle, Robert L.; Frazier, Jean; Spencer, Thomas J.; Geller, Daniel; Biederman, Joseph; Wilens, Timothy

    2006-01-01

    Background: Recent studies reported ADHD-like symptoms and cognitive deficits in pervasive developmental disorder (PDD). Because work in dementia documents improvement in executive function deficits with the acetylcholinesterase inhibitor donepezil, the authors reason that similar benefits could be obtained in PDD. Method: The authors describe…

  10. Targeting Social Skills Deficits in an Adolescent with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Hagopian, Louis P.; Kuhn, David E.; Strother, Geri E.

    2009-01-01

    Social skills deficits are a defining feature of individuals diagnosed with autism and other pervasive developmental disorders (PDD), which can impair functioning and put the individual at higher risk for developing problem behavior (e.g., self-injury, aggression). In the current study, an adolescent with PDD displayed inappropriate social…

  11. NASA Tech Briefs, June 2000. Volume 24, No. 6

    NASA Technical Reports Server (NTRS)

    2000-01-01

    Topics include: Computer-Aided Design and Engineering; Electronic Components and Circuits; Electronic Systems; Test and Measurement; Physical Sciences; Materials; Computer Programs; Computers and Peripherals;

  12. Child Maltreatment and Gender Interactions as Predictors of Differential Neuroendocrine Profiles

    PubMed Central

    Doom, Jenalee R.; Cicchetti, Dante; Rogosch, Fred A.; Dackis, Melissa N.

    2013-01-01

    Summary Child maltreatment is a potent stressor associated with neuroendocrine dysregulation and increased risk for mental and physical disorders throughout the lifespan. Gender differences in stress reactivity and adult psychopathology prevalence may be related to sex-specific responsivity to stress. The purpose of this study is to examine whether gender interacts with the stress of maltreatment to produce differential neuroendocrine profiles in children. Participants included 137 maltreated and 110 nonmaltreated low-income, racially and ethnically diverse children (range: 7.9–10.9 years; M= 9.42 years; 52% male) who attended a summer research day camp. Saliva was collected 3 times across the day for 5 days for cortisol and dehydroepiandosterone (DHEA) analysis. Department of Human Services records were examined to determine the type, severity, chronicity, onset, and recency of maltreatment for children in the maltreated group. Significant interactions between gender and maltreatment pervasiveness predicted diurnal cortisol, DHEA, and cortisol/DHEA ratio levels. Elevated daily cortisol levels were reported for boys compared to girls in the group with more pervasive maltreatment. Boys with less pervasive maltreatment had lower DHEA and higher cortisol/DHEA ratio levels than girls with similar experiences, nonmaltreated boys, and boys with more pervasive maltreatment. Further results are consistent with down-regulation of cortisol production in girls with more pervasive maltreatment and girls who experienced maltreatment that was early onset and not recent. The effectiveness of interventions for maltreated children may be improved with greater knowledge of how maltreatment differentially affects neuroendocrine regulation by gender. PMID:23333253

  13. A survey of body sensor networks.

    PubMed

    Lai, Xiaochen; Liu, Quanli; Wei, Xin; Wang, Wei; Zhou, Guoqiao; Han, Guangyi

    2013-04-24

    The technology of sensor, pervasive computing, and intelligent information processing is widely used in Body Sensor Networks (BSNs), which are a branch of wireless sensor networks (WSNs). BSNs are playing an increasingly important role in the fields of medical treatment, social welfare and sports, and are changing the way humans use computers. Existing surveys have placed emphasis on the concept and architecture of BSNs, signal acquisition, context-aware sensing, and system technology, while this paper will focus on sensor, data fusion, and network communication. And we will introduce the research status of BSNs, the analysis of hotspots, and future development trends, the discussion of major challenges and technical problems facing currently. The typical research projects and practical application of BSNs are introduced as well. BSNs are progressing along the direction of multi-technology integration and intelligence. Although there are still many problems, the future of BSNs is fundamentally promising, profoundly changing the human-machine relationships and improving the quality of people's lives.

  14. Privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks.

    PubMed

    Sun, Yi; Wen, Qiaoyan; Zhang, Yudong; Li, Wenmin

    2014-01-01

    With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients' health information and doctors' diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions.

  15. A Survey of Body Sensor Networks

    PubMed Central

    Lai, Xiaochen; Liu, Quanli; Wei, Xin; Wang, Wei; Zhou, Guoqiao; Han, Guangyi

    2013-01-01

    The technology of sensor, pervasive computing, and intelligent information processing is widely used in Body Sensor Networks (BSNs), which are a branch of wireless sensor networks (WSNs). BSNs are playing an increasingly important role in the fields of medical treatment, social welfare and sports, and are changing the way humans use computers. Existing surveys have placed emphasis on the concept and architecture of BSNs, signal acquisition, context-aware sensing, and system technology, while this paper will focus on sensor, data fusion, and network communication. And we will introduce the research status of BSNs, the analysis of hotspots, and future development trends, the discussion of major challenges and technical problems facing currently. The typical research projects and practical application of BSNs are introduced as well. BSNs are progressing along the direction of multi-technology integration and intelligence. Although there are still many problems, the future of BSNs is fundamentally promising, profoundly changing the human-machine relationships and improving the quality of people's lives. PMID:23615581

  16. Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks

    PubMed Central

    Wen, Qiaoyan; Zhang, Yudong; Li, Wenmin

    2014-01-01

    With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients' health information and doctors' diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions. PMID:25126107

  17. Intestinal cytokines in children with pervasive developmental disorders.

    PubMed

    DeFelice, Magee L; Ruchelli, Eduardo D; Markowitz, Jonathan E; Strogatz, Melissa; Reddy, Krishna P; Kadivar, Khadijeh; Mulberg, Andrew E; Brown, Kurt A

    2003-08-01

    A relationship between autism and gastrointestinal (GI) immune dysregulation has been postulated based on incidence of GI complaints as well as macroscopically observed lymphonodular hyperplasia and microscopically determined enterocolitis in pediatric patients with autism. To evaluate GI immunity, we quantitatively assessed levels of proinflammatory cytokines, interleukin (IL)-6, IL-8, and IL-1beta, produced by intestinal biopsies of children with pervasive developmental disorders. Fifteen patients, six with pervasive developmental disorders and nine age-matched controls, presenting for diagnostic colonoscopy were enrolled. Endoscopic biopsies were organ cultured, supernatants were harvested, and IL-6, IL-8, and IL-1beta levels were quantified by ELISA. Tissue histology was evaluated by blinded pathologists. Concentrations of IL-6 from intestinal organ culture supernatants of patients with pervasive developmental disorders (median 318.5 pg/ml, interquartile range 282.0-393.0 pg/ml) when compared with controls (median 436.9 pg/ml, interquartile range 312.6-602.5 pg/ml) were not significantly different (p = 0.0987). Concentrations of IL-8 (median 84,000 pg/ml, interquartile range 16,000-143,000 pg/ml) when compared with controls (median 177,000 pg/ml, interquartile range 114,000-244,000 pg/ml) were not significantly different (p = 0.0707). Concentrations of IL-1beta (median 0.0 pg/ml, interquartile range 0.0-94.7 pg/ml) when compared with controls (median 0.0 pg/ml, interquartile range 0.0-60.2 pg/ml) were not significantly different (p = 0.8826). Tissue histology was nonpathological for all patients. We have demonstrated no significant difference in production of IL-6, IL-8, and IL-1beta between patients with pervasive developmental disorders and age-matched controls. In general, intestinal levels of IL-6 and IL-8 were lower in patients with pervasive developmental disorders than in age-matched controls. These data fail to support an association between autism and GI inflammation.

  18. Computational Nanotechnology of Molecular Materials, Electronics, and Actuators with Carbon Nanotubes and Fullerenes

    NASA Technical Reports Server (NTRS)

    Srivastava, Deepak; Menon, Madhu; Cho, Kyeongjae; Biegel, Bryan (Technical Monitor)

    2001-01-01

    The role of computational nanotechnology in developing next generation of multifunctional materials, molecular scale electronic and computing devices, sensors, actuators, and machines is described through a brief review of enabling computational techniques and few recent examples derived from computer simulations of carbon nanotube based molecular nanotechnology.

  19. An Analog Computer for Electronic Engineering Education

    ERIC Educational Resources Information Center

    Fitch, A. L.; Iu, H. H. C.; Lu, D. D. C.

    2011-01-01

    This paper describes a compact analog computer and proposes its use in electronic engineering teaching laboratories to develop student understanding of applications in analog electronics, electronic components, engineering mathematics, control engineering, safe laboratory and workshop practices, circuit construction, testing, and maintenance. The…

  20. Computational Model Tracking Primary Electrons, Secondary Electrons, and Ions in the Discharge Chamber of an Ion Engine

    NASA Technical Reports Server (NTRS)

    Mahalingam, Sudhakar; Menart, James A.

    2005-01-01

    Computational modeling of the plasma located in the discharge chamber of an ion engine is an important activity so that the development and design of the next generation of ion engines may be enhanced. In this work a computational tool called XOOPIC is used to model the primary electrons, secondary electrons, and ions inside the discharge chamber. The details of this computational tool are discussed in this paper. Preliminary results from XOOPIC are presented. The results presented include particle number density distributions for the primary electrons, the secondary electrons, and the ions. In addition the total number of a particular particle in the discharge chamber as a function of time, electric potential maps and magnetic field maps are presented. A primary electron number density plot from PRIMA is given in this paper so that the results of XOOPIC can be compared to it. PRIMA is a computer code that the present investigators have used in much of their previous work that provides results that compare well to experimental results. PRIMA only models the primary electrons in the discharge chamber. Modeling ions and secondary electrons, as well as the primary electrons, will greatly increase our ability to predict different characteristics of the plasma discharge used in an ion engine.

  1. Computer conferencing: the "nurse" in the "Electronic School District".

    PubMed

    Billings, D M; Phillips, A

    1991-01-01

    As computer-based instructional technologies become increasingly available, they offer new mechanisms for health educators to provide health instruction. This article describes a pilot project in which nurses established a computer conference to provide health instruction to high school students participating in an electronic link of high schools. The article discusses computer conferencing, the "Electronic School District," the design of the nursing conference, and the role of the nurse in distributed health education.

  2. Affective e-Learning: Using "Emotional" Data to Improve Learning in Pervasive Learning Environment

    ERIC Educational Resources Information Center

    Shen, Liping; Wang, Minjuan; Shen, Ruimin

    2009-01-01

    Using emotion detection technologies from biophysical signals, this study explored how emotion evolves during learning process and how emotion feedback could be used to improve learning experiences. This article also described a cutting-edge pervasive e-Learning platform used in a Shanghai online college and proposed an affective e-Learning model,…

  3. Common and Unique Impairments in Facial-Expression Recognition in Pervasive Developmental Disorder-Not Otherwise Specified and Asperger's Disorder

    ERIC Educational Resources Information Center

    Uono, Shota; Sato, Wataru; Toichi, Motomi

    2013-01-01

    This study was designed to identify specific difficulties and associated features related to the problems with social interaction experienced by individuals with pervasive developmental disorder-not otherwise specified (PDD-NOS) using an emotion-recognition task. We compared individuals with PDD-NOS or Asperger's disorder (ASP) and typically…

  4. Empirically Based Phenotypic Profiles of Children with Pervasive Developmental Disorders: Interpretation in the Light of the DSM-5

    ERIC Educational Resources Information Center

    Greaves-Lord, Kirstin; Eussen, Mart L. J. M.; Verhulst, Frank C.; Minderaa, Ruud B.; Mandy, William; Hudziak, James J.; Steenhuis, Mark Peter; de Nijs, Pieter F.; Hartman, Catharina A.

    2013-01-01

    This study aimed to contribute to the Diagnostic and Statistical Manual (DSM) debates on the conceptualization of autism by investigating (1) whether empirically based distinct phenotypic profiles could be distinguished within a sample of mainly cognitively able children with pervasive developmental disorder (PDD), and (2) how profiles related to…

  5. Preschool Boys with Pervasive Hyperactivity: Early Peer Functioning and Mother-Child Relationship Influences

    ERIC Educational Resources Information Center

    Keown, Louise J.; Woodward, Lianne J.

    2006-01-01

    This study compared the peer functioning of a community sample of preschool boys with pervasive hyperactivity (N=33) and comparison boys (N=34), and examined the extent to which any differences in peer functioning between these groups could be explained by comorbid child conduct problems and parenting factors. The quality of boys' peer relations…

  6. Interventions for Children with Pervasive Developmental Disorders in Low and Middle Income Countries

    ERIC Educational Resources Information Center

    Hastings, Richard P.; Robertson, Janet; Yasamy, M. T.

    2012-01-01

    Background: Although interventions for children with pervasive developmental disorders (PDD) have been the focus of research effort and evidence reviews in many Western countries, this evidence has not been assessed in the context of low- and middle-income (LAMI) countries especially in terms of the fit with different cultures and resources.…

  7. Regression of Language and Non-Language Skills in Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Meilleur, A. -A. S.; Fombonne, E.

    2009-01-01

    Background: As part of the pervasive developmental disorders (PDD), there is a subgroup of individuals reported to have a different onset of symptom appearance consisting of an apparently normal early development, followed by a loss of verbal and/or non-verbal skills prior to 2 years of age. This study aims at comparing the symptomatology of…

  8. Using Virtual Reality Environment to Improve Joint Attention Associated with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Cheng, Yufang; Huang, Ruowen

    2012-01-01

    The focus of this study is using data glove to practice Joint attention skill in virtual reality environment for people with pervasive developmental disorder (PDD). The virtual reality environment provides a safe environment for PDD people. Especially, when they made errors during practice in virtual reality environment, there is no suffering or…

  9. Curiosity, Interest and Engagement in Technology-Pervasive Learning Environments: A New Research Agenda

    ERIC Educational Resources Information Center

    Arnone, Marilyn P.; Small, Ruth V.; Chauncey, Sarah A.; McKenna, H. Patricia

    2011-01-01

    This paper identifies the need for developing new ways to study curiosity in the context of today's pervasive technologies and unprecedented information access. Curiosity is defined in this paper in a way which incorporates the concomitant constructs of interest and engagement. A theoretical model for curiosity, interest and engagement in new…

  10. New Research on Multitasking Points to Role of Self-Control

    ERIC Educational Resources Information Center

    Sparks, Sarah D.

    2012-01-01

    For a generation of children immersed in technology, emerging research suggests that while the temptation to multitask may be pervasive, the ability to control it could be the real bellwether of academic success. The pervasiveness of technology and social media, coupled with a fear of missing out on something important, has led students to pay…

  11. Effects of Risperidone and Parent Training on Adaptive Functioning in Children with Pervasive Developmental Disorders and Serious Behavioral Problems

    ERIC Educational Resources Information Center

    Scahill, Lawrence; McDougle, Christopher J.; Aman, Michael G.; Johnson, Cynthia; Handen, Benjamin; Bearss, Karen; Dziura, James; Butter, Eric; Swiezy, Naomi G.; Arnold, L. Eugene; Stigler, Kimberly A.; Sukhodolsky, Denis D.; Lecavalier, Luc; Pozdol, Stacie L.; Nikolov, Roumen; Hollway, Jill A.; Korzekwa, Patricia; Gavaletz, Allison; Kohn, Arlene E.; Koenig, Kathleen; Grinnon, Stacie; Mulick, James A.; Yu, Sunkyung; Vitiello, Benedetto

    2012-01-01

    Objective: Children with Pervasive Developmental Disorders (PDDs) have social interaction deficits, delayed communication, and repetitive behaviors as well as impairments in adaptive functioning. Many children actually show a decline in adaptive skills compared with age mates over time. Method: This 24-week, three-site, controlled clinical trial…

  12. Interaction of Social and Play Behaviors in Preschoolers With and Without Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Pierce-Jordan, Sandra; Lifter, Karin

    2005-01-01

    This study investigated the relationship between the social and play behaviors of young children with pervasive developmental disorder (PDD) and without PDD. Videotaped observations of 21 preschool children (12 with PDD and 9 without PDD) were examined independently for (a) social complexity and (b) play complexity that was assessed on an…

  13. Medication and Parent Training in Children with Pervasive Developmental Disorders and Serious Behavior Problems: Results from a Randomized Clinical Trial

    ERIC Educational Resources Information Center

    Aman, Michael G.; McDougle, Christopher J.; Scahill, Lawrence; Handen, Benjamin; Arnold, L. Eugene; Johnson, Cynthia; Stigler, Kimberly A.; Bearss, Karen; Butter, Eric; Swiezy, Naomi B.; Sukhodolsky, Denis D.; Ramadan, Yaser; Pozdol, Stacie L.; Nikolov, Roumen; Lecavalier, Luc; Kohn, Arlene E.; Koenig, Kathleen; Hollway, Jill A.; Korzekwa, Patricia; Gavaletz, Allison; Mulick, James A.; Hall, Kristy L.; Dziura, James; Ritz, Louise; Trollinger, Stacie; Yu, Sunkyung; Vitiello, Benedetto; Wagner, Ann

    2009-01-01

    Objective: Many children with pervasive developmental disorders (PDDs) have serious, functionally impairing behavioral problems. We tested whether combined treatment (COMB) with risperidone and parent training (PT) in behavior management is superior to medication alone (MED) in improving severe behavioral problems in children with PDDs. Method:…

  14. Gross Motor Performance and Self-Perceived Motor Competence in Children with Emotional, Behavioural, and Pervasive Developmental Disorders: A Review

    ERIC Educational Resources Information Center

    Emck, Claudia; Bosscher, Ruud; Beek, Peter; Doreleijers, Theo

    2009-01-01

    Aims: Motor performance and self-perceived motor competence have a great impact on the psychosocial development of children in general. In this review, empirical studies of gross motor performance and self-perception of motor competence in children with emotional (depression and anxiety), behavioural, and pervasive developmental disorders are…

  15. The Cultural Orientations of Entrepreneurs and Employees' Job Satisfaction: The Turkish Small and Medium Sized Enterprises (SMEs) Case

    ERIC Educational Resources Information Center

    Yetim, Nalan; Yetim, Unsal

    2006-01-01

    The primary purpose of this study was to determine whether cultural orientations which were pervasive and salient in the society of SMEs' entrepreneurs predict employees' job satisfaction. Paternalism, collectivism, individualism, power distance, uncertainty avoidance were assessed as pervasive and salient attributes for Turkish society. Data were…

  16. Abnormalities on the Neurological Examination and EEG in Young Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Akshoomoff, Natacha; Farid, Nikdokht; Courchesne, Eric; Haas, Richard

    2007-01-01

    This study examined the nature and frequency of neurological and EEG abnormalities in 60 young children (ages 2-6 years) with pervasive developmental disorders. A number of standard neurological functions could not be adequately assessed due to the young age of the children and/or limited comprehension and cooperation. The most common neurological…

  17. Facial Electromyographic Responses to Emotional Information from Faces and Voices in Individuals with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Magnee, Maurice J. C. M.; de Gelder, Beatrice; van Engeland, Herman; Kemner, Chantal

    2007-01-01

    Background: Despite extensive research, it is still debated whether impairments in social skills of individuals with pervasive developmental disorder (PDD) are related to specific deficits in the early processing of emotional information. We aimed to test both automatic processing of facial affect as well as the integration of auditory and visual…

  18. Diagnostic Utility of the Pervasive Developmental Disorder Behavior Inventory

    ERIC Educational Resources Information Center

    Reel, Kristy H.; Lecavalier, Luc; Butter, Eric; Mulick, James A.

    2012-01-01

    This study assessed the diagnostic utility of the Pervasive Developmental Disorder Behavior Inventory (PDDBI) in a sample of 84 children aged 3-12 years of age. Forty-two children with ASD were individually matched on age and non-verbal IQ to 42 children with other disabilities and groups were compared on PDDBI subscales and total score. Results…

  19. Hemispheric Processing of Idioms and Irony in Adults with and without Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Saban-Bezalel, Ronit; Mashal, Nira

    2015-01-01

    Previous studies on individuals with pervasive developmental disorders (PDD) have pointed to difficulties in comprehension of figurative language. Using the divided visual field paradigm, the present study examined hemispheric processing of idioms and irony in 23 adults with PDD and in 24 typically developing (TD) adults. The results show that…

  20. Differential Language Markers of Pathology in Autism, Pervasive Developmental Disorder Not Otherwise Specified and Specific Language Impairment

    ERIC Educational Resources Information Center

    Demouy, Julie; Plaza, Monique; Xavier, Jean; Ringeval, Fabien; Chetouani, Mohamed; Perisse, Didier; Chauvin, Dominique; Viaux, Sylvie; Golse, Bernard; Cohen, David; Robel, Laurence

    2011-01-01

    Language impairment is a common core feature in Pervasive Developmental Disorders (PDD) and Specific Language Impairment (SLI). Many studies have tried to define the specific language profiles of these disorders, some claiming the existence of overlaps, and others conceiving of them as separate categories. Fewer have sought to determine whether…

  1. Electrocortical Reflections of Face and Gaze Processing in Children with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Kemner, C.; Schuller, A-M.; Van Engeland, H.

    2006-01-01

    Background: Children with pervasive developmental disorder (PDD) show behavioral abnormalities in gaze and face processing, but recent studies have indicated that normal activation of face-specific brain areas in response to faces is possible in this group. It is not clear whether the brain activity related to gaze processing is also normal in…

  2. Etiology of Pervasive versus Situational Antisocial Behaviors: A Multi-informant Longitudinal Cohort Study

    ERIC Educational Resources Information Center

    Wertz, Jasmin; Zavos, Helena M. S.; Matthews, Timothy; Gray, Rebecca; Best-Lane, Janis; Pariante, Carmine M.; Moffitt, Terrie E.; Arseneault, Louise

    2016-01-01

    The aim of this study was to disentangle pervasive from situational antisocial behaviors using multiple informants, and to investigate their genetic and environmental etiologies in preadolescence and across time. Antisocial behaviors were assessed in 2,232 twins from the Environmental Risk (E-Risk) Longitudinal Twin Study at ages 5 and 12.…

  3. Retrospective Evaluation of an Intensive Method of Treatment for Children with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Vorgraft, Yitzchak; Farbstein, Ilana; Spiegel, Rene; Apter, Alan

    2007-01-01

    The objective of this preliminary study was to evaluate a novel intensive therapy program in young children with pervasive developmental disorder (PDD). Twenty-three children treated at the Mifne Institute in Israel between 1997 and 1999 were assessed. Videos taken before coming to Mifne and after intensive treatment at the institute and before…

  4. Using Collaborative Learning Exercises to Transfer Pervasive Skills: Some South African Evidence

    ERIC Educational Resources Information Center

    Strauss-Keevy, Monique

    2015-01-01

    The Competency Framework, introduced by the South African Institute of Chartered Accountants (SAICA) details technical competencies, but also places emphasis on the pervasive skills that need to be attained by candidates for them to qualify as chartered accountants (CAs). Thus, an additional onus has been placed on academics to ensure that they…

  5. 21 CFR 803.14 - How do I submit a report electronically?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... submissions include alternative reporting media (magnetic tape, disc, etc.) and computer-to-computer communication. (b) If your electronic report meets electronic reporting standards, guidance documents, or other...

  6. The design of an m-Health monitoring system based on a cloud computing platform

    NASA Astrophysics Data System (ADS)

    Xu, Boyi; Xu, Lida; Cai, Hongming; Jiang, Lihong; Luo, Yang; Gu, Yizhi

    2017-01-01

    Compared to traditional medical services provided within hospitals, m-Health monitoring systems (MHMSs) face more challenges in personalised health data processing. To achieve personalised and high-quality health monitoring by means of new technologies, such as mobile network and cloud computing, in this paper, a framework of an m-Health monitoring system based on a cloud computing platform (Cloud-MHMS) is designed to implement pervasive health monitoring. Furthermore, the modules of the framework, which are Cloud Storage and Multiple Tenants Access Control Layer, Healthcare Data Annotation Layer, and Healthcare Data Analysis Layer, are discussed. In the data storage layer, a multiple tenant access method is designed to protect patient privacy. In the data annotation layer, linked open data are adopted to augment health data interoperability semantically. In the data analysis layer, the process mining algorithm and similarity calculating method are implemented to support personalised treatment plan selection. These three modules cooperate to implement the core functions in the process of health monitoring, which are data storage, data processing, and data analysis. Finally, we study the application of our architecture in the monitoring of antimicrobial drug usage to demonstrate the usability of our method in personal healthcare analysis.

  7. Emerging CAE technologies and their role in Future Ambient Intelligence Environments

    NASA Astrophysics Data System (ADS)

    Noor, Ahmed K.

    2011-03-01

    Dramatic improvements are on the horizon in Computer Aided Engineering (CAE) and various simulation technologies. The improvements are due, in part, to the developments in a number of leading-edge technologies and their synergistic combinations/convergence. The technologies include ubiquitous, cloud, and petascale computing; ultra high-bandwidth networks, pervasive wireless communication; knowledge based engineering; networked immersive virtual environments and virtual worlds; novel human-computer interfaces; and powerful game engines and facilities. This paper describes the frontiers and emerging simulation technologies, and their role in the future virtual product creation and learning/training environments. The environments will be ambient intelligence environments, incorporating a synergistic combination of novel agent-supported visual simulations (with cognitive learning and understanding abilities); immersive 3D virtual world facilities; development chain management systems and facilities (incorporating a synergistic combination of intelligent engineering and management tools); nontraditional methods; intelligent, multimodal and human-like interfaces; and mobile wireless devices. The Virtual product creation environment will significantly enhance the productivity and will stimulate creativity and innovation in future global virtual collaborative enterprises. The facilities in the learning/training environment will provide timely, engaging, personalized/collaborative and tailored visual learning.

  8. Designing affective video games to support the social-emotional development of teenagers with autism spectrum disorders.

    PubMed

    Khandaker, Mitu

    2009-01-01

    Autism spectrum disorders (ASD) are a group of developmental neuropsychiatric disorders, comprised of three diagnostic entities - autistic disorder (AD), Asperger's disorder (AS), and Pervasive Developmental Disorder Not Otherwise Specified (including atypical autism) (PDD-NOS). A number of intervention techniques are currently used to reduce some of the associated challenges, with techniques ranging from behavioral therapy to dietary interventions and traditional counseling. This positional paper proposes the use of video games which leverage affective computing technologies as intervention in autism spectrum disorders in the context of the use of traditional play therapy with adolescents, who may feel uncomfortable engaging in traditional play with toys they may be too old for. It aims to explore the potential for greater 'social physics' made possible by affective computing technologies. This involves computationally 'recognizing' emotions in a user, often through the use of multimodal affective sensors, including facial expressions, postural shifts, and physiological signals such as heart rate, skin conductivity, and EEG signals. However, it is suggested that this should be augmented by researching the effect of social game design mechanisms on social-emotional development, particularly for those who experience difficulty with social interaction.

  9. Overlapping Community Detection based on Network Decomposition

    NASA Astrophysics Data System (ADS)

    Ding, Zhuanlian; Zhang, Xingyi; Sun, Dengdi; Luo, Bin

    2016-04-01

    Community detection in complex network has become a vital step to understand the structure and dynamics of networks in various fields. However, traditional node clustering and relatively new proposed link clustering methods have inherent drawbacks to discover overlapping communities. Node clustering is inadequate to capture the pervasive overlaps, while link clustering is often criticized due to the high computational cost and ambiguous definition of communities. So, overlapping community detection is still a formidable challenge. In this work, we propose a new overlapping community detection algorithm based on network decomposition, called NDOCD. Specifically, NDOCD iteratively splits the network by removing all links in derived link communities, which are identified by utilizing node clustering technique. The network decomposition contributes to reducing the computation time and noise link elimination conduces to improving the quality of obtained communities. Besides, we employ node clustering technique rather than link similarity measure to discover link communities, thus NDOCD avoids an ambiguous definition of community and becomes less time-consuming. We test our approach on both synthetic and real-world networks. Results demonstrate the superior performance of our approach both in computation time and accuracy compared to state-of-the-art algorithms.

  10. Electron Impact Ionization: A New Parameterization for 100 eV to 1 MeV Electrons

    NASA Technical Reports Server (NTRS)

    Fang, Xiaohua; Randall, Cora E.; Lummerzheim, Dirk; Solomon, Stanley C.; Mills, Michael J.; Marsh, Daniel; Jackman, Charles H.; Wang, Wenbin; Lu, Gang

    2008-01-01

    Low, medium and high energy electrons can penetrate to the thermosphere (90-400 km; 55-240 miles) and mesosphere (50-90 km; 30-55 miles). These precipitating electrons ionize that region of the atmosphere, creating positively charged atoms and molecules and knocking off other negatively charged electrons. The precipitating electrons also create nitrogen-containing compounds along with other constituents. Since the electron precipitation amounts change within minutes, it is necessary to have a rapid method of computing the ionization and production of nitrogen-containing compounds for inclusion in computationally-demanding global models. A new methodology has been developed, which has parameterized a more detailed model computation of the ionizing impact of precipitating electrons over the very large range of 100 eV up to 1,000,000 eV. This new parameterization method is more accurate than a previous parameterization scheme, when compared with the more detailed model computation. Global models at the National Center for Atmospheric Research will use this new parameterization method in the near future.

  11. Community Needs Assessment for an Electronics and Computer Engineering Technology Program at Maui, Molokai, and Lanai.

    ERIC Educational Resources Information Center

    Pezzoli, Jean A.

    In June 1992, Maui Community College (MCC), in Hawaii, conducted a survey of the communities of Maui, Molokai, Lanai, and Hana to determine perceived needs for an associate degree and certificate program in electronics and computer engineering. Questionnaires were mailed to 500 firms utilizing electronic or computer services, seeking information…

  12. The Impact of Misspelled Words on Automated Computer Scoring: A Case Study of Scientific Explanations

    NASA Astrophysics Data System (ADS)

    Ha, Minsu; Nehm, Ross H.

    2016-06-01

    Automated computerized scoring systems (ACSSs) are being increasingly used to analyze text in many educational settings. Nevertheless, the impact of misspelled words (MSW) on scoring accuracy remains to be investigated in many domains, particularly jargon-rich disciplines such as the life sciences. Empirical studies confirm that MSW are a pervasive feature of human-generated text and that despite improvements, spell-check and auto-replace programs continue to be characterized by significant errors. Our study explored four research questions relating to MSW and text-based computer assessments: (1) Do English language learners (ELLs) produce equivalent magnitudes and types of spelling errors as non-ELLs? (2) To what degree do MSW impact concept-specific computer scoring rules? (3) What impact do MSW have on computer scoring accuracy? and (4) Are MSW more likely to impact false-positive or false-negative feedback to students? We found that although ELLs produced twice as many MSW as non-ELLs, MSW were relatively uncommon in our corpora. The MSW in the corpora were found to be important features of the computer scoring models. Although MSW did not significantly or meaningfully impact computer scoring efficacy across nine different computer scoring models, MSW had a greater impact on the scoring algorithms for naïve ideas than key concepts. Linguistic and concept redundancy in student responses explains the weak connection between MSW and scoring accuracy. Lastly, we found that MSW tend to have a greater impact on false-positive feedback. We discuss the implications of these findings for the development of next-generation science assessments.

  13. NASA Tech Briefs, February 2000. Volume 24, No. 2

    NASA Technical Reports Server (NTRS)

    2000-01-01

    Topics covered include: Test and Measurement; Computer-Aided Design and Engineering; Electronic Components and Circuits; Electronic Systems; Physical Sciences; Materials; Computer Programs; Mechanics; Bio-Medical; Mathematics and Information Sciences; Computers and Peripherals.

  14. Plasma Equilibrium Control in Nuclear Fusion Devices 2. Plasma Control in Magnetic Confinement Devices 2.1 Plasma Control in Tokamaks

    NASA Astrophysics Data System (ADS)

    Fukuda, Takeshi

    The plasma control technique for use in large tokamak devices has made great developmental strides in the last decade, concomitantly with progress in the understanding of tokamak physics and in part facilitated by the substantial advancement in the computing environment. Equilibrium control procedures have thereby been established, and it has been pervasively recognized in recent years that the real-time feedback control of physical quantities is indispensable for the improvement and sustainment of plasma performance in a quasi-steady-state. Further development is presently undertaken to realize the “advanced plasma control” concept, where integrated fusion performance is achieved by the simultaneous feedback control of multiple physical quantities, combined with equilibrium control.

  15. Cognition is … Fundamentally Cultural.

    PubMed

    Bender, Andrea; Beller, Sieghard

    2013-03-01

    A prevailing concept of cognition in psychology is inspired by the computer metaphor. Its focus on mental states that are generated and altered by information input, processing, storage and transmission invites a disregard for the cultural dimension of cognition, based on three (implicit) assumptions: cognition is internal, processing can be distinguished from content, and processing is independent of cultural background. Arguing against each of these assumptions, we point out how culture may affect cognitive processes in various ways, drawing on instances from numerical cognition, ethnobiological reasoning, and theory of mind. Given the pervasive cultural modulation of cognition-on all of Marr's levels of description-we conclude that cognition is indeed fundamentally cultural, and that consideration of its cultural dimension is essential for a comprehensive understanding.

  16. Learning Setting-Generalized Activity Models for Smart Spaces

    PubMed Central

    Cook, Diane J.

    2011-01-01

    The data mining and pervasive computing technologies found in smart homes offer unprecedented opportunities for providing context-aware services, including health monitoring and assistance to individuals experiencing difficulties living independently at home. In order to provide these services, smart environment algorithms need to recognize and track activities that people normally perform as part of their daily routines. However, activity recognition has typically involved gathering and labeling large amounts of data in each setting to learn a model for activities in that setting. We hypothesize that generalized models can be learned for common activities that span multiple environment settings and resident types. We describe our approach to learning these models and demonstrate the approach using eleven CASAS datasets collected in seven environments. PMID:21461133

  17. Internet of things for an age-friendly healthcare.

    PubMed

    Konstantinidis, Evdokimos I; Bamparopoulos, Giorgos; Billis, Antonis; Bamidis, Panagiotis D

    2015-01-01

    In healthcare applications a large cohort of recent implementations utilises IoT-oriented infrastructures (XMPP) as well as smart mobile devices as communication gateways. IoT characteristi Communication/Connectivity, Pervasive Computing and Ambient Intelligence, are all highly related to Active and Healthy Aging environments. This paper presents a new idea, that of IoT enabled devices which are directly connected to the IoT (a glucose meter is used as an example herein), complying with the XMPP messaging protocol and the incorporation of a recently released Controller Application Communication (CAC) framework for distributed, cross-platform communication. A web based exergaming platform and a disease management tool, provide the vehicles for the demonstration of the feasibility and the successful implementation and integration of the aforementioned infrastructure.

  18. New Sociotechnical Insights in Interaction Design

    NASA Astrophysics Data System (ADS)

    Abdelnour-Nocera, José; Mørch, Anders I.

    New challenges are facing interaction design. On one hand because of advances in technology - pervasive, ubiquitous, multimodal and adaptive computing - are changing the nature of interaction. On the other, web 2.0, massive multiplayer games and collaboration software extends the boundaries of HCI to deal with interaction in settings of remote communication and collaboration. The aim of this workshop is to provide a forum for HCI practitioners and researchers interested in knowledge from the social sciences to discuss how sociotechnical insights can be used to inform interaction design, and more generally how social science methods and theories can help to enrich the conceptual framework of systems development and participatory design. Position papers submissions are invited to address key aspects of current research and practical case studies.

  19. Pervasive Developmental Disorders in Individuals with Cerebral Palsy

    ERIC Educational Resources Information Center

    Kilincaslan, Ayse; Mukaddes, Nahit Motavalli

    2009-01-01

    The aim of the present study was to describe the prevalence and associated factors of pervasive developmental disorders (PDD), including autistic disorder and PDD not otherwise specified (NOS), in a clinical sample of 126 children and adolescents (75 males, 51 females; age range 4-18y, mean 8y 8mo, SD 3y 8mo) with tetraplegic, hemiplegic,…

  20. Relationship between Motor and Executive Functioning in School-Age Children with Pervasive Developmental Disorder Not Otherwise Specified

    ERIC Educational Resources Information Center

    Schurink, J.; Hartman, E.; Scherder, E. J. A.; Houwen, S.; Visscher, C.

    2012-01-01

    This study examines the motor skills and executive functioning (EF) of 28 children diagnosed with pervasive developmental disorder-not otherwise specified (PDD-NOS; mean age: 10 years 6 months, range: 7-12 years; 19 boys, 9 girls) in comparison with age- and gender-matched typically developing children. The potential relationship between motor…

  1. The Art of Gamification; Teaching Sustainability and System Thinking by Pervasive Game Development

    ERIC Educational Resources Information Center

    Nordby, Anders; Øygardslia, Kristine; Sverdrup, Ulrik; Sverdrup, Harald

    2016-01-01

    In 2013 Hedmark University College conducted a research project where students from a game development project/study program developed and tested a Pervasive Game for learning as part of a class in System Thinking. The overall game goal was to teach Sustainability through System Thinking, and to give the students a real world experience with their…

  2. Qualitative Evaluation of the Design Variables of a Teaching Intervention to Expose Accounting Students to Pervasive Skills

    ERIC Educational Resources Information Center

    Viviers, Herman Albertus

    2016-01-01

    The primary objective of this article is to evaluate the design variables of a newly developed teaching intervention, "The Amazing Tax Race". It comprises a race against time in which accounting students participate within teams in multiple tax-related activities so that they are exposed to pervasive skills. The findings provide…

  3. Platelet Serotonin Levels in Pervasive Developmental Disorders and Mental Retardation: Diagnostic Group Differences, Within-Group Distribution, and Behavioral Correlates.

    ERIC Educational Resources Information Center

    Mulder, Erik J.; Anderson, George M.; Kema, Ido P.; De Bildt, Annelies; Van Lang, Natasja D.J.; Den Boer, Johan A.; Minderaa Ruud B.

    2004-01-01

    Objective: To investigate group differences, the within-group distributions, and the clinical correlates of platelet serotonin (5-HT) levels in pervasive developmental disorders (PDD). Method: Platelet 5-HT levels were measured in Dutch children and young adults, recruited from 2001 through 2003, with PDD (autism, Asperger's and PDD-not otherwise…

  4. Pervasive Developmental Disorder Behavior in Adolescents with Intellectual Disability and Co-Occurring Somatic Chronic Diseases

    ERIC Educational Resources Information Center

    Oeseburg, B.; Groothoff, J. W.; Dijkstra, G. J.; Reijneveld, S. A.; Jansen, D. E. M. C.

    2010-01-01

    Evidence on the association between somatic chronic diseases in ID-adolescents and the full range of pervasive developmental disorder behavior (PDD behavior) is scarce. The aim of the present study is to assess the association between somatic chronic diseases in ID-adolescents and mild PDD behavior. We obtained data on 1044 ID-adolescents, aged…

  5. Parent-Rated Anxiety Symptoms in Children with Pervasive Developmental Disorders: Frequency and Association with Core Autism Symptoms and Cognitive Functioning

    ERIC Educational Resources Information Center

    Sukhodolsky, Denis G.; Scahill, Lawrence; Gadow, Kenneth D.; Arnold, L. Eugene; Aman, Michael G.; McDougle, Christopher J.; McCracken, James T.; Tierney, Elaine; White, Susan Williams; Lecavalier, Luc; Vitiello, Benedetto

    2008-01-01

    Background: In addition to the core symptoms, children with Pervasive Developmental Disorders (PDD) often exhibit other problem behaviors such as aggression, hyperactivity, and anxiety, which can contribute to overall impairment and, therefore, become the focus of clinical attention. Limited data are available on the prevalence of anxiety in these…

  6. The Pervasiveness of Racial Prejudice in Higher Education in the U.S.: Raising Awareness and Solution

    ERIC Educational Resources Information Center

    Osa, Justina O.

    2007-01-01

    Racial diversity is one of the greatest strengths of America?s higher education system. But racial prejudice is entrenched and pervasive in many campuses of institutions of higher learning. A close observation reveals that racial prejudice is not restricted to any race. As much as one would like to believe that simply passing legislations and…

  7. Determining Differences in Social Cognition between High-Functioning Autistic Disorder and Other Pervasive Developmental Disorders Using New Advanced "Mind-Reading" Tasks

    ERIC Educational Resources Information Center

    Kuroda, Miho; Wakabayashi, Akio; Uchiyama, Tokio; Yoshida, Yuko; Koyama, Tomonori; Kamio, Yoko

    2011-01-01

    Deficits in understanding the mental state of others ("mind-reading") have been well documented in individuals with pervasive developmental disorders (PDD). However, it is unclear whether this deficit in social cognition differs between the subgroups of PDD defined by the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text…

  8. The Pervasiveness of 1/f Scaling in Speech Reflects the Metastable Basis of Cognition

    ERIC Educational Resources Information Center

    Kello, Christopher T.; Anderson, Gregory G.; Holden, John G.; Van Orden, Guy C.

    2008-01-01

    Human neural and behavioral activities have been reported to exhibit fractal dynamics known as "1/f noise," which is more aptly named "1/f scaling." Some argue that 1/f scaling is a general and pervasive property of the dynamical substrate from which cognitive functions are formed. Others argue that it is an idiosyncratic property of…

  9. Adaptive Behavior in Autism and Pervasive Developmental Disorder-Not Otherwise Specified: Microanalysis of Scores on the Vineland Adaptive Behavior Scales

    ERIC Educational Resources Information Center

    Paul, Rhea; Miles, Stephanie; Cicchetti, Domenic; Sparrow, Sara; Klin, Ami; Volkmar, Fred; Coflin, Megan; Booker, Shelley

    2004-01-01

    The purpose of this study is to provide a microanalysis of differences in adaptive functioning seen between well-matched groups of school-aged children with autism and those diagnosed as having Pervasive Developmental Disorder-Not Otherwise Specified, all of whom functioned in the mild to moderate range of intellectual impairment. Findings…

  10. An Open-Label Trial of Escitalopram in Pervasive Developmental Disorders.

    ERIC Educational Resources Information Center

    Owley, Thomas; Walton, Laura; Salt, Jeff; Guter, Stephen J., Jr.; Winnega, Marrea; Leventhal, Bennett L.; Cook, Edwin H., Jr.

    2005-01-01

    Objective: To assess the effect of escitalopram in the treatment of pervasive developmental disorders (PDDs). Method: This 10-week study had a forced titration, open-label design. Twenty-eight subjects (mean age 125.1 [+ or -] 33.5 months) with a PDD received escitalopram at a dose that increased weekly to a maximum dose of 20 mg as tolerated. The…

  11. Review of Part 67 of the Federal Air Regulations and the Medical Certification of Civilian Airmen. Volume 1

    DTIC Science & Technology

    1983-01-01

    schizoaffective disorder and atypical psycho3, infantile autism , childhood onset pervasive developmental disorder, and atypical pervasive devvlopmental...classified, including schizophreniform disorder, brief reactive psychosis, schizoaffective disorder and atypical psychosis, infantile autism ...procedures if the applicant !S free of symptoms and postoperative complications. After splenectomy, vaccination against pneumococcus is recommended, Awms and

  12. A Technology-Assisted Learning Setup as Assessment Supplement for Three Persons with a Diagnosis of Post-Coma Vegetative State and Pervasive Motor Impairment

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Buonocunto, Francesca; Sacco, Valentina; Colonna, Fabio; Navarro, Jorge; Lanzilotti, Crocifissa; Bosco, Andrea; Megna, Gianfranco; De Tommaso, Marina

    2009-01-01

    Post-coma persons in an apparent condition of vegetative state and pervasive motor impairment pose serious problems in terms of assessment and intervention options. A technology-based learning assessment procedure might serve for them as a diagnostic supplement with possible implications for rehabilitation intervention. The learning assessment…

  13. Detecting Subgroups in Children Diagnosed with Pervasive Developmental Disorder--Not Otherwise Specified

    ERIC Educational Resources Information Center

    Brennan, Laura; Barton, Marianne; Chen, Chi-Ming; Green, James; Fein, Deborah

    2015-01-01

    Hierarchical cluster analyses were used to detect three subgroups in a sample of children with pervasive developmental disorder--not otherwise specified (PDD-NOS) evaluated at ages 2 and 4. At age 2, Cluster 1 demonstrated few autism symptoms and high cognitive scores; 60% no longer met criteria for PDD at 4. Cluster 2 exhibited more autism…

  14. Reliability and Diagnostic Efficiency of the Diagnostic Inventory for Disharmony (DID) in Youths with Pervasive Developmental Disorder and Multiple Complex Developmental Disorder

    ERIC Educational Resources Information Center

    Xavier, Jean; Vannetzel, Leonard; Viaux, Sylvie; Leroy, Arthur; Plaza, Monique; Tordjman, Sylvie; Mille, Christian; Bursztejn, Claude; Cohen, David; Guile, Jean-Marc

    2011-01-01

    The Pervasive Developmental Disorder-Not Otherwise Specified (PDD-NOS) category is a psychopathological entity few have described and is poorly, and mainly negatively, defined by autism exclusion. In order to limit PDD-NOS heterogeneity, alternative clinical constructs have been developed. This study explored the reliability and the diagnostic…

  15. Long-Term Safety and Adverse Events of Risperidone in Children, Adolescents, and Adults with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Hellings, Jessica A.; Cardona, Alicia M.; Schroeder, Stephen R.

    2010-01-01

    The objective of this study was to examine long-term adverse events of risperidone in 19 children, adolescents, and adults with Pervasive Developmental Disorders and intellectual disability, continuing risperidone for a mean of 186.5 weeks, following a 46-week risperidone study. Nineteen individuals continued long-term follow-up after our…

  16. Efficacy of Atomoxetine for the Treatment of ADHD Symptoms in Patients with Pervasive Developmental Disorders: A Prospective, Open-Label Study

    ERIC Educational Resources Information Center

    Fernandez-Jaen, Alberto; Fernandez-Mayoralas, Daniel Martin; Calleja-Perez, Beatriz; Munoz-Jareno, Nuria; Campos Diaz, Maria del Rosario; Lopez-Arribas, Sonia

    2013-01-01

    Objective: Atomoxetine's tolerance and efficacy were studied in 24 patients with pervasive developmental disorder and symptoms of ADHD. Method: Prospective, open-label, 16-week study was performed, using the variables of the Clinical Global Impression Scale and the Conners' Scale, among others. Results: A significant difference was found between…

  17. Systematic Review and Meta-Analysis of Pharmacological Treatment of the Symptoms of Attention-Deficit/Hyperactivity Disorder in Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Reichow, Brian; Volkmar, Fred R.; Bloch, Michael H.

    2013-01-01

    Many children with pervasive developmental disorders (PDD) exhibit behaviors and symptoms of attention-deficit/hyperactivity disorder (ADHD). We sought to determine the relative efficacy of medications for treating ADHD symptoms in children with PDD by identifying all double-blind, randomized, placebo-controlled trials examining the efficacy of…

  18. Validation of an Interview-Based Rating Scale Developed in Japan for Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Ito, Hiroyuki; Tani, Iori; Yukihiro, Ryoji; Adachi, Jun; Hara, Koichi; Ogasawara, Megumi; Inoue, Masahiko; Kamio, Yoko; Nakamura, Kazuhiko; Uchiyama, Tokio; Ichikawa, Hironobu; Sugiyama, Toshiro; Hagiwara, Taku; Tsujii, Masatsugu

    2012-01-01

    The pervasive developmental disorders (PDDs) Autism Society Japan Rating Scale (PARS), an interview-based instrument for evaluating PDDs, has been developed in Japan with the aim of providing a method that (1) can be used to evaluate PDD symptoms and related support needs and (2) is simpler and easier than the currently used "gold…

  19. Larger Brains in Medication Naive High-Functioning Subjects with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Palmen, Saskia J. M. C.; Pol, Hilleke E. Hulshoff; Kemner, Chantal; Schnack, Hugo G.; Janssen, Joost; Kahn, Rene S.; van Engeland, Herman

    2004-01-01

    Background: Are brain volumes of individuals with Pervasive Developmental Disorder (PDD) still enlarged in adolescence and adulthood, and if so, is this enlargement confined to the gray and/or the white matter and is it global or more prominent in specific brain regions. Methods: Brain MRI scans were made of 21 adolescents with PDD and 21 closely…

  20. Microswitch- and VOCA-Assisted Programs for Two Post-Coma Persons with Minimally Conscious State and Pervasive Motor Disabilities

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Buonocunto, Francesca; Sacco, Valentina; Colonna, Fabio; Navarro, Jorge; Oliva, Doretta; Signorino, Mario; Megna, Gianfranco

    2009-01-01

    Intervention programs, based on learning principles and assistive technology, were assessed in two studies with two post-coma men with minimally conscious state and pervasive motor disabilities. Study I assessed a program that included (a) an optic microswitch, activated via double blinking, which allowed a man direct access to brief music…

  1. An Examination of Specific Child Behavior Problems as Predictors of Parenting Stress among Families of Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Davis, Allyson L.; Neece, Cameron L.

    2017-01-01

    Introduction: Studies have shown that parents of children with pervasive developmental disorders (PDD) exhibit higher levels of stress than parents of typically developing children or children with other types of developmental delays (DD). This relationship appears to be mediated by elevated levels of behavior problems observed in children with…

  2. Electronic Computer Aided Design. Its Application in FE.

    ERIC Educational Resources Information Center

    Further Education Unit, London (England).

    A study was conducted at the Electronics Industrial Unit at the Dorset Institute of Higher Education to investigate the feasibility of incorporating computer-aided design (CAD) in electrical and electronic courses. The aim was to investigate the application of CAD to electrical and electronic systems; the extent to which industrial developments…

  3. Multi-Functional UV-Visible-IR Nanosensors Devices and Structures

    DTIC Science & Technology

    2015-04-29

    Dual-Gate MOSFET System, Proceedings of the International Workshop on Computational Electronics, Nara, Japan, Society of Micro- and Nanoelectronics ...International Workshop on Computational Electronics, Nara, Japan, Society of Micro- and Nanoelectronics , 216-217 (2013); ISBN 978-3-901578-26-7 M. S...Raman Spectroscopy, Proceedings of the International Workshop on Computational Electronics, Nara, Japan, Society of Micro- and Nanoelectronics , 198

  4. Computer simulation of electron flow in linear-beam microwave tubes

    NASA Astrophysics Data System (ADS)

    Kumar, Lalit

    1990-12-01

    The computer simulation of electron flow in linear-beam microwave tubes, such as a travelling-wave tube (TWT) and klystron, is used for designing and optimising the electron gun and collector and for analysing the large-signal beam-wave interaction phenomenon. Major aspects of simulation of electron flow in static and rf fields present in such tubes are discussed. Some advancements made in this respect and results obtained from computer programs developed by the research group at CEERI for a gridded electron gun, depressed collector, and large-signal analysis of TWT and klystron are presented.

  5. Electronics Environmental Benefits Calculator

    EPA Pesticide Factsheets

    The Electronics Environmental Benefits Calculator (EEBC) was developed to assist organizations in estimating the environmental benefits of greening their purchase, use and disposal of electronics.The EEBC estimates the environmental and economic benefits of: Purchasing Electronic Product Environmental Assessment Tool (EPEAT)-registered products; Enabling power management features on computers and monitors above default percentages; Extending the life of equipment beyond baseline values; Reusing computers, monitors and cell phones; and Recycling computers, monitors, cell phones and loads of mixed electronic products.The EEBC may be downloaded as a Microsoft Excel spreadsheet.See https://www.federalelectronicschallenge.net/resources/bencalc.htm for more details.

  6. National electronic medical records integration on cloud computing system.

    PubMed

    Mirza, Hebah; El-Masri, Samir

    2013-01-01

    Few Healthcare providers have an advanced level of Electronic Medical Record (EMR) adoption. Others have a low level and most have no EMR at all. Cloud computing technology is a new emerging technology that has been used in other industry and showed a great success. Despite the great features of Cloud computing, they haven't been utilized fairly yet in healthcare industry. This study presents an innovative Healthcare Cloud Computing system for Integrating Electronic Health Record (EHR). The proposed Cloud system applies the Cloud Computing technology on EHR system, to present a comprehensive EHR integrated environment.

  7. Smartphone as a personal, pervasive health informatics services platform: literature review.

    PubMed

    Wac, K

    2012-01-01

    The article provides an overview of current trends in personal sensor, signal and imaging informatics, that are based on emerging mobile computing and communications technologies enclosed in a smartphone and enabling the provision of personal, pervasive health informatics services. The article reviews examples of these trends from the PubMed and Google scholar literature search engines, which, by no means claim to be complete, as the field is evolving and some recent advances may not be documented yet. There exist critical technological advances in the surveyed smartphone technologies, employed in provision and improvement of diagnosis, acute and chronic treatment and rehabilitation health services, as well as in education and training of healthcare practitioners. However, the most emerging trend relates to a routine application of these technologies in a prevention/wellness sector, helping its users in self-care to stay healthy. Smartphone-based personal health informatics services exist, but still have a long way to go to become an everyday, personalized healthcare-provisioning tool in the medical field and in a clinical practice. Key main challenge for their widespread adoption involve lack of user acceptance striving from variable credibility and reliability of applications and solutions as they a) lack evidence- based approach; b) have low levels of medical professional involvement in their design and content; c) are provided in an unreliable way, influencing negatively its usability; and, in some cases, d) being industry-driven, hence exposing bias in information provided, for example towards particular types of treatment or intervention procedures.

  8. Are Microbial Nanowires Responsible for Geoelectrical Changes at Hydrocarbon Contaminated Sites?

    NASA Astrophysics Data System (ADS)

    Hager, C.; Atekwana, E. A.; Gorby, Y. A.; Duris, J. W.; Allen, J. P.; Atekwana, E. A.; Ownby, C.; Rossbach, S.

    2007-05-01

    Significant advances in near-surface geophysics and biogeophysics in particular, have clearly established a link between geoelectrical response and the growth and enzymatic activities of microbes in geologic media. Recent studies from hydrocarbon contaminated sites suggest that the activities of distinct microbial populations, specifically syntrophic, sulfate reducing, and dissimilatory iron reducing microbial populations are a contributing factor to elevated sediment conductivity. However, a fundamental mechanistic understanding of the processes and sources resulting in the measured electrical response remains uncertain. The recent discovery of bacterial nanowires and their electron transport capabilities suggest that if bacterial nanowires permeate the subsurface, they may in part be responsible for the anomalous conductivity response. In this study we investigated the microbial population structure, the presence of nanowires, and microbial-induced alterations of a hydrocarbon contaminated environment and relate them to the sediments' geoelectrical response. Our results show that microbial communities varied substantially along the vertical gradient and at depths where hydrocarbons saturated the sediments, ribosomal intergenic spacer analysis (RISA) revealed signatures of microbial communities adapted to hydrocarbon impact. In contrast, RISA profiles from a background location showed little community variations with depth. While all sites showed evidence of microbial activity, a scanning electron microscope (SEM) study of sediment from the contaminated location showed pervasive development of "nanowire-like structures" with morphologies consistent with nanowires from laboratory experiments. SEM analysis suggests extensive alteration of the sediments by microbial Activity. We conclude that, excess organic carbon (electron donor) but limited electron acceptors in these environments cause microorganisms to produce nanowires to shuttle the electrons as they seek for distant electron acceptors. Hence, electron flow via bacterial nanowires may contribute to the geoelectrical response.

  9. Key Lessons in Building "Data Commons": The Open Science Data Cloud Ecosystem

    NASA Astrophysics Data System (ADS)

    Patterson, M.; Grossman, R.; Heath, A.; Murphy, M.; Wells, W.

    2015-12-01

    Cloud computing technology has created a shift around data and data analysis by allowing researchers to push computation to data as opposed to having to pull data to an individual researcher's computer. Subsequently, cloud-based resources can provide unique opportunities to capture computing environments used both to access raw data in its original form and also to create analysis products which may be the source of data for tables and figures presented in research publications. Since 2008, the Open Cloud Consortium (OCC) has operated the Open Science Data Cloud (OSDC), which provides scientific researchers with computational resources for storing, sharing, and analyzing large (terabyte and petabyte-scale) scientific datasets. OSDC has provided compute and storage services to over 750 researchers in a wide variety of data intensive disciplines. Recently, internal users have logged about 2 million core hours each month. The OSDC also serves the research community by colocating these resources with access to nearly a petabyte of public scientific datasets in a variety of fields also accessible for download externally by the public. In our experience operating these resources, researchers are well served by "data commons," meaning cyberinfrastructure that colocates data archives, computing, and storage infrastructure and supports essential tools and services for working with scientific data. In addition to the OSDC public data commons, the OCC operates a data commons in collaboration with NASA and is developing a data commons for NOAA datasets. As cloud-based infrastructures for distributing and computing over data become more pervasive, we ask, "What does it mean to publish data in a data commons?" Here we present the OSDC perspective and discuss several services that are key in architecting data commons, including digital identifier services.

  10. Low cost, high performance processing of single particle cryo-electron microscopy data in the cloud.

    PubMed

    Cianfrocco, Michael A; Leschziner, Andres E

    2015-05-08

    The advent of a new generation of electron microscopes and direct electron detectors has realized the potential of single particle cryo-electron microscopy (cryo-EM) as a technique to generate high-resolution structures. Calculating these structures requires high performance computing clusters, a resource that may be limiting to many likely cryo-EM users. To address this limitation and facilitate the spread of cryo-EM, we developed a publicly available 'off-the-shelf' computing environment on Amazon's elastic cloud computing infrastructure. This environment provides users with single particle cryo-EM software packages and the ability to create computing clusters with 16-480+ CPUs. We tested our computing environment using a publicly available 80S yeast ribosome dataset and estimate that laboratories could determine high-resolution cryo-EM structures for $50 to $1500 per structure within a timeframe comparable to local clusters. Our analysis shows that Amazon's cloud computing environment may offer a viable computing environment for cryo-EM.

  11. Progress in Computational Electron-Molecule Collisions

    NASA Astrophysics Data System (ADS)

    Rescigno, Tn

    1997-10-01

    The past few years have witnessed tremendous progress in the development of sophisticated ab initio methods for treating collisions of slow electrons with isolated small molecules. Researchers in this area have benefited greatly from advances in computer technology; indeed, the advent of parallel computers has made it possible to carry out calculations at a level of sophistication inconceivable a decade ago. But bigger and faster computers are only part of the picture. Even with today's computers, the practical need to study electron collisions with the kinds of complex molecules and fragments encountered in real-world plasma processing environments is taxing present methods beyond their current capabilities. Since extrapolation of existing methods to handle increasingly larger targets will ultimately fail as it would require computational resources beyond any imagined, continued progress must also be linked to new theoretical developments. Some of the techniques recently introduced to address these problems will be discussed and illustrated with examples of electron-molecule collision calculations we have carried out on some fairly complex target gases encountered in processing plasmas. Electron-molecule scattering continues to pose many formidable theoretical and computational challenges. I will touch on some of the outstanding open questions.

  12. Have Computer, Will Not Travel: Meeting Electronically.

    ERIC Educational Resources Information Center

    Kurland, Norman D.

    1983-01-01

    Beginning with two different scenarios depicting a face-to-face conference on the one hand and, on the other, a computer or electronic conference, the author argues the advantages of electronic conferencing and describes some of its uses. (JBM)

  13. Two-body Schrödinger wave functions in a plane-wave basis via separation of dimensions

    NASA Astrophysics Data System (ADS)

    Jerke, Jonathan; Poirier, Bill

    2018-03-01

    Using a combination of ideas, the ground and several excited electronic states of the helium atom and the hydrogen molecule are computed to chemical accuracy—i.e., to within 1-2 mhartree or better. The basic strategy is very different from the standard electronic structure approach in that the full two-electron six-dimensional (6D) problem is tackled directly, rather than starting from a single-electron Hartree-Fock approximation. Electron correlation is thus treated exactly, even though computational requirements remain modest. The method also allows for exact wave functions to be computed, as well as energy levels. From the full-dimensional 6D wave functions computed here, radial distribution functions and radial correlation functions are extracted—as well as a 2D probability density function exhibiting antisymmetry for a single Cartesian component. These calculations support a more recent interpretation of Hund's rule, which states that the lower energy of the higher spin-multiplicity states is actually due to reduced screening, rather than reduced electron-electron repulsion. Prospects for larger systems and/or electron dynamics applications appear promising.

  14. Two-body Schrödinger wave functions in a plane-wave basis via separation of dimensions.

    PubMed

    Jerke, Jonathan; Poirier, Bill

    2018-03-14

    Using a combination of ideas, the ground and several excited electronic states of the helium atom and the hydrogen molecule are computed to chemical accuracy-i.e., to within 1-2 mhartree or better. The basic strategy is very different from the standard electronic structure approach in that the full two-electron six-dimensional (6D) problem is tackled directly, rather than starting from a single-electron Hartree-Fock approximation. Electron correlation is thus treated exactly, even though computational requirements remain modest. The method also allows for exact wave functions to be computed, as well as energy levels. From the full-dimensional 6D wave functions computed here, radial distribution functions and radial correlation functions are extracted-as well as a 2D probability density function exhibiting antisymmetry for a single Cartesian component. These calculations support a more recent interpretation of Hund's rule, which states that the lower energy of the higher spin-multiplicity states is actually due to reduced screening, rather than reduced electron-electron repulsion. Prospects for larger systems and/or electron dynamics applications appear promising.

  15. The 3d International Workshop on Computational Electronics

    NASA Astrophysics Data System (ADS)

    Goodnick, Stephen M.

    1994-09-01

    The Third International Workshop on Computational Electronics (IWCE) was held at the Benson Hotel in downtown Portland, Oregon, on May 18, 19, and 20, 1994. The workshop was devoted to a broad range of topics in computational electronics related to the simulation of electronic transport in semiconductors and semiconductor devices, particularly those which use large computational resources. The workshop was supported by the National Science Foundation (NSF), the Office of Naval Research and the Army Research Office, as well as local support from the Oregon Joint Graduate Schools of Engineering and the Oregon Center for Advanced Technology Education. There were over 100 participants in the Portland workshop, of which more than one quarter represented research groups outside of the United States from Austria, Canada, France, Germany, Italy, Japan, Switzerland, and the United Kingdom. There were a total 81 papers presented at the workshop, 9 invited talks, 26 oral presentations and 46 poster presentations. The emphasis of the contributions reflected the interdisciplinary nature of computational electronics with researchers from the Chemistry, Computer Science, Mathematics, Engineering, and Physics communities participating in the workshop.

  16. Department of Defense Office of the Inspector General FY 2013 Audit Plan

    DTIC Science & Technology

    2012-11-01

    oversight procedures to review KPMG LLPs work; and if applicable disclose instances where KPMG LLP does not comply, in all material respects, with U.S...decisions. Pervasive material internal control weaknesses impact the accuracy, reliability and timeliness of budgetary and accounting data and...reported the same 13 material internal control weaknesses as in the previous year. These pervasive and longstanding financial management challenges

  17. Response to 'pervasive sequence patents cover the entire human genome' - authors' reply.

    PubMed

    Rosenfeld, Jeffrey; Mason, Christopher

    2014-01-01

    An author reply to the Letter to the Editor from Tu et al. regarding Pervasive sequence patents cover the entire human genome by J Rosenfeld and C Mason. Genome Med 2013, 5:27. See related Correspondence by Rosenfeld and Mason, http://genomemedicine.com/content/5/3/27, and related letter by Tu et al., http://genomemedicine.com/content/6/2/14.

  18. Cognitive Profiles of Adults with Asperger's Disorder, High-Functioning Autism, and Pervasive Developmental Disorder Not Otherwise Specified Based on the WAIS-III

    ERIC Educational Resources Information Center

    Kanai, Chieko; Tani, Masayuki; Hashimoto, Ryuichiro; Yamada, Takashi; Ota, Haruhisa; Watanabe, Hiromi; Iwanami, Akira; Kato, Nobumasa

    2012-01-01

    Little is known about the cognitive profiles of high-functioning Pervasive Developmental Disorders (PDD) in adults based on the Wechsler Intelligence Scale III (WAIS-III). We examined cognitive profiles of adults with no intellectual disability (IQ greater than 70), and in adults with Asperger's disorder (AS; n = 47), high-functioning autism (HFA;…

  19. Behavior Change in a Student with a Dual Diagnosis of Deafness and Pervasive Development Disorder: A Case Study

    ERIC Educational Resources Information Center

    Easterbrooks, S. R.; Handley, C. M.

    2005-01-01

    The broad term "pervasive developmental disorder" (PPD) describes a set of symptoms that occur along a continuum of severity; these symptoms are often referred to as "autism spectrum disorders" (ASDs). Little is known about the incidence and prevalence of ASDs among students who are deaf or hard of hearing (DHH). Teachers of DHH students, who must…

  20. Learning, Engagement, and Technology: Middle School Students' Three-Year Experience in Pervasive Technology Environments in South Korea

    ERIC Educational Resources Information Center

    Hur, Jung Won; Oh, Jaekyeon

    2012-01-01

    This study explored an initiative that created a pervasive learning environment in a middle school in South Korea and examined its impact on student academic achievement and learning engagement. Forty students received a laptop to use for class projects, online collaboration, and lesson reviews over a 3-year period. To measure the effect of laptop…

  1. Exploring the Boundaries of Pervasive Developmental Disorder Not Otherwise Specified: Analyses of Data from the DSM-IV Autistic Disorder Field Trial.

    ERIC Educational Resources Information Center

    Buitelaar, Jan K.; Van der Gaag, Rutger; Klin, Ami; Volkmar, Fred

    1999-01-01

    A study compared characteristics of individuals with mild retardation and clinically classified as autistic disorder (n=205), Pervasive Developmental Disorder Not Otherwise Specified (PDDNOS) (n=80), and other non-PDD disorders (n=174). Only a few items from the ICD-10 and DSM-IV discriminated the PDDNOS group from other disorders. Suggested…

  2. 76 FR 5973 - Privacy Act of 1974; Notice; Publication of the Systems of Records Managed by the Commodity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-02

    ...: Paper records are stored in file folders, binders, computer files (eLaw) and computer disks. Electronic records, including computer files, are stored on the Commission's network and other electronic media as... physical security measures. Technical security measures within CFTC include restrictions on computer access...

  3. QMachine: commodity supercomputing in web browsers.

    PubMed

    Wilkinson, Sean R; Almeida, Jonas S

    2014-06-09

    Ongoing advancements in cloud computing provide novel opportunities in scientific computing, especially for distributed workflows. Modern web browsers can now be used as high-performance workstations for querying, processing, and visualizing genomics' "Big Data" from sources like The Cancer Genome Atlas (TCGA) and the International Cancer Genome Consortium (ICGC) without local software installation or configuration. The design of QMachine (QM) was driven by the opportunity to use this pervasive computing model in the context of the Web of Linked Data in Biomedicine. QM is an open-sourced, publicly available web service that acts as a messaging system for posting tasks and retrieving results over HTTP. The illustrative application described here distributes the analyses of 20 Streptococcus pneumoniae genomes for shared suffixes. Because all analytical and data retrieval tasks are executed by volunteer machines, few server resources are required. Any modern web browser can submit those tasks and/or volunteer to execute them without installing any extra plugins or programs. A client library provides high-level distribution templates including MapReduce. This stark departure from the current reliance on expensive server hardware running "download and install" software has already gathered substantial community interest, as QM received more than 2.2 million API calls from 87 countries in 12 months. QM was found adequate to deliver the sort of scalable bioinformatics solutions that computation- and data-intensive workflows require. Paradoxically, the sandboxed execution of code by web browsers was also found to enable them, as compute nodes, to address critical privacy concerns that characterize biomedical environments.

  4. LabVIEW Serial Driver Software for an Electronic Load

    NASA Technical Reports Server (NTRS)

    Scullin, Vincent; Garcia, Christopher

    2003-01-01

    A LabVIEW-language computer program enables monitoring and control of a Transistor Devices, Inc., Dynaload WCL232 (or equivalent) electronic load via an RS-232 serial communication link between the electronic load and a remote personal computer. (The electronic load can operate at constant voltage, current, power consumption, or resistance.) The program generates a graphical user interface (GUI) at the computer that looks and acts like the front panel of the electronic load. Once the electronic load has been placed in remote-control mode, this program first queries the electronic load for the present values of all its operational and limit settings, and then drops into a cycle in which it reports the instantaneous voltage, current, and power values in displays that resemble those on the electronic load while monitoring the GUI images of pushbuttons for control actions by the user. By means of the pushbutton images and associated prompts, the user can perform such operations as changing limit values, the operating mode, or the set point. The benefit of this software is that it relieves the user of the need to learn one method for operating the electronic load locally and another method for operating it remotely via a personal computer.

  5. AIR TOXICS EMISSIONS FROM ELECTRONICS INCINERATION

    EPA Science Inventory

    The purpose of this project is to examine the emissions of air toxics from the combustion of electronics equipment, primarily personal computer components. Due to a shortage of recycling programs for personal computers and other personal electronics equipment, most of these mate...

  6. A Crafts-Oriented Approach to Computing in High School: Introducing Computational Concepts, Practices, and Perspectives with Electronic Textiles

    ERIC Educational Resources Information Center

    Kafai, Yasmin B.; Lee, Eunkyoung; Searle, Kristin; Fields, Deborah; Kaplan, Eliot; Lui, Debora

    2014-01-01

    In this article, we examine the use of electronic textiles (e-textiles) for introducing key computational concepts and practices while broadening perceptions about computing. The starting point of our work was the design and implementation of a curriculum module using the LilyPad Arduino in a pre-AP high school computer science class. To…

  7. Location Privacy in RFID Applications

    NASA Astrophysics Data System (ADS)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  8. Creating a Software Framework for Simulating Satellite Geolocation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Koch, Daniel B

    2011-01-01

    It is hard to imagine life these days without having some sort of electronic indication of one's current location. Whether the purpose is for business, personal, or emergency use, utilizing smart cell phones, in-vehicle navigation systems, or location beacons, dependence on the Global Positioning System (GPS) is pervasive. Yet the availability of the GPS should not be taken for granted. Both environmental (e.g., terrain, weather) and intentional interference (i.e., jamming) can reduce or deny satellite access. In order to investigate these and other issues, as well as to explore possible alternative satellite constellations, an application called the Satellite Simulation Toolkitmore » (SatSim) was created. This paper presents a high-level overview of SatSim and an example of how it may be used to study geolocation.« less

  9. Building a Terabyte Memory Bandwidth Compute Node with Four Consumer Electronics GPUs

    NASA Astrophysics Data System (ADS)

    Omlin, Samuel; Räss, Ludovic; Podladchikov, Yuri

    2014-05-01

    GPUs released for consumer electronics are generally built with the same chip architectures as the GPUs released for professional usage. With regards to scientific computing, there are no obvious important differences in functionality or performance between the two types of releases, yet the price can differ up to one order of magnitude. For example, the consumer electronics release of the most recent NVIDIA Kepler architecture (GK110), named GeForce GTX TITAN, performed equally well in conducted memory bandwidth tests as the professional release, named Tesla K20; the consumer electronics release costs about one third of the professional release. We explain how to design and assemble a well adjusted computer with four high-end consumer electronics GPUs (GeForce GTX TITAN) combining more than 1 terabyte/s memory bandwidth. We compare the system's performance and precision with the one of hardware released for professional usage. The system can be used as a powerful workstation for scientific computing or as a compute node in a home-built GPU cluster.

  10. Measuring exposure to pro- and anti-tobacco marketing among adolescents: intercorrelations among measures and associations with smoking status.

    PubMed

    Unger, J B; Cruz, T B; Schuster, D; Flora, J A; Johnson, C A

    2001-01-01

    Exposure to tobacco-related marketing has been implicated as one of the risk factors for tobacco use among adolescents. However, tobacco-related marketing exposure has been measured in different ways in different studies, including perceived pervasiveness, receptivity, recognition, recall, and affect. It is not known whether these measures represent one or more underlying constructs and how these underlying constructs are associated with adolescent smoking status. This study analyzed data from 5,870 eighth-grade students in California, collected in 1996-1997 as part of the Independent Evaluation of the California Tobacco Control, Prevention, and Education Program. An exploratory factor analysis of multiple measures of tobacco-related marketing exposure revealed four distinct factors: perceived pervasiveness of protobacco marketing, perceived pervasiveness of antitobacco marketing, recognition of specific anti-tobacco advertisements, and receptivity to protobacco marketing. Receptivity to pro-tobacco marketing showed the strongest association with smoking status; higher levels of receptivity were associated with higher levels of smoking. Two measures of exposure to anti-tobacco marketing (perceived pervasiveness of anti-tobacco marketing and recognition of specific anti-tobacco ads) were highest among established smokers and lowest among susceptible nonsmokers. The same pattern was evident for perceived pervasiveness of pro-tobacco marketing. Results suggest that exposure to tobacco-related marketing is a multidimensional construct, and each dimension may have a unique contribution to the process of smoking initiation. Because adolescents are exposed to numerous pro- and anti-tobacco messages, it is important to develop anti-tobacco media campaigns that can successfully counter pro-tobacco marketing efforts. Potential strategies include targeting the susceptible nonsmokers who are at high risk for smoking and developing messages to decrease receptivity.

  11. Termination factor Rho: From the control of pervasive transcription to cell fate determination in Bacillus subtilis

    PubMed Central

    Nicolas, Pierre; Repoila, Francis; Bardowski, Jacek; Aymerich, Stéphane

    2017-01-01

    In eukaryotes, RNA species originating from pervasive transcription are regulators of various cellular processes, from the expression of individual genes to the control of cellular development and oncogenesis. In prokaryotes, the function of pervasive transcription and its output on cell physiology is still unknown. Most bacteria possess termination factor Rho, which represses pervasive, mostly antisense, transcription. Here, we investigate the biological significance of Rho-controlled transcription in the Gram-positive model bacterium Bacillus subtilis. Rho inactivation strongly affected gene expression in B. subtilis, as assessed by transcriptome and proteome analysis of a rho–null mutant during exponential growth in rich medium. Subsequent physiological analyses demonstrated that a considerable part of Rho-controlled transcription is connected to balanced regulation of three mutually exclusive differentiation programs: cell motility, biofilm formation, and sporulation. In the absence of Rho, several up-regulated sense and antisense transcripts affect key structural and regulatory elements of these differentiation programs, thereby suppressing motility and biofilm formation and stimulating sporulation. We dissected how Rho is involved in the activity of the cell fate decision-making network, centered on the master regulator Spo0A. We also revealed a novel regulatory mechanism of Spo0A activation through Rho-dependent intragenic transcription termination of the protein kinase kinB gene. Altogether, our findings indicate that distinct Rho-controlled transcripts are functional and constitute a previously unknown built-in module for the control of cell differentiation in B. subtilis. In a broader context, our results highlight the recruitment of the termination factor Rho, for which the conserved biological role is probably to repress pervasive transcription, in highly integrated, bacterium-specific, regulatory networks. PMID:28723971

  12. 78 FR 57884 - Recent Trends in U.S. Services Trade, 2014 Annual Report

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-20

    ... on electronic services (audiovisual, computer, and telecommunication services). The Commission is... (audiovisual, computer, and telecommunication services). Under Commission investigation No. 332-345, the... 2014 report will focus on trade in electronic services (audiovisual, computer, and telecommunication...

  13. Electronic Circuit Analysis Language (ECAL)

    NASA Astrophysics Data System (ADS)

    Chenghang, C.

    1983-03-01

    The computer aided design technique is an important development in computer applications and it is an important component of computer science. The special language for electronic circuit analysis is the foundation of computer aided design or computer aided circuit analysis (abbreviated as CACD and CACA) of simulated circuits. Electronic circuit analysis language (ECAL) is a comparatively simple and easy to use circuit analysis special language which uses the FORTRAN language to carry out the explanatory executions. It is capable of conducting dc analysis, ac analysis, and transient analysis of a circuit. Futhermore, the results of the dc analysis can be used directly as the initial conditions for the ac and transient analyses.

  14. A computational perspective on autism

    PubMed Central

    Rosenberg, Ari; Patterson, Jaclyn Sky; Angelaki, Dora E.

    2015-01-01

    Autism is a neurodevelopmental disorder that manifests as a heterogeneous set of social, cognitive, motor, and perceptual symptoms. This system-wide pervasiveness suggests that, rather than narrowly impacting individual systems such as affection or vision, autism may broadly alter neural computation. Here, we propose that alterations in nonlinear, canonical computations occurring throughout the brain may underlie the behavioral characteristics of autism. One such computation, called divisive normalization, balances a neuron’s net excitation with inhibition reflecting the overall activity of the neuronal population. Through neural network simulations, we investigate how alterations in divisive normalization may give rise to autism symptomatology. Our findings show that a reduction in the amount of inhibition that occurs through divisive normalization can account for perceptual consequences of autism, consistent with the hypothesis of an increased ratio of neural excitation to inhibition (E/I) in the disorder. These results thus establish a bridge between an E/I imbalance and behavioral data on autism that is currently absent. Interestingly, our findings implicate the context-dependent, neuronal milieu as a key factor in autism symptomatology, with autism reflecting a less “social” neuronal population. Through a broader discussion of perceptual data, we further examine how altered divisive normalization may contribute to a wide array of the disorder’s behavioral consequences. These analyses show how a computational framework can provide insights into the neural basis of autism and facilitate the generation of falsifiable hypotheses. A computational perspective on autism may help resolve debates within the field and aid in identifying physiological pathways to target in the treatment of the disorder. PMID:26170299

  15. Development of a Screening Scale for High-Functioning Pervasive Developmental Disorders Using the Tokyo Child Development Schedule and Tokyo Autistic Behavior Scale

    ERIC Educational Resources Information Center

    Suzuki, Mayo; Tachimori, Hisateru; Saito, Mari; Koyama, Tomonori; Kurita, Hiroshi

    2011-01-01

    This study aimed to compile a screening scale for high-functioning pervasive developmental disorders (PDD), using the Tokyo Child Development Schedule (TCDS) and Tokyo Autistic Behavior Scale (TABS). The 72 participants (IQ greater than or equal to 70) were divided into 3 groups after IQ matching depending on their diagnoses: i.e., PDD,…

  16. The Usefulness of the Revised Psychoeducational Profile for the Assessment of Preschool Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Portoghese, Claudia; Buttiglione, Maura; Pavone, Francesca; Lozito, Vito; De Giacomo, Andrea; Martinelli, Domenico; Margari, Lucia

    2009-01-01

    Data from the Psychoeducational Profile-Revised (PEP-R) were analysed in a sample of 46 children, aged from 1.7 to 5.11 years, of whom 21 had autistic disorder (AD) and 25 had pervasive developmental disorder not otherwise specified (PDD-NOS). Analysis with a t-test for independent samples revealed a significant difference (p less than 0.05)…

  17. Response to ‘pervasive sequence patents cover the entire human genome’ - authors’ reply

    PubMed Central

    2014-01-01

    An author reply to the Letter to the Editor from Tu et al. regarding Pervasive sequence patents cover the entire human genome by J Rosenfeld and C Mason. Genome Med 2013, 5:27. See related Correspondence by Rosenfeld and Mason, http://genomemedicine.com/content/5/3/27, and related letter by Tu et al., http://genomemedicine.com/content/6/2/14 PMID:24764495

  18. Is Long-Term Prognosis for Pervasive Developmental Disorder Not Otherwise Specified Different from Prognosis for Autistic Disorder? Findings from a 30-Year Follow-Up Study

    ERIC Educational Resources Information Center

    Mordre, Marianne; Groholt, Berit; Knudsen, Ann Kristin; Sponheim, Eili; Mykletun, Arnstein; Myhre, Anne Margrethe

    2012-01-01

    We followed 74 children with autistic disorder (AD) and 39 children with pervasive developmental disorder not otherwise specified (PDD NOS) for 17-38 years in a record linkage study. Rates of disability pension award, marital status, criminality and mortality were compared between groups. Disability pension award was the only outcome measure that…

  19. Antisense transcriptional interference mediates condition-specific gene repression in budding yeast.

    PubMed

    Nevers, Alicia; Doyen, Antonia; Malabat, Christophe; Néron, Bertrand; Kergrohen, Thomas; Jacquier, Alain; Badis, Gwenael

    2018-05-18

    Pervasive transcription generates many unstable non-coding transcripts in budding yeast. The transcription of such noncoding RNAs, in particular antisense RNAs (asRNAs), has been shown in a few examples to repress the expression of the associated mRNAs. Yet, such mechanism is not known to commonly contribute to the regulation of a given class of genes. Using a mutant context that stabilized pervasive transcripts, we observed that the least expressed mRNAs during the exponential phase were associated with high levels of asRNAs. These asRNAs also overlapped their corresponding gene promoters with a much higher frequency than average. Interrupting antisense transcription of a subset of genes corresponding to quiescence-enriched mRNAs restored their expression. The underlying mechanism acts in cis and involves several chromatin modifiers. Our results convey that transcription interference represses up to 30% of the 590 least expressed genes, which includes 163 genes with quiescence-enriched mRNAs. We also found that pervasive transcripts constitute a higher fraction of the transcriptome in quiescence relative to the exponential phase, consistent with gene expression itself playing an important role to suppress pervasive transcription. Accordingly, the HIS1 asRNA, normally only present in quiescence, is expressed in exponential phase upon HIS1 mRNA transcription interruption.

  20. Computer Music

    NASA Astrophysics Data System (ADS)

    Cook, Perry

    This chapter covers algorithms, technologies, computer languages, and systems for computer music. Computer music involves the application of computers and other digital/electronic technologies to music composition, performance, theory, history, and perception. The field combines digital signal processing, computational algorithms, computer languages, hardware and software systems, acoustics, psychoacoustics (low-level perception of sounds from the raw acoustic signal), and music cognition (higher-level perception of musical style, form, emotion, etc.). Although most people would think that analog synthesizers and electronic music substantially predate the use of computers in music, many experiments and complete computer music systems were being constructed and used as early as the 1950s.

  1. Computational Study of Primary Electrons in the Cusp Region of an Ion Engine's Discharge Chamber

    NASA Technical Reports Server (NTRS)

    Stueber, Thomas J. (Technical Monitor); Deshpande, Shirin S.; Mahalingam, Sudhakar; Menart, James A.

    2004-01-01

    In this work a computer code called PRIMA is used to study the motion of primary electrons in the magnetic cusp region of the discharge chamber of an ion engine. Even though the amount of wall area covered by the cusps is very small, the cusp regions are important because prior computational analyses have indicated that most primary electrons leave the discharge chamber through the cusps. The analysis presented here focuses on the cusp region only. The affects of the shape and size of the cusp region on primary electron travel are studied as well as the angle and location at which the electron enters the cusp region. These affects are quantified using the confinement length and the number density distributions of the primary electrons. In addition to these results comparisons of the results from PRIMA are made to experimental results for a cylindrical discharge chamber with two magnetic rings. These comparisons indicate the validity of the computer code called PRIMA.

  2. Computer Series, 98. Electronics for Scientists: A Computer-Intensive Approach.

    ERIC Educational Resources Information Center

    Scheeline, Alexander; Mork, Brian J.

    1988-01-01

    Reports the design for a principles-before-details presentation of electronics for an instrumental analysis class. Uses computers for data collection and simulations. Requires one semester with two 2.5-hour periods and two lectures per week. Includes lab and lecture syllabi. (MVL)

  3. Computational Nanotechnology Molecular Electronics, Materials and Machines

    NASA Technical Reports Server (NTRS)

    Srivastava, Deepak; Biegel, Bryan A. (Technical Monitor)

    2002-01-01

    This presentation covers research being performed on computational nanotechnology, carbon nanotubes and fullerenes at the NASA Ames Research Center. Topics cover include: nanomechanics of nanomaterials, nanotubes and composite materials, molecular electronics with nanotube junctions, kinky chemistry, and nanotechnology for solid-state quantum computers using fullerenes.

  4. The Electronic Supervisor: New Technology, New Tensions.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Office of Technology Assessment.

    Computer technology has made it possible for employers to collect and analyze management information about employees' work performance and equipment use. There are three main tools for supervising office activities. Computer-based (electronic) monitoring systems automatically record statistics about the work of employees using computer or…

  5. ELECTRONIC DIGITAL COMPUTER

    DOEpatents

    Stone, J.J. Jr.; Bettis, E.S.; Mann, E.R.

    1957-10-01

    The electronic digital computer is designed to solve systems involving a plurality of simultaneous linear equations. The computer can solve a system which converges rather rapidly when using Von Seidel's method of approximation and performs the summations required for solving for the unknown terms by a method of successive approximations.

  6. Low cost, high performance processing of single particle cryo-electron microscopy data in the cloud

    PubMed Central

    Cianfrocco, Michael A; Leschziner, Andres E

    2015-01-01

    The advent of a new generation of electron microscopes and direct electron detectors has realized the potential of single particle cryo-electron microscopy (cryo-EM) as a technique to generate high-resolution structures. Calculating these structures requires high performance computing clusters, a resource that may be limiting to many likely cryo-EM users. To address this limitation and facilitate the spread of cryo-EM, we developed a publicly available ‘off-the-shelf’ computing environment on Amazon's elastic cloud computing infrastructure. This environment provides users with single particle cryo-EM software packages and the ability to create computing clusters with 16–480+ CPUs. We tested our computing environment using a publicly available 80S yeast ribosome dataset and estimate that laboratories could determine high-resolution cryo-EM structures for $50 to $1500 per structure within a timeframe comparable to local clusters. Our analysis shows that Amazon's cloud computing environment may offer a viable computing environment for cryo-EM. DOI: http://dx.doi.org/10.7554/eLife.06664.001 PMID:25955969

  7. Historical perspective on computer development and glossary of terms.

    PubMed

    Honeyman, J C; Dwyer, S J

    1993-01-01

    This article contains a concise history of the development of mechanical and electronic computers, descriptions of the milestones in software development, discussion of the introduction and adoption of computers in radiology, and a glossary of computer terms used frequently in radiology. One of the earliest devices designed to mechanize calculations was the calculating clock, built in 1623. The first programmable electronic computer, the ENIAC (electronic numerical integration and computer), was completed in 1945 at the University of Pennsylvania. Software has developed from early machine language through fourth-generation languages and graphic user interfaces used today. The computer was introduced to radiology initially in the 1960s in nuclear medicine and is now incorporated in many digital imaging modalities throughout radiology. The development of picture archiving and communication systems has resulted in the implementation of several totally digital departments of radiology.

  8. Seeing Science through Symmetry

    NASA Astrophysics Data System (ADS)

    Gould, L. I.

    Seeing Through Symmetry is a course that introduces non-science majors to the pervasive influence of symmetry in science. The concept of symmetry is usedboth as a link between subjects (such as physics, biology, mathematics, music, poetry, and art) and as a method within a subject. This is done through the development and use of interactive multimedia learning environments to stimulate learning. Computer-based labs enable the student to further explore the concept by being gently led from the arts to science. This talk is an update that includes some of the latest changes to the course. Explanations are given on methodology and how a variety of interactive multimedia tools contribute to both the lecture and lab portion of the course (created in 1991 and taught almost every semester since then, including one in Sweden).

  9. Scalable Prediction of Energy Consumption using Incremental Time Series Clustering

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Simmhan, Yogesh; Noor, Muhammad Usman

    2013-10-09

    Time series datasets are a canonical form of high velocity Big Data, and often generated by pervasive sensors, such as found in smart infrastructure. Performing predictive analytics on time series data can be computationally complex, and requires approximation techniques. In this paper, we motivate this problem using a real application from the smart grid domain. We propose an incremental clustering technique, along with a novel affinity score for determining cluster similarity, which help reduce the prediction error for cumulative time series within a cluster. We evaluate this technique, along with optimizations, using real datasets from smart meters, totaling ~700,000 datamore » points, and show the efficacy of our techniques in improving the prediction error of time series data within polynomial time.« less

  10. A perspective on intelligent devices and environments in medical rehabilitation.

    PubMed

    Cooper, Rory A; Dicianno, Brad E; Brewer, Bambi; LoPresti, Edmund; Ding, Dan; Simpson, Richard; Grindle, Garrett; Wang, Hongwu

    2008-12-01

    Globally, the number of people older than 65 years is anticipated to double between 1997 and 2025, while at the same time the number of people with disabilities is growing at a similar rate, which makes technical advances and social policies critical to attain, prolong, and preserve quality of life. Recent advancements in technology, including computation, robotics, machine learning, communication, and miniaturization of sensors have been used primarily in manufacturing, military, space exploration, and entertainment. However, few efforts have been made to utilize these technologies to enhance the quality of life of people with disabilities. This article offers a perspective of future development in seven emerging areas: translation of research into clinical practice, pervasive assistive technology, cognitive assistive technologies, rehabilitation monitoring and coaching technologies, robotic assisted therapy, and personal mobility and manipulation technology.

  11. Nonlinear Solver Approaches for the Diffusive Wave Approximation to the Shallow Water Equations

    NASA Astrophysics Data System (ADS)

    Collier, N.; Knepley, M.

    2015-12-01

    The diffusive wave approximation to the shallow water equations (DSW) is a doubly-degenerate, nonlinear, parabolic partial differential equation used to model overland flows. Despite its challenges, the DSW equation has been extensively used to model the overland flow component of various integrated surface/subsurface models. The equation's complications become increasingly problematic when ponding occurs, a feature which becomes pervasive when solving on large domains with realistic terrain. In this talk I discuss the various forms and regularizations of the DSW equation and highlight their effect on the solvability of the nonlinear system. In addition to this analysis, I present results of a numerical study which tests the applicability of a class of composable nonlinear algebraic solvers recently added to the Portable, Extensible, Toolkit for Scientific Computation (PETSc).

  12. Pervasive Home Environments

    NASA Astrophysics Data System (ADS)

    Bull, P.; Limb, R.; Payne, R.

    An increasing number of computers and other equipment, such as games consoles and multimedia appliances for the home, have networking capability. The rapid growth of broadband in the home is also fuelling the demand for people to network their homes. In the near future we will see a number of market sectors trying to 'own' the home by providing gateways either from the traditional ISP or from games and other service providers. The consumer is bombarded with attractive advertising to acquire the latest technological advances, but is left with a plethora of different appliances, which have a bewildering range of requirements and features in terms of networking, user interface, and higher-level communications protocols. In many cases, these are proprietary, preventing interworking. Such technical and usability anarchy confuses the consumer and could ultimately suppress market adoption.

  13. Adaptive distributed outlier detection for WSNs.

    PubMed

    De Paola, Alessandra; Gaglio, Salvatore; Lo Re, Giuseppe; Milazzo, Fabrizio; Ortolani, Marco

    2015-05-01

    The paradigm of pervasive computing is gaining more and more attention nowadays, thanks to the possibility of obtaining precise and continuous monitoring. Ease of deployment and adaptivity are typically implemented by adopting autonomous and cooperative sensory devices; however, for such systems to be of any practical use, reliability and fault tolerance must be guaranteed, for instance by detecting corrupted readings amidst the huge amount of gathered sensory data. This paper proposes an adaptive distributed Bayesian approach for detecting outliers in data collected by a wireless sensor network; our algorithm aims at optimizing classification accuracy, time complexity and communication complexity, and also considering externally imposed constraints on such conflicting goals. The performed experimental evaluation showed that our approach is able to improve the considered metrics for latency and energy consumption, with limited impact on classification accuracy.

  14. Mining Personal Data Using Smartphones and Wearable Devices: A Survey

    PubMed Central

    Rehman, Muhammad Habib ur; Liew, Chee Sun; Wah, Teh Ying; Shuja, Junaid; Daghighi, Babak

    2015-01-01

    The staggering growth in smartphone and wearable device use has led to a massive scale generation of personal (user-specific) data. To explore, analyze, and extract useful information and knowledge from the deluge of personal data, one has to leverage these devices as the data-mining platforms in ubiquitous, pervasive, and big data environments. This study presents the personal ecosystem where all computational resources, communication facilities, storage and knowledge management systems are available in user proximity. An extensive review on recent literature has been conducted and a detailed taxonomy is presented. The performance evaluation metrics and their empirical evidences are sorted out in this paper. Finally, we have highlighted some future research directions and potentially emerging application areas for personal data mining using smartphones and wearable devices. PMID:25688592

  15. NASA Tech Briefs, May 2000. Volume 24, No. 5

    NASA Technical Reports Server (NTRS)

    2000-01-01

    Topics include: Sensors: Test and Measurement; Computer-Aided Design and Engineering; Electronic Components and Circuits; Electronic Systems; Composites and Plastics; Materials; Computer Programs; Mechanics;

  16. Evolution and Control of 2219 Aluminum Microstructural Features through Electron Beam Freeform Fabrication

    NASA Technical Reports Server (NTRS)

    Taminger, Karen M.; Hafley, Robert A.; Domack, Marcia S.

    2006-01-01

    Electron beam freeform fabrication (EBF3) is a new layer-additive process that has been developed for near-net shape fabrication of complex structures. EBF3 uses an electron beam to create a molten pool on the surface of a substrate. Wire is fed into the molten pool and the part translated with respect to the beam to build up a 3-dimensional structure one layer at a time. Unlike many other freeform fabrication processes, the energy coupling of the electron beam is extremely well suited to processing of aluminum alloys. The layer-additive nature of the EBF3 process results in a tortuous thermal path producing complex microstructures including: small homogeneous equiaxed grains; dendritic growth contained within larger grains; and/or pervasive dendritic formation in the interpass regions of the deposits. Several process control variables contribute to the formation of these different microstructures, including translation speed, wire feed rate, beam current and accelerating voltage. In electron beam processing, higher accelerating voltages embed the energy deeper below the surface of the substrate. Two EBF3 systems have been established at NASA Langley, one with a low-voltage (10-30kV) and the other a high-voltage (30-60 kV) electron beam gun. Aluminum alloy 2219 was processed over a range of different variables to explore the design space and correlate the resultant microstructures with the processing parameters. This report is specifically exploring the impact of accelerating voltage. Of particular interest is correlating energy to the resultant material characteristics to determine the potential of achieving microstructural control through precise management of the heat flux and cooling rates during deposition.

  17. Efficient storage, computation, and exposure of computer-generated holograms by electron-beam lithography.

    PubMed

    Newman, D M; Hawley, R W; Goeckel, D L; Crawford, R D; Abraham, S; Gallagher, N C

    1993-05-10

    An efficient storage format was developed for computer-generated holograms for use in electron-beam lithography. This method employs run-length encoding and Lempel-Ziv-Welch compression and succeeds in exposing holograms that were previously infeasible owing to the hologram's tremendous pattern-data file size. These holograms also require significant computation; thus the algorithm was implemented on a parallel computer, which improved performance by 2 orders of magnitude. The decompression algorithm was integrated into the Cambridge electron-beam machine's front-end processor.Although this provides much-needed ability, some hardware enhancements will be required in the future to overcome inadequacies in the current front-end processor that result in a lengthy exposure time.

  18. Computational algorithm to evaluate product disassembly cost index

    NASA Astrophysics Data System (ADS)

    Zeid, Ibrahim; Gupta, Surendra M.

    2002-02-01

    Environmentally conscious manufacturing is an important paradigm in today's engineering practice. Disassembly is a crucial factor in implementing this paradigm. Disassembly allows the reuse and recycling of parts and products that reach their death after their life cycle ends. There are many questions that must be answered before a disassembly decision can be reached. The most important question is economical. The cost of disassembly versus the cost of scrapping a product is always considered. This paper develops a computational tool that allows decision-makers to calculate the disassembly cost of a product. The tool makes it simple to perform 'what if' scenarios fairly quickly. The tool is Web based and has two main parts. The front-end part is a Web page and runs on the client side in a Web browser, while the back-end part is a disassembly engine (servlet) that has disassembly knowledge and costing algorithms and runs on the server side. The tool is based on the client/server model that is pervasively utilized throughout the World Wide Web. An example is used to demonstrate the implementation and capabilities of the tool.

  19. The internet of things and the development of network technology in China

    NASA Astrophysics Data System (ADS)

    Wang, Ruxin; Zhao, Jianzhen; Ma, Hangtong

    2018-04-01

    The English name of the Internet of Things the Internet of Things, referred to as: the IOT. Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.

  20. Integrating Symbolic and Statistical Methods for Testing Intelligent Systems Applications to Machine Learning and Computer Vision

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jha, Sumit Kumar; Pullum, Laura L; Ramanathan, Arvind

    Embedded intelligent systems ranging from tiny im- plantable biomedical devices to large swarms of autonomous un- manned aerial systems are becoming pervasive in our daily lives. While we depend on the flawless functioning of such intelligent systems, and often take their behavioral correctness and safety for granted, it is notoriously difficult to generate test cases that expose subtle errors in the implementations of machine learning algorithms. Hence, the validation of intelligent systems is usually achieved by studying their behavior on representative data sets, using methods such as cross-validation and bootstrapping.In this paper, we present a new testing methodology for studyingmore » the correctness of intelligent systems. Our approach uses symbolic decision procedures coupled with statistical hypothesis testing to. We also use our algorithm to analyze the robustness of a human detection algorithm built using the OpenCV open-source computer vision library. We show that the human detection implementation can fail to detect humans in perturbed video frames even when the perturbations are so small that the corresponding frames look identical to the naked eye.« less

  1. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    NASA Astrophysics Data System (ADS)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  2. Reactivity of phosphorus mononitride and interstellar formation of molecules containing phospazo linkage: A computational study on the reaction between HSi (X2Γ) and PN (X1Σ+)

    NASA Astrophysics Data System (ADS)

    Bhasi, Priya; Nhlabatsi, Zanele P.; Sitha, Sanyasi

    2017-12-01

    Phosphorus mononitride (PN) shows some interesting chemistry due to its low dissociation energy (compared to N2) and small dipole moment (zero dipole moment for N2). In this work, a reaction between HSi (X2Γ) and PN (X1Σ+) has been studied using various computational methods. Analysis of the doublet surface of the HSi+PN reaction indicates that the reaction is exothermic in nature leading to the formation of various products. In view of the barrierless association of the reactants and exothermic nature for the product formation, it is suggested that species like HPNSi, cyclic-SiN(H)P (these two most stable isomers have phosphazo linkage) and HSiNP (third most stable isomer has phosphdiazo linkage) can possibly be detected in the interstellar medium. In view of the potential applications of phosphazo compounds in amide synthesis and pervasive nature of amide linkages in the nature, possible interstellar prebiotic applications can be advocated for these compounds.

  3. Conditions for duality between fluxes and concentrations in biochemical networks

    PubMed Central

    Fleming, Ronan M.T.; Vlassis, Nikos; Thiele, Ines; Saunders, Michael A.

    2016-01-01

    Mathematical and computational modelling of biochemical networks is often done in terms of either the concentrations of molecular species or the fluxes of biochemical reactions. When is mathematical modelling from either perspective equivalent to the other? Mathematical duality translates concepts, theorems or mathematical structures into other concepts, theorems or structures, in a one-to-one manner. We present a novel stoichiometric condition that is necessary and sufficient for duality between unidirectional fluxes and concentrations. Our numerical experiments, with computational models derived from a range of genome-scale biochemical networks, suggest that this flux-concentration duality is a pervasive property of biochemical networks. We also provide a combinatorial characterisation that is sufficient to ensure flux-concentration duality. The condition prescribes that, for every two disjoint sets of molecular species, there is at least one reaction complex that involves species from only one of the two sets. When unidirectional fluxes and molecular species concentrations are dual vectors, this implies that the behaviour of the corresponding biochemical network can be described entirely in terms of either concentrations or unidirectional fluxes. PMID:27345817

  4. Conditions for duality between fluxes and concentrations in biochemical networks

    DOE PAGES

    Fleming, Ronan M. T.; Vlassis, Nikos; Thiele, Ines; ...

    2016-06-23

    Mathematical and computational modelling of biochemical networks is often done in terms of either the concentrations of molecular species or the fluxes of biochemical reactions. When is mathematical modelling from either perspective equivalent to the other? Mathematical duality translates concepts, theorems or mathematical structures into other concepts, theorems or structures, in a one-to-one manner. We present a novel stoichiometric condition that is necessary and sufficient for duality between unidirectional fluxes and concentrations. Our numerical experiments, with computational models derived from a range of genome-scale biochemical networks, suggest that this flux-concentration duality is a pervasive property of biochemical networks. We alsomore » provide a combinatorial characterisation that is sufficient to ensure flux-concentration duality.The condition prescribes that, for every two disjoint sets of molecular species, there is at least one reaction complex that involves species from only one of the two sets. When unidirectional fluxes and molecular species concentrations are dual vectors, this implies that the behaviour of the corresponding biochemical network can be described entirely in terms of either concentrations or unidirectional fluxes« less

  5. Conditions for duality between fluxes and concentrations in biochemical networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fleming, Ronan M. T.; Vlassis, Nikos; Thiele, Ines

    Mathematical and computational modelling of biochemical networks is often done in terms of either the concentrations of molecular species or the fluxes of biochemical reactions. When is mathematical modelling from either perspective equivalent to the other? Mathematical duality translates concepts, theorems or mathematical structures into other concepts, theorems or structures, in a one-to-one manner. We present a novel stoichiometric condition that is necessary and sufficient for duality between unidirectional fluxes and concentrations. Our numerical experiments, with computational models derived from a range of genome-scale biochemical networks, suggest that this flux-concentration duality is a pervasive property of biochemical networks. We alsomore » provide a combinatorial characterisation that is sufficient to ensure flux-concentration duality.The condition prescribes that, for every two disjoint sets of molecular species, there is at least one reaction complex that involves species from only one of the two sets. When unidirectional fluxes and molecular species concentrations are dual vectors, this implies that the behaviour of the corresponding biochemical network can be described entirely in terms of either concentrations or unidirectional fluxes« less

  6. Adapting Web content for low-literacy readers by using lexical elaboration and named entities labeling

    NASA Astrophysics Data System (ADS)

    Watanabe, W. M.; Candido, A.; Amâncio, M. A.; De Oliveira, M.; Pardo, T. A. S.; Fortes, R. P. M.; Aluísio, S. M.

    2010-12-01

    This paper presents an approach for assisting low-literacy readers in accessing Web online information. The "Educational FACILITA" tool is a Web content adaptation tool that provides innovative features and follows more intuitive interaction models regarding accessibility concerns. Especially, we propose an interaction model and a Web application that explore the natural language processing tasks of lexical elaboration and named entity labeling for improving Web accessibility. We report on the results obtained from a pilot study on usability analysis carried out with low-literacy users. The preliminary results show that "Educational FACILITA" improves the comprehension of text elements, although the assistance mechanisms might also confuse users when word sense ambiguity is introduced, by gathering, for a complex word, a list of synonyms with multiple meanings. This fact evokes a future solution in which the correct sense for a complex word in a sentence is identified, solving this pervasive characteristic of natural languages. The pilot study also identified that experienced computer users find the tool to be more useful than novice computer users do.

  7. Stereocontrol of attosecond time-scale electron dynamics in ABCU using ultrafast laser pulses: a computational study.

    PubMed

    Mignolet, B; Gijsbertsen, A; Vrakking, M J J; Levine, R D; Remacle, F

    2011-05-14

    The attosecond time-scale electronic dynamics induced by an ultrashort laser pulse is computed using a multi configuration time dependent approach in ABCU (C(10)H(19)N), a medium size polyatomic molecule with a rigid cage geometry. The coupling between the electronic states induced by the strong pulse is included in the many electron Hamiltonian used to compute the electron dynamics. We show that it is possible to implement control of the electron density stereodynamics in this medium size molecule by varying the characteristics of the laser pulse, for example by polarizing the electric field either along the N-C axis of the cage, or in the plane perpendicular to it. The excitation produces an oscillatory, non-stationary, electronic state that exhibits localization of the electron density in different parts of the molecule both during and after the pulse. The coherent oscillations of the non-stationary electronic state are also demonstrated through the alternation of the dipole moment of the molecule.

  8. Hearing Impairments. Tech Use Guide: Using Computer Technology.

    ERIC Educational Resources Information Center

    Council for Exceptional Children, Reston, VA. Center for Special Education Technology.

    One of nine brief guides for special educators on using computer technology, this guide focuses on advances in electronic aids, computers, telecommunications, and videodiscs to assist students with hearing impairments. Electronic aids include hearing aids, telephone devices for the deaf, teletypes, closed captioning systems for television, and…

  9. 76 FR 24051 - In the Matter of Certain Electronic Devices, Including Mobile Phones, Mobile Tablets, Portable...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-29

    ..., Including Mobile Phones, Mobile Tablets, Portable Music Players, and Computers, and Components Thereof... certain electronic devices, including mobile phones, mobile tablets, portable music players, and computers... mobile phones, mobile tablets, portable music players, and computers, and components thereof that...

  10. Computer Electronics. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This packet contains a program guide and Career Merit Achievement Plan (Career MAP) for the implementation of a computer electronics technology (computer service technician) program in Florida secondary and postsecondary schools. The program guide describes the program content and structure, provides a program description, lists job titles under…

  11. IAServ: an intelligent home care web services platform in a cloud for aging-in-place.

    PubMed

    Su, Chuan-Jun; Chiang, Chang-Yu

    2013-11-12

    As the elderly population has been rapidly expanding and the core tax-paying population has been shrinking, the need for adequate elderly health and housing services continues to grow while the resources to provide such services are becoming increasingly scarce. Thus, increasing the efficiency of the delivery of healthcare services through the use of modern technology is a pressing issue. The seamless integration of such enabling technologies as ontology, intelligent agents, web services, and cloud computing is transforming healthcare from hospital-based treatments to home-based self-care and preventive care. A ubiquitous healthcare platform based on this technological integration, which synergizes service providers with patients' needs to be developed to provide personalized healthcare services at the right time, in the right place, and the right manner. This paper presents the development and overall architecture of IAServ (the Intelligent Aging-in-place Home care Web Services Platform) to provide personalized healthcare service ubiquitously in a cloud computing setting to support the most desirable and cost-efficient method of care for the aged-aging in place. The IAServ is expected to offer intelligent, pervasive, accurate and contextually-aware personal care services. Architecturally the implemented IAServ leverages web services and cloud computing to provide economic, scalable, and robust healthcare services over the Internet.

  12. IAServ: An Intelligent Home Care Web Services Platform in a Cloud for Aging-in-Place

    PubMed Central

    Su, Chuan-Jun; Chiang, Chang-Yu

    2013-01-01

    As the elderly population has been rapidly expanding and the core tax-paying population has been shrinking, the need for adequate elderly health and housing services continues to grow while the resources to provide such services are becoming increasingly scarce. Thus, increasing the efficiency of the delivery of healthcare services through the use of modern technology is a pressing issue. The seamless integration of such enabling technologies as ontology, intelligent agents, web services, and cloud computing is transforming healthcare from hospital-based treatments to home-based self-care and preventive care. A ubiquitous healthcare platform based on this technological integration, which synergizes service providers with patients’ needs to be developed to provide personalized healthcare services at the right time, in the right place, and the right manner. This paper presents the development and overall architecture of IAServ (the Intelligent Aging-in-place Home care Web Services Platform) to provide personalized healthcare service ubiquitously in a cloud computing setting to support the most desirable and cost-efficient method of care for the aged-aging in place. The IAServ is expected to offer intelligent, pervasive, accurate and contextually-aware personal care services. Architecturally the implemented IAServ leverages web services and cloud computing to provide economic, scalable, and robust healthcare services over the Internet. PMID:24225647

  13. Use or abuse of computers in the workplace.

    PubMed

    Gregg, Robert E

    2007-01-01

    Is your computer system about to become your next liability by the misuse of computers in the workplace? "E-discovery" reveals evidence of harassment, discrimination, defamation, and more. Yet employees also sue when the employer improperly intercepts electronic messages the employees claim were "private." Employers need to be aware of the issues of use, misuse, and rights to properly monitor and control the electronic system. Learn the current issues, legal trends, and practical pointers for your electronic operations.

  14. Brief Report: Normal Intestinal Permeability at Elevated Platelet Serotonin Levels in a Subgroup of Children with Pervasive Developmental Disorders in Curacao (The Netherlands Antilles)

    ERIC Educational Resources Information Center

    Kemperman, Ramses F. J.; Muskiet, Fred D.; Boutier, A. Inge; Kema, Ido P.; Muskiet, Frits A. J.

    2008-01-01

    This study investigated the relationship between platelet (PLT) serotonin (5-HT) and intestinal permeability in children with pervasive developmental disorders (PDD). Differential sugar absorption and PLT 5-HT were determined in 23 children with PDD. PLT 5-HT (2.0-7.1 nmol/10[to the ninth power] PLT) was elevated in 4/23 patients. None exhibited…

  15. Social Skills Groups for Asperger’s Disorder and Pervasive Developmental Disorder Not Otherwise Specified

    PubMed Central

    2008-01-01

    Pervasive developmental disorders (PDD) including Asperger’s disorder are relatively rare conditions that can be very disabling for individuals affected. This article focuses on social skills therapy, looking at research that has been completed in a group therapy format and then using composite case examples to review basic techniques that have been used to teach social skills to children with a diagnosis of PDD. PMID:19727303

  16. Changes in the Population of Persons with Autism and Pervasive Developmental Disorders in California's Developmental Services System: 1987 through 1998. A Report to the Legislature, March 1, 1999.

    ERIC Educational Resources Information Center

    California State Dept. of Developmental Services, Sacramento.

    This report discusses the results of an analysis of demographic and Client Development Evaluation Record data compiled at each of the 21 regional centers in California serving individuals with autism and pervasive developmental disorders. Data covering a period of 11 years, beginning in January 1987 and continuing through December 1998, show that…

  17. The Stability of Comorbid Psychiatric Disorders: A 7 Year Follow Up of Children with Pervasive Developmental Disorder--Not Otherwise Specified

    ERIC Educational Resources Information Center

    Verheij, C.; Louwerse, A.; van der Ende, J.; Eussen, M. L. J. M.; Van Gool, A. R.; Verheij, F.; Verhulst, F. C.; Greaves-Lord, K.

    2015-01-01

    The current study was a 7-year follow-up of 74 6-12 year old children with Pervasive Developmental Disorder-Not Otherwise Specified. We examined the rates and 7 year stability of comorbid psychiatric diagnoses as ascertained with the Diagnostic Interview Schedule for Children: Parent version at ages 6-12 and again at ages 12-20. Also, we examined…

  18. The Mysterious Case of the Pervasive Choice Biography: Ulrich Beck, Structure/Agency, and the Middling State of Theory in the Sociology of Youth

    ERIC Educational Resources Information Center

    Woodman, Dan

    2009-01-01

    This paper explores the emergence of the concept of choice biography, as it is linked to the work of Ulrich Beck, in youth research. The concept has been called a current pervasive theoretical orthodoxy. However, this article argues that the concept is most often taken up to critique, and Beck used mostly as a foil, through arguing that he…

  19. Geology and hydrothermal alteration at the Madh adh Dhahab epithermal precious-metal deposit, Kingdom of Saudi Arabia

    USGS Publications Warehouse

    Doebrich, J.L.; LeAnderson, J.P.

    1984-01-01

    Vein-related alteration consisting of quartz-sericite-pyrite, chloritic, argillic, and silicic halos was superimposed on broad zones of pervasive silicic, potassic, and argillic alteration that surrounds the rhyolite intrusive body. Quartz-sericite-pyrite alteration associated with the earliest stage of mineralization was followed by broad, pervasive, stratigraphically controlled potassic alteration. Subsequent mineralization was accompanied by quartz-sericitepyrite alteration and was followed by the main stage of mineralization that formed strong chloritic alteration halos. Development of broad zones and halos of argillic alteration also may have been related to the main stage of mineralization. Development of silicic halos was characteristic of the late stages of mineralization. Broad, pervasive propylitic alteration was then superimposed on all alteration types and represents cooling and inward encroachment of the hydrothermal system. All alteration, except the early silicic alteration is interpreted to have been related to circulating meteoric fluids heated by the rhyolite.

  20. Augmented notebooks for pervasive learning in medical practice.

    PubMed

    Bricon-Souf, Nathalie; Leroy, Nicolas; Renard, Jean-Marie

    2010-01-01

    Medical e-learning can benefit from the new technologies, and pervasive learning resources and tools worth to be introduced in the medical context. Micro-learning seems to be an interesting way for pervasive learning. But it is still difficult to propose pedagogical resources that are built by learners, from meaningful experiments. We conducted an analysis of the exchanges performed by Health care professionals in the hospital in order to understand where and when educational exchanges appear. We analyzed the type of documents exchanged. The residents' paper notebooks caught our attention first because it answers some clinician-needs and second because the computerization of such a notebook could add a collaborative dimension to the pedagogical resources. We propose a model of an augmented resident's notebook and we briefly describe an implementation using Content Management System and WIKI, before setting the discussion and the conclusion sections.

Top