Zittrain, Jonathan
2008-10-28
Ubiquitous computing means network connectivity everywhere, linking devices and systems as small as a drawing pin and as large as a worldwide product distribution chain. What could happen when people are so readily networked? This paper explores issues arising from two possible emerging models of ubiquitous human computing: fungible networked brainpower and collective personal vital sign monitoring.
ERIC Educational Resources Information Center
Peng, Hsinyi; Chou, Chien; Chang, Chun-Yu
2008-01-01
Computing devices and applications are now used beyond the desktop, in diverse environments, and this trend toward ubiquitous computing is evolving. In this study, we re-visit the interactivity concept and its applications for interactive function design in a ubiquitous-learning system (ULS). Further, we compare interactivity dimensions and…
A Collaborative Model for Ubiquitous Learning Environments
ERIC Educational Resources Information Center
Barbosa, Jorge; Barbosa, Debora; Rabello, Solon
2016-01-01
Use of mobile devices and widespread adoption of wireless networks have enabled the emergence of Ubiquitous Computing. Application of this technology to improving education strategies gave rise to Ubiquitous e-Learning, also known as Ubiquitous Learning. There are several approaches to organizing ubiquitous learning environments, but most of them…
Distributed user interfaces for clinical ubiquitous computing applications.
Bång, Magnus; Larsson, Anders; Berglund, Erik; Eriksson, Henrik
2005-08-01
Ubiquitous computing with multiple interaction devices requires new interface models that support user-specific modifications to applications and facilitate the fast development of active workspaces. We have developed NOSTOS, a computer-augmented work environment for clinical personnel to explore new user interface paradigms for ubiquitous computing. NOSTOS uses several devices such as digital pens, an active desk, and walk-up displays that allow the system to track documents and activities in the workplace. We present the distributed user interface (DUI) model that allows standalone applications to distribute their user interface components to several devices dynamically at run-time. This mechanism permit clinicians to develop their own user interfaces and forms to clinical information systems to match their specific needs. We discuss the underlying technical concepts of DUIs and show how service discovery, component distribution, events and layout management are dealt with in the NOSTOS system. Our results suggest that DUIs--and similar network-based user interfaces--will be a prerequisite of future mobile user interfaces and essential to develop clinical multi-device environments.
Ubiquitous Accessibility for People with Visual Impairments: Are We There Yet?
Billah, Syed Masum; Ashok, Vikas; Porter, Donald E.; Ramakrishnan, IV
2017-01-01
Ubiquitous access is an increasingly common vision of computing, wherein users can interact with any computing device or service from anywhere, at any time. In the era of personal computing, users with visual impairments required special-purpose, assistive technologies, such as screen readers, to interact with computers. This paper investigates whether technologies like screen readers have kept pace with, or have created a barrier to, the trend toward ubiquitous access, with a specific focus on desktop computing as this is still the primary way computers are used in education and employment. Towards that, the paper presents a user study with 21 visually-impaired participants, specifically involving the switching of screen readers within and across different computing platforms, and the use of screen readers in remote access scenarios. Among the findings, the study shows that, even for remote desktop access—an early forerunner of true ubiquitous access—screen readers are too limited, if not unusable. The study also identifies several accessibility needs, such as uniformity of navigational experience across devices, and recommends potential solutions. In summary, assistive technologies have not made the jump into the era of ubiquitous access, and multiple, inconsistent screen readers create new practical problems for users with visual impairments. PMID:28782061
Ubiquitous Accessibility for People with Visual Impairments: Are We There Yet?
Billah, Syed Masum; Ashok, Vikas; Porter, Donald E; Ramakrishnan, I V
2017-05-01
Ubiquitous access is an increasingly common vision of computing, wherein users can interact with any computing device or service from anywhere, at any time. In the era of personal computing, users with visual impairments required special-purpose, assistive technologies, such as screen readers, to interact with computers. This paper investigates whether technologies like screen readers have kept pace with, or have created a barrier to, the trend toward ubiquitous access, with a specific focus on desktop computing as this is still the primary way computers are used in education and employment. Towards that, the paper presents a user study with 21 visually-impaired participants, specifically involving the switching of screen readers within and across different computing platforms, and the use of screen readers in remote access scenarios. Among the findings, the study shows that, even for remote desktop access-an early forerunner of true ubiquitous access-screen readers are too limited, if not unusable. The study also identifies several accessibility needs, such as uniformity of navigational experience across devices, and recommends potential solutions. In summary, assistive technologies have not made the jump into the era of ubiquitous access, and multiple, inconsistent screen readers create new practical problems for users with visual impairments.
Context-awareness in ubiquitous computing and the mobile devices
NASA Astrophysics Data System (ADS)
Akçit, Nuhcan; Tomur, Emrah; Karslıoǧlu, Mahmut Onur
2015-06-01
Mobile device use has vastly increased in the last few years. Many people use many mobile devices in their daily lives. Context-aware computing is the main feature of pervasive and ubiquitous computing. Context awareness is also an important topic that becomes more available with ubiquitous computing. As the sensors increase, the data collected via mobile device sensors and sensor networks do not have much value because of the difficulty in analysis and understanding the data. Context-aware computing helps us store contextual information and use or search it by mobile devices when we want to see or analyze it. Contextual data can be made more meaningful by context-aware processing. There are different types of data and context information that must be considered. By combining spatial and contextual data, we obtain more meaningful data based on the entities. Contextual data is any information that can be used to characterize the situation of the entity. The entity is a person, place, or object considered relevant to the interaction between the user and an application, including the users and the applications. Using contextual data and good integration to mobile devices adds great value to this data, and combining these with our other data sets will allow us to obtain more useful information and analysis.
The Construction of an Ontology-Based Ubiquitous Learning Grid
ERIC Educational Resources Information Center
Liao, Ching-Jung; Chou, Chien-Chih; Yang, Jin-Tan David
2009-01-01
The purpose of this study is to incorporate adaptive ontology into ubiquitous learning grid to achieve seamless learning environment. Ubiquitous learning grid uses ubiquitous computing environment to infer and determine the most adaptive learning contents and procedures in anytime, any place and with any device. To achieve the goal, an…
Technologies for Achieving Field Ubiquitous Computing
NASA Astrophysics Data System (ADS)
Nagashima, Akira
Although the term “ubiquitous” may sound like jargon used in information appliances, ubiquitous computing is an emerging concept in industrial automation. This paper presents the author's visions of field ubiquitous computing, which is based on the novel Internet Protocol IPv6. IPv6-based instrumentation will realize the next generation manufacturing excellence. This paper focuses on the following five key issues: 1. IPv6 standardization; 2. IPv6 interfaces embedded in field devices; 3. Compatibility with FOUNDATION fieldbus; 4. Network securities for field applications; and 5. Wireless technologies to complement IP instrumentation. Furthermore, the principles of digital plant operations and ubiquitous production to support the above key technologies to achieve field ubiquitous systems are discussed.
ERIC Educational Resources Information Center
Swan, Karen; Kratcoski, Annette; Mazzer, Pat; Schenker, Jason
2005-01-01
This article describes an ongoing situated professional development program in which teachers bring their intact classes for an extended stay in a ubiquitous computing environment equipped with a variety of state-of-the-art computing devices. The experience is unique in that it not only situates teacher learning about technology integration in…
Ubiquitous computing in the military environment
NASA Astrophysics Data System (ADS)
Scholtz, Jean
2001-08-01
Increasingly people work and live on the move. To support this mobile lifestyle, especially as our work becomes more intensely information-based, companies are producing various portable and embedded information devices. The late Mark Weiser coined the term, 'ubiquitous computing' to describe an environment where computers have disappeared and are integrated into physical objects. Much industry research today is concerned with ubiquitous computing in the work and home environments. A ubiquitous computing environment would facilitate mobility by allowing information users to easily access and use information anytime, anywhere. As war fighters are inherently mobile, the question is what effect a ubiquitous computing environment would have on current military operations and doctrine. And, if ubiquitous computing is viewed as beneficial for the military, what research would be necessary to achieve a military ubiquitous computing environment? What is a vision for the use of mobile information access in a battle space? Are there different requirements for civilian and military users of this technology? What are those differences? Are there opportunities for research that will support both worlds? What type of research has been supported by the military and what areas need to be investigated? Although we don't yet have all the answers to these questions, this paper discusses the issues and presents the work we are doing to address these issues.
ERIC Educational Resources Information Center
Swan, Karen; Van 'T Hooft, Mark; Kratcoski, Annette; Schenker, Jason
2007-01-01
This article reports on preliminary findings from an ongoing study of teaching and learning in a ubiquitous computing classroom. The research employed mixed methods and multiple measures to document changes in teaching and learning that result when teachers and students have access to a variety of digital devices wherever and whenever they need…
One-to-One Computing in Public Schools: Lessons from "Laptops for All" Programs
ERIC Educational Resources Information Center
Abell Foundation, 2008
2008-01-01
The basic tenet of one-to-one computing is that the student and teacher have Internet-connected, wireless computing devices in the classroom and optimally at home as well. Also known as "ubiquitous computing," this strategy assumes that every teacher and student has her own computing device and obviates the need for moving classes to…
An improved anonymous authentication scheme for roaming in ubiquitous networks.
Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho
2018-01-01
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.
An improved anonymous authentication scheme for roaming in ubiquitous networks
Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick
2018-01-01
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575
Varela, Gervasio; Paz-Lopez, Alejandro; Becerra, Jose A; Duro, Richard
2016-07-07
This paper addresses the problem of developing user interfaces for Ubiquitous Computing (UC) and Ambient Intelligence (AmI) systems. These kind of systems are expected to provide a natural user experience, considering interaction modalities adapted to the user abilities and preferences and using whatever interaction devices are present in the environment. These interaction devices are not necessarily known at design time. The task is quite complicated due to the variety of devices and technologies, and the diversity of scenarios, and it usually burdens the developer with the need to create many different UIs in order to consider the foreseeable user-environment combinations. Here, we propose an UI abstraction framework for UC and AmI systems that effectively improves the portability of those systems between different environments and for different users. It allows developers to design and implement a single UI capable of being deployed with different devices and modalities regardless the physical location.
Experimental evaluations of wearable ECG monitor.
Ha, Kiryong; Kim, Youngsung; Jung, Junyoung; Lee, Jeunwoo
2008-01-01
Healthcare industry is changing with ubiquitous computing environment and wearable ECG measurement is one of the most popular approaches in this healthcare industry. Reliability and performance of healthcare device is fundamental issue for widespread adoptions, and interdisciplinary perspectives of wearable ECG monitor make this more difficult. In this paper, we propose evaluation criteria considering characteristic of both ECG measurement and ubiquitous computing. With our wearable ECG monitors, various levels of experimental analysis are performed based on evaluation strategy.
Embedded ubiquitous services on hospital information systems.
Kuroda, Tomohiro; Sasaki, Hiroshi; Suenaga, Takatoshi; Masuda, Yasushi; Yasumuro, Yoshihiro; Hori, Kenta; Ohboshi, Naoki; Takemura, Tadamasa; Chihara, Kunihiro; Yoshihara, Hiroyuki
2012-11-01
A Hospital Information Systems (HIS) have turned a hospital into a gigantic computer with huge computational power, huge storage and wired/wireless local area network. On the other hand, a modern medical device, such as echograph, is a computer system with several functional units connected by an internal network named a bus. Therefore, we can embed such a medical device into the HIS by simply replacing the bus with the local area network. This paper designed and developed two embedded systems, a ubiquitous echograph system and a networked digital camera. Evaluations of the developed systems clearly show that the proposed approach, embedding existing clinical systems into HIS, drastically changes productivity in the clinical field. Once a clinical system becomes a pluggable unit for a gigantic computer system, HIS, the combination of multiple embedded systems with application software designed under deep consideration about clinical processes may lead to the emergence of disruptive innovation in the clinical field.
Ubiquitous computing technology for just-in-time motivation of behavior change.
Intille, Stephen S
2004-01-01
This paper describes a vision of health care where "just-in-time" user interfaces are used to transform people from passive to active consumers of health care. Systems that use computational pattern recognition to detect points of decision, behavior, or consequences automatically can present motivational messages to encourage healthy behavior at just the right time. Further, new ubiquitous computing and mobile computing devices permit information to be conveyed to users at just the right place. In combination, computer systems that present messages at the right time and place can be developed to motivate physical activity and healthy eating. Computational sensing technologies can also be used to measure the impact of the motivational technology on behavior.
Towards ubiquitous access of computer-assisted surgery systems.
Liu, Hui; Lufei, Hanping; Shi, Weishong; Chaudhary, Vipin
2006-01-01
Traditional stand-alone computer-assisted surgery (CAS) systems impede the ubiquitous and simultaneous access by multiple users. With advances in computing and networking technologies, ubiquitous access to CAS systems becomes possible and promising. Based on our preliminary work, CASMIL, a stand-alone CAS server developed at Wayne State University, we propose a novel mobile CAS system, UbiCAS, which allows surgeons to retrieve, review and interpret multimodal medical images, and to perform some critical neurosurgical procedures on heterogeneous devices from anywhere at anytime. Furthermore, various optimization techniques, including caching, prefetching, pseudo-streaming-model, and compression, are used to guarantee the QoS of the UbiCAS system. UbiCAS enables doctors at remote locations to actively participate remote surgeries, share patient information in real time before, during, and after the surgery.
Varela, Gervasio; Paz-Lopez, Alejandro; Becerra, Jose A.; Duro, Richard
2016-01-01
This paper addresses the problem of developing user interfaces for Ubiquitous Computing (UC) and Ambient Intelligence (AmI) systems. These kind of systems are expected to provide a natural user experience, considering interaction modalities adapted to the user abilities and preferences and using whatever interaction devices are present in the environment. These interaction devices are not necessarily known at design time. The task is quite complicated due to the variety of devices and technologies, and the diversity of scenarios, and it usually burdens the developer with the need to create many different UIs in order to consider the foreseeable user-environment combinations. Here, we propose an UI abstraction framework for UC and AmI systems that effectively improves the portability of those systems between different environments and for different users. It allows developers to design and implement a single UI capable of being deployed with different devices and modalities regardless the physical location. PMID:27399711
A Service-oriented Approach towards Context-aware Mobile Learning Management Systems
2010-07-01
towards a pervasive university. Keywords-context-aware computing, service-oriented archi- tecture, mobile computing, elearning , learn management sys- tem I...usage of device- specific features provide support for various ubiquitous and pervasive eLearning scenarios [2][3]. By knowing where the user currently...data from the mobile device towards a context-aware mobile LMS. II. BASIC CONCEPTS For a better understanding of the presented eLearning sce- narios
ERIC Educational Resources Information Center
Johnson, James Nathaniel
2013-01-01
Ubiquitous computing is a near reality in both the private and public arena. Business and personal spaces are seeing a proliferation of mobile computing devices and pervasive computing technologies. This phenomenon is creating a unique set of challenges for organizational IT professionals, specifically in the numerous spillover effects of having…
Design, Development, and Evaluation of a Mobile Learning Application for Computing Education
ERIC Educational Resources Information Center
Oyelere, Solomon Sunday; Suhonen, Jarkko; Wajiga, Greg M.; Sutinen, Erkki
2018-01-01
The study focused on the application of the design science research approach in the course of developing a mobile learning application, MobileEdu, for computing education in the Nigerian higher education context. MobileEdu facilitates the learning of computer science courses on mobile devices. The application supports ubiquitous, collaborative,…
Developing a Research Agenda for Ubiquitous Computing in Schools
ERIC Educational Resources Information Center
Zucker, Andrew
2004-01-01
Increasing numbers of states, districts, and schools provide every student with a computing device; for example, the middle schools in Maine maintain wireless Internet access and the students receive laptops. Research can provide policymakers with better evidence of the benefits and costs of 1:1 computing and establish which factors make 1:1…
Design Science in Human-Computer Interaction: A Model and Three Examples
ERIC Educational Resources Information Center
Prestopnik, Nathan R.
2013-01-01
Humanity has entered an era where computing technology is virtually ubiquitous. From websites and mobile devices to computers embedded in appliances on our kitchen counters and automobiles parked in our driveways, information and communication technologies (ICTs) and IT artifacts are fundamentally changing the ways we interact with our world.…
Complex Mobile Learning That Adapts to Learners' Cognitive Load
ERIC Educational Resources Information Center
Deegan, Robin
2015-01-01
Mobile learning is cognitively demanding and frequently the ubiquitous nature of mobile computing means that mobile devices are used in cognitively demanding environments. This paper examines the use of mobile devices from a Learning, Usability and Cognitive Load Theory perspective. It suggests scenarios where these fields interact and presents an…
ERIC Educational Resources Information Center
Moran, Mark; Hawkes, Mark; El Gayar, Omar
2010-01-01
Many educational institutions have implemented ubiquitous or required laptop, notebook, or tablet personal computing programs for their students. Yet, limited evidence exists to validate integration and acceptance of the technology among student populations. This research examines student acceptance of mobile computing devices using a modification…
Factors Influencing Adoption of Ubiquitous Internet amongst Students
ERIC Educational Resources Information Center
Juned, Mohammad; Adil, Mohd
2015-01-01
Weiser's (1991) conceptualisation of a world wherein human's interaction with computer technology would no longer be limited to conventional input and output devices, has now been translated into a reality with human's constant interaction with multiple interconnected computers and sensors embedded in rooms, furniture, clothes, tools, and other…
Mobile Learning Application Interfaces: First Steps to a Cognitive Load Aware System
ERIC Educational Resources Information Center
Deegan, Robin
2013-01-01
Mobile learning is a cognitively demanding application and more frequently the ubiquitous nature of mobile computing means that mobile devices are used in cognitively demanding environments. This paper examines the nature of this use of mobile devices from a Learning, Usability and Cognitive Load Theory perspective. It suggests scenarios where…
A rhythm-based authentication scheme for smart media devices.
Lee, Jae Dong; Jeong, Young-Sik; Park, Jong Hyuk
2014-01-01
In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience.
A Rhythm-Based Authentication Scheme for Smart Media Devices
Lee, Jae Dong; Park, Jong Hyuk
2014-01-01
In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience. PMID:25110743
Assessing the Decision Process towards Bring Your Own Device
ERIC Educational Resources Information Center
Koester, Richard F.
2017-01-01
Information technology continues to evolve to the point where mobile technologies--such as smart phones, tablets, and ultra-mobile computers have the embedded flexibility and power to be a ubiquitous platform to fulfill the entire user's computing needs. Mobile technology users view these platforms as adaptable enough to be the single solution for…
Tablet and phone applications--A reflection on the experience of development.
Edwards, Simon; Winckles, Derek; Leonard, Mark
2015-06-01
Tablet devices are now ubiquitous. Medical illustrators have the skills to produce a wide range of media content. These devices offer the potential of using their creative abilities in new and exciting ways. There is much to explore. The primary difficulty lies in understanding the necessary computer technical skills to realise a vision.
Security policies and trust in ubiquitous computing.
Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand
2008-10-28
Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.
Agent-based user-adaptive service provision in ubiquitous systems
NASA Astrophysics Data System (ADS)
Saddiki, H.; Harroud, H.; Karmouch, A.
2012-11-01
With the increasing availability of smartphones, tablets and other computing devices, technology consumers have grown accustomed to performing all of their computing tasks anytime, anywhere and on any device. There is a greater need to support ubiquitous connectivity and accommodate users by providing software as network-accessible services. In this paper, we propose a MAS-based approach to adaptive service composition and provision that automates the selection and execution of a suitable composition plan for a given service. With agents capable of autonomous and intelligent behavior, the composition plan is selected in a dynamic negotiation driven by a utility-based decision-making mechanism; and the composite service is built by a coalition of agents each providing a component necessary to the target service. The same service can be built in variations for catering to dynamic user contexts and further personalizing the user experience. Also multiple services can be grouped to satisfy new user needs.
Sexuality Education Goes Viral: What We Know about Online Sexual Health Information
ERIC Educational Resources Information Center
Holstrom, Amelia M.
2015-01-01
Internet use among young people in the United States is nearly ubiquitous; they are online from home computers, from school computers, and from mobile devices. This offers incredible opportunity for sexual health educators to access individuals who are at a critical time in sexual development over the life course. Currently, the research base on…
Ethics and Morality in Software Development: A Developer's Perspective
ERIC Educational Resources Information Center
Stephenson, James H.
2010-01-01
Computers and other digital devices have become ubiquitous in our lives. Almost all aspects of our lives are in part or wholly impacted by computers and the software that runs on them. Unknowingly, we are placing our livelihoods and even our lives in the hands unknown software developers. Ethical and moral decisions made during software…
Threshold Things That Think: Authorisation for Resharing
NASA Astrophysics Data System (ADS)
Peeters, Roel; Kohlweiss, Markulf; Preneel, Bart
As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.
New Methods of Mobile Computing: From Smartphones to Smart Education
ERIC Educational Resources Information Center
Sykes, Edward R.
2014-01-01
Every aspect of our daily lives has been touched by the ubiquitous nature of mobile devices. We have experienced an exponential growth of mobile computing--a trend that seems to have no limit. This paper provides a report on the findings of a recent offering of an iPhone Application Development course at Sheridan College, Ontario, Canada. It…
Integrating the iPod Touch in K-12 Education: Visions and Vices
ERIC Educational Resources Information Center
Banister, Savilla
2010-01-01
Advocates of ubiquitous computing have long been documenting classroom benefits of one-to-one ratios of students to handheld or laptop computers. The recent sophisticated capabilities of the iPod Touch, iPhone, and iPad have encouraged further speculation on exactly how K-12 teaching and learning might be energized by such devices. This paper…
Music Teachers' Experiences in One-to-One Computing Environments
ERIC Educational Resources Information Center
Dorfman, Jay
2016-01-01
Ubiquitous computing scenarios such as the one-to-one model, in which every student is issued a device that is to be used across all subjects, have increased in popularity and have shown both positive and negative influences on education. Music teachers in schools that adopt one-to-one models may be inadequately equipped to integrate this kind of…
Conjoint Analysis for Mobile Devices for Ubiquitous Learning in Higher Education: The Korean Case
ERIC Educational Resources Information Center
Lee, Hyeongjik
2013-01-01
Despite the increasing importance of mobile devices in education, the essential features of these devices for ubiquitous learning have not been empirically addressed. This study empirically investigated the necessary conditions for using mobile devices as an educational tool for ubiquitous learning in higher education by a conjoint method. The…
Ubiquitous geospatial concept in evolution of the macro and micro spatial planning
NASA Astrophysics Data System (ADS)
Sabri, S.; Ludin, A. N. M.; Majid, M. R.
2014-02-01
There are many examples of GIS application in planning such as urban land-use planning, cultural heritage conservation, coastal zone management, and the design of structure plans for sustainable economic development. All these applications are dealing with systems in which natural and human factors are interconnected. But an issue that should be addressed is to what extent the current information technology is able to connect all these parts together? Contemporary improvement in information technology made the computer so imbedded in our everyday practices that we use it without having to think about it. Thus, computing is becoming truly ubiquitous and is available anywhere anytime. Advances in the internet facilities and devices, such as high speed wireless networks, mobile middleware, and smart technologies, has pushed the concept of ubiquitous computing to the forefront of GIS research and development. There are developments in this regards, these are such as GeoWeb 2.0, voluntarily geographic Information (VGI), and Mashups, whereby the application of cloud computing was possible in visualizing urban air pollution and emergency responses to ensure the safety and security. These advancements therefore, have changed the conventional facet of macro and micro spatial planning. Every possible information system such as residential, medical, business, environmental, governmental, and the like can be linked through ubiquitous computing technologies and acts as a virtually one system which works for society. However, the journey to achieve a true ubiquitous GIS is not without challenges. Despite the current potentials there are many issues and obstacles need to be addressed before GIS can to be truly ubiquitous in planning context. Perhaps four criteria as explained by Goodchild et al (1997) can be applied to ubiquitous GIS in planning very well: the system must be distributed (data storage, processing and user interaction can occur at locations that are potentially widely scattered), disaggregated (the monolithic systems are replaced by 'plug and play' components designed to interoperate through conformance with industry-wide standards), decoupled (system must be able to access a number of components over many networks required to complete a specific task) and, interoperable (system is based on an "open" system).
Creating the Future of Games and Learning
ERIC Educational Resources Information Center
Squire, Kurt
2015-01-01
Games for learning are poised to enter mainstream education. Several factors driving this movement are the following: (1) Digital distribution through cloud computing services and ubiquitous connectivity which will make digital learning tools--such as games--affordable and easily accessible; (2) The proliferation of digital devices; (3) Digital…
Atomic switch networks-nanoarchitectonic design of a complex system for natural computing.
Demis, E C; Aguilera, R; Sillin, H O; Scharnhorst, K; Sandouk, E J; Aono, M; Stieg, A Z; Gimzewski, J K
2015-05-22
Self-organized complex systems are ubiquitous in nature, and the structural complexity of these natural systems can be used as a model to design new classes of functional nanotechnology based on highly interconnected networks of interacting units. Conventional fabrication methods for electronic computing devices are subject to known scaling limits, confining the diversity of possible architectures. This work explores methods of fabricating a self-organized complex device known as an atomic switch network and discusses its potential utility in computing. Through a merger of top-down and bottom-up techniques guided by mathematical and nanoarchitectonic design principles, we have produced functional devices comprising nanoscale elements whose intrinsic nonlinear dynamics and memorization capabilities produce robust patterns of distributed activity and a capacity for nonlinear transformation of input signals when configured in the appropriate network architecture. Their operational characteristics represent a unique potential for hardware implementation of natural computation, specifically in the area of reservoir computing-a burgeoning field that investigates the computational aptitude of complex biologically inspired systems.
Penetrating the Fog: Analytics in Learning and Education
ERIC Educational Resources Information Center
Siemens, George; Long, Phil
2011-01-01
Attempts to imagine the future of education often emphasize new technologies--ubiquitous computing devices, flexible classroom designs, and innovative visual displays. But the most dramatic factor shaping the future of higher education is something that people cannot actually touch or see: "big data and analytics." Learning analytics is still in…
Ubiquitous Mobile Knowledge Construction in Collaborative Learning Environments
Baloian, Nelson; Zurita, Gustavo
2012-01-01
Knowledge management is a critical activity for any organization. It has been said to be a differentiating factor and an important source of competitiveness if this knowledge is constructed and shared among its members, thus creating a learning organization. Knowledge construction is critical for any collaborative organizational learning environment. Nowadays workers must perform knowledge creation tasks while in motion, not just in static physical locations; therefore it is also required that knowledge construction activities be performed in ubiquitous scenarios, and supported by mobile and pervasive computational systems. These knowledge creation systems should help people in or outside organizations convert their tacit knowledge into explicit knowledge, thus supporting the knowledge construction process. Therefore in our understanding, we consider highly relevant that undergraduate university students learn about the knowledge construction process supported by mobile and ubiquitous computing. This has been a little explored issue in this field. This paper presents the design, implementation, and an evaluation of a system called MCKC for Mobile Collaborative Knowledge Construction, supporting collaborative face-to-face tacit knowledge construction and sharing in ubiquitous scenarios. The MCKC system can be used by undergraduate students to learn how to construct knowledge, allowing them anytime and anywhere to create, make explicit and share their knowledge with their co-learners, using visual metaphors, gestures and sketches to implement the human-computer interface of mobile devices (PDAs). PMID:22969333
Ubiquitous mobile knowledge construction in collaborative learning environments.
Baloian, Nelson; Zurita, Gustavo
2012-01-01
Knowledge management is a critical activity for any organization. It has been said to be a differentiating factor and an important source of competitiveness if this knowledge is constructed and shared among its members, thus creating a learning organization. Knowledge construction is critical for any collaborative organizational learning environment. Nowadays workers must perform knowledge creation tasks while in motion, not just in static physical locations; therefore it is also required that knowledge construction activities be performed in ubiquitous scenarios, and supported by mobile and pervasive computational systems. These knowledge creation systems should help people in or outside organizations convert their tacit knowledge into explicit knowledge, thus supporting the knowledge construction process. Therefore in our understanding, we consider highly relevant that undergraduate university students learn about the knowledge construction process supported by mobile and ubiquitous computing. This has been a little explored issue in this field. This paper presents the design, implementation, and an evaluation of a system called MCKC for Mobile Collaborative Knowledge Construction, supporting collaborative face-to-face tacit knowledge construction and sharing in ubiquitous scenarios. The MCKC system can be used by undergraduate students to learn how to construct knowledge, allowing them anytime and anywhere to create, make explicit and share their knowledge with their co-learners, using visual metaphors, gestures and sketches to implement the human-computer interface of mobile devices (PDAs).
Atomic switch networks—nanoarchitectonic design of a complex system for natural computing
NASA Astrophysics Data System (ADS)
Demis, E. C.; Aguilera, R.; Sillin, H. O.; Scharnhorst, K.; Sandouk, E. J.; Aono, M.; Stieg, A. Z.; Gimzewski, J. K.
2015-05-01
Self-organized complex systems are ubiquitous in nature, and the structural complexity of these natural systems can be used as a model to design new classes of functional nanotechnology based on highly interconnected networks of interacting units. Conventional fabrication methods for electronic computing devices are subject to known scaling limits, confining the diversity of possible architectures. This work explores methods of fabricating a self-organized complex device known as an atomic switch network and discusses its potential utility in computing. Through a merger of top-down and bottom-up techniques guided by mathematical and nanoarchitectonic design principles, we have produced functional devices comprising nanoscale elements whose intrinsic nonlinear dynamics and memorization capabilities produce robust patterns of distributed activity and a capacity for nonlinear transformation of input signals when configured in the appropriate network architecture. Their operational characteristics represent a unique potential for hardware implementation of natural computation, specifically in the area of reservoir computing—a burgeoning field that investigates the computational aptitude of complex biologically inspired systems.
ERIC Educational Resources Information Center
McAnear, Anita
2006-01-01
When we planned the editorial calendar with the topic ubiquitous computing, we were thinking of ubiquitous computing as the one-to-one ratio of computers to students and teachers and 24/7 access to electronic resources. At the time, we were aware that ubiquitous computing in the computer science field had more to do with wearable computers. Our…
Commonalities in Pedagogy Situating Cell Phone Use in the Classroom
ERIC Educational Resources Information Center
Abend, Laurie Lafer
2013-01-01
Technology has become embedded in all aspects of students' lives as they increasingly rely on mobile technology devices such as cell phones to access and share information. Cell phones function as portable, affordable, and ubiquitous mini-computers, yet few teachers have leveraged the benefits of cell phone technology for teaching and learning…
Considering Learning Styles and Context-Awareness for Mobile Adaptive Learning
ERIC Educational Resources Information Center
Tortorella, Richard A. W.; Graf, Sabine
2017-01-01
Mobile devices are becoming ubiquitous in our society and more so with school aged children. In order to get the most out of the portable computing power present at students' fingertips, this paper proposes an approach for providing mobile, personalized course content tailored to each individual's learning style while incorporating adaptive…
Provision of Ubiquitous Tourist Information in Public Transport Networks
García, Carmelo R.; Pérez, Ricardo; Alayón, Francisco; Quesada-Arencibia, Alexis; Padrón, Gabino
2012-01-01
This paper outlines an information system for tourists using collective public transport based on mobile devices with limited computation and wireless connection capacities. In this system, the mobile device collaborates with the vehicle infrastructure in order to provide the user with multimedia (visual and audio) information about his/her trip. The information delivered, adapted to the user preferences, is synchronized with the passage of vehicles through points of interest along the route, for example: bus stops, tourist sights, public service centres, etc.
Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José
2016-07-22
The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched.
Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José
2016-01-01
The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched. PMID:27455265
Smart Phones, a Powerful Tool in the Chemistry Classroom
ERIC Educational Resources Information Center
Williams, Antony J.; Pence, Harry E.
2011-01-01
Cell phones, especially "smart phones", seem to have become ubiquitous. Actually, it is misleading to call many of these devices phones, as they are actually a portable and powerful computer that can be very valuable in the chemistry classroom. Currently, there are three major ways in which smart phones can be used for education. Smart phones…
ERIC Educational Resources Information Center
Butler, Rory
2013-01-01
Internet-enabled mobile devices have increased the accessibility of learning content for students. Given the ubiquitous nature of mobile computing technology, a thorough understanding of the acceptance factors that impact a learner's intention to use mobile technology as an augment to their studies is warranted. Student acceptance of mobile…
The Changing Face of Human-Computer Interaction in the Age of Ubiquitous Computing
NASA Astrophysics Data System (ADS)
Rogers, Yvonne
HCI is reinventing itself. No longer only about being user-centered, it has set its sights on pastures new, embracing a much broader and far-reaching set of interests. From emotional, eco-friendly, embodied experiences to context, constructivism and culture, HCI research is changing apace: from what it looks at, the lenses it uses and what it has to offer. Part of this is as a reaction to what is happening in the world; ubiquitous technologies are proliferating and transforming how we live our lives. We are becoming more connected and more dependent on technology. The home, the crèche, outdoors, public places and even the human body are now being experimented with as potential places to embed computational devices, even to the extent of invading previously private and taboo aspects of our lives. In this paper, I examine the diversity of lifestyle and technological transformations in our midst and outline some 'difficult' questions these raise together with alternative directions for HCI research and practice.
From Many-to-One to One-to-Many: The Evolution of Ubiquitous Computing in Education
ERIC Educational Resources Information Center
Chen, Wenli; Lim, Carolyn; Tan, Ashley
2011-01-01
Personal, Internet-connected technologies are becoming ubiquitous in the lives of students, and ubiquitous computing initiatives are already expanding in educational contexts. Historically in the field of education, the terms one-to-one (1:1) computing and ubiquitous computing have been interpreted in a number of ways and have at times been used…
ERIC Educational Resources Information Center
Drayton, Brian; Falk, Joni K.; Stroud, Rena; Hobbs, Kathryn; Hammerman, James
2010-01-01
There are few studies of the impact of ubiquitous computing on high school science, and the majority of studies of ubiquitous computing report only on the early stages of implementation. The present study presents data on 3 high schools with carefully elaborated ubiquitous computing systems that have gone through at least one "obsolescence cycle"…
2015 Marine Corps Security Environment Forecast: Futures 2030-2045
2015-01-01
The technologies that make the iPhone “smart” were publically funded—the Internet, wireless networks, the global positioning system, microelectronics...Energy Revolution (63 percent); Internet of Things (ubiquitous sensors embedded in interconnected computing devices) (50 percent); “Sci-Fi...Neuroscience & artificial intelligence - Sensors /control systems -Power & energy -Human-robot interaction Robots/autonomous systems will become part of the
Employing Replay Connectors for SIEM Operator Education
2013-09-01
BLANK xiii LIST OF ACRONYMS AND ABBREVIATIONS CORR Correlation Optimized Retention and Retrieval CII Critical Information Infrastructure GLBA...vast distances is now quicker and easier with the advancement in mobile computing devices and more ubiquitous connectivity and bandwidth. As a result...breakdown of the Critical Information Infrastructure (CII) is one of the core risks facing the international economy. The World Economic Forum
SUPAR: Smartphone as a ubiquitous physical activity recognizer for u-healthcare services.
Fahim, Muhammad; Lee, Sungyoung; Yoon, Yongik
2014-01-01
Current generation smartphone can be seen as one of the most ubiquitous device for physical activity recognition. In this paper we proposed a physical activity recognizer to provide u-healthcare services in a cost effective manner by utilizing cloud computing infrastructure. Our model is comprised on embedded triaxial accelerometer of the smartphone to sense the body movements and a cloud server to store and process the sensory data for numerous kind of services. We compute the time and frequency domain features over the raw signals and evaluate different machine learning algorithms to identify an accurate activity recognition model for four kinds of physical activities (i.e., walking, running, cycling and hopping). During our experiments we found Support Vector Machine (SVM) algorithm outperforms for the aforementioned physical activities as compared to its counterparts. Furthermore, we also explain how smartphone application and cloud server communicate with each other.
Johanson, Bradley E.; Fox, Armando; Winograd, Terry A.; Hanrahan, Patrick M.
2010-04-20
An efficient and adaptive middleware infrastructure called the Event Heap system dynamically coordinates application interactions and communications in a ubiquitous computing environment, e.g., an interactive workspace, having heterogeneous software applications running on various machines and devices across different platforms. Applications exchange events via the Event Heap. Each event is characterized by a set of unordered, named fields. Events are routed by matching certain attributes in the fields. The source and target versions of each field are automatically set when an event is posted or used as a template. The Event Heap system implements a unique combination of features, both intrinsic to tuplespaces and specific to the Event Heap, including content based addressing, support for routing patterns, standard routing fields, limited data persistence, query persistence/registration, transparent communication, self-description, flexible typing, logical/physical centralization, portable client API, at most once per source first-in-first-out ordering, and modular restartability.
Self-* properties through gossiping.
Babaoglu, Ozalp; Jelasity, Márk
2008-10-28
As computer systems have become more complex, numerous competing approaches have been proposed for these systems to self-configure, self-manage, self-repair, etc. such that human intervention in their operation can be minimized. In ubiquitous systems, this has always been a central issue as well. In this paper, we overview techniques to implement self-* properties in large-scale, decentralized networks through bio-inspired techniques in general, and gossip-based algorithms in particular. We believe that gossip-based algorithms could be an important inspiration for solving problems in ubiquitous computing as well. As an example, we outline a novel approach to arrange large numbers of mobile agents (e.g. vehicles, rescue teams carrying mobile devices) into different formations in a totally decentralized manner. The approach is inspired by the biological mechanism of cell sorting via differential adhesion, as well as by our earlier work in self-organizing peer-to-peer overlay networks.
REVIEW ARTICLE: Sensor communication technology towards ambient intelligence
NASA Astrophysics Data System (ADS)
Delsing, J.; Lindgren, P.
2005-04-01
This paper is a review of the fascinating development of sensors and the communication of sensor data. A brief historical introduction is given, followed by a discussion on architectures for sensor networks. Further, realistic specifications on sensor devices suitable for ambient intelligence and ubiquitous computing are given. Based on these specifications, the status and current frontline development are discussed. In total, it is shown that future technology for ambient intelligence based on sensor and actuator devices using standardized Internet communication is within the range of possibilities within five years.
Implications of Ubiquitous Computing for the Social Studies Curriculum
ERIC Educational Resources Information Center
van Hover, Stephanie D.; Berson, Michael J.; Bolick, Cheryl Mason; Swan, Kathleen Owings
2004-01-01
In March 2002, members of the National Technology Leadership Initiative (NTLI) met in Charlottesville, Virginia to discuss the potential effects of ubiquitous computing on the field of education. Ubiquitous computing, or "on-demand availability of task-necessary computing power," involves providing every student with a handheld computer--a…
Ubiquitous health monitoring and real-time cardiac arrhythmias detection: a case study.
Li, Jian; Zhou, Haiying; Zuo, Decheng; Hou, Kun-Mean; De Vaulx, Christophe
2014-01-01
As the symptoms and signs of heart diseases that cause sudden cardiac death, cardiac arrhythmia has attracted great attention. Due to limitations in time and space, traditional approaches to cardiac arrhythmias detection fail to provide a real-time continuous monitoring and testing service applicable in different environmental conditions. Integrated with the latest technologies in ECG (electrocardiograph) analysis and medical care, the pervasive computing technology makes possible the ubiquitous cardiac care services, and thus brings about new technical challenges, especially in the formation of cardiac care architecture and realization of the real-time automatic ECG detection algorithm dedicated to care devices. In this paper, a ubiquitous cardiac care prototype system is presented with its architecture framework well elaborated. This prototype system has been tested and evaluated in all the clinical-/home-/outdoor-care modes with a satisfactory performance in providing real-time continuous cardiac arrhythmias monitoring service unlimitedly adaptable in time and space.
CILT2000: Ubiquitous Computing--Spanning the Digital Divide.
ERIC Educational Resources Information Center
Tinker, Robert; Vahey, Philip
2002-01-01
Discusses the role of ubiquitous and handheld computers in education. Summarizes the contributions of the Center for Innovative Learning Technologies (CILT) and describes the ubiquitous computing sessions at the CILT2000 Conference. (Author/YDS)
Ubiquitous Computing: The Universal Use of Computers on College Campuses.
ERIC Educational Resources Information Center
Brown, David G., Ed.
This book is a collection of vignettes from 13 universities where everyone on campus has his or her own computer. These 13 institutions have instituted "ubiquitous computing" in very different ways at very different costs. The chapters are: (1) "Introduction: The Ubiquitous Computing Movement" (David G. Brown); (2) "Dartmouth College" (Malcolm…
Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-based Services
NASA Astrophysics Data System (ADS)
Soppera, A.; Burbridge, T.
During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists and science fiction writers. Today this subject has become of interest to business, government, and society. Governmental authorities exercise their power through the networked environment. Credit card databases maintain our credit history and decide whether we are allowed to rent a house or obtain a loan. Mobile telephones can locate us in real time so that we do not miss calls. Within another 10 years, all sorts of devices will be connected through the network. Our fridge, our food, together with our health information, may all be networked for the purpose of maintaining diet and well-being. The Internet will move from being an infrastructure to connect computers, to being an infrastructure to connect everything [2, 3].
Cloud computing for context-aware enhanced m-Health services.
Fernandez-Llatas, Carlos; Pileggi, Salvatore F; Ibañez, Gema; Valero, Zoe; Sala, Pilar
2015-01-01
m-Health services are increasing its presence in our lives due to the high penetration of new smartphone devices. This new scenario proposes new challenges in terms of information accessibility that require new paradigms which enable the new applications to access the data in a continuous and ubiquitous way, ensuring the privacy required depending on the kind of data accessed. This paper proposes an architecture based on cloud computing paradigms in order to empower new m-Health applications to enrich their results by providing secure access to user data.
Nanoscale RRAM-based synaptic electronics: toward a neuromorphic computing device.
Park, Sangsu; Noh, Jinwoo; Choo, Myung-Lae; Sheri, Ahmad Muqeem; Chang, Man; Kim, Young-Bae; Kim, Chang Jung; Jeon, Moongu; Lee, Byung-Geun; Lee, Byoung Hun; Hwang, Hyunsang
2013-09-27
Efforts to develop scalable learning algorithms for implementation of networks of spiking neurons in silicon have been hindered by the considerable footprints of learning circuits, which grow as the number of synapses increases. Recent developments in nanotechnologies provide an extremely compact device with low-power consumption.In particular, nanoscale resistive switching devices (resistive random-access memory (RRAM)) are regarded as a promising solution for implementation of biological synapses due to their nanoscale dimensions, capacity to store multiple bits and the low energy required to operate distinct states. In this paper, we report the fabrication, modeling and implementation of nanoscale RRAM with multi-level storage capability for an electronic synapse device. In addition, we first experimentally demonstrate the learning capabilities and predictable performance by a neuromorphic circuit composed of a nanoscale 1 kbit RRAM cross-point array of synapses and complementary metal-oxide-semiconductor neuron circuits. These developments open up possibilities for the development of ubiquitous ultra-dense, ultra-low-power cognitive computers.
SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases
NASA Astrophysics Data System (ADS)
Pinzón, Cristian; de Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan M.
One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.
Internet messenger based smart virtual class learning using ubiquitous computing
NASA Astrophysics Data System (ADS)
Umam, K.; Mardi, S. N. S.; Hariadi, M.
2017-06-01
Internet messenger (IM) has become an important educational technology component in college education, IM makes it possible for students to engage in learning and collaborating at smart virtual class learning (SVCL) using ubiquitous computing. However, the model of IM-based smart virtual class learning using ubiquitous computing and empirical evidence that would favor a broad application to improve engagement and behavior are still limited. In addition, the expectation that IM based SVCL using ubiquitous computing could improve engagement and behavior on smart class cannot be confirmed because the majority of the reviewed studies followed instructions paradigms. This article aims to present the model of IM-based SVCL using ubiquitous computing and showing learners’ experiences in improved engagement and behavior for learner-learner and learner-lecturer interactions. The method applied in this paper includes design process and quantitative analysis techniques, with the purpose of identifying scenarios of ubiquitous computing and realize the impressions of learners and lecturers about engagement and behavior aspect and its contribution to learning
A Battery-Aware Algorithm for Supporting Collaborative Applications
NASA Astrophysics Data System (ADS)
Rollins, Sami; Chang-Yit, Cheryl
Battery-powered devices such as laptops, cell phones, and MP3 players are becoming ubiquitous. There are several significant ways in which the ubiquity of battery-powered technology impacts the field of collaborative computing. First, applications such as collaborative data gathering, become possible. Also, existing applications that depend on collaborating devices to maintain the system infrastructure must be reconsidered. Fundamentally, the problem lies in the fact that collaborative applications often require end-user computing devices to perform tasks that happen in the background and are not directly advantageous to the user. In this work, we seek to better understand how laptop users use the batteries attached to their devices and analyze a battery-aware alternative to Gnutella’s ultrapeer selection algorithm. Our algorithm provides insight into how system maintenance tasks can be allocated to battery-powered nodes. The most significant result of our study indicates that a large portion of laptop users can participate in system maintenance without sacrificing any of their battery. These results show great promise for existing collaborative applications as well as new applications, such as collaborative data gathering, that rely upon battery-powered devices.
Learning with Ubiquitous Computing
ERIC Educational Resources Information Center
Rosenheck, Louisa
2008-01-01
If ubiquitous computing becomes a reality and is widely adopted, it will inevitably have an impact on education. This article reviews the background of ubiquitous computing and current research projects done involving educational "ubicomp." Finally it explores how ubicomp may and may not change education in both formal and informal settings and…
Mining Personal Data Using Smartphones and Wearable Devices: A Survey
Rehman, Muhammad Habib ur; Liew, Chee Sun; Wah, Teh Ying; Shuja, Junaid; Daghighi, Babak
2015-01-01
The staggering growth in smartphone and wearable device use has led to a massive scale generation of personal (user-specific) data. To explore, analyze, and extract useful information and knowledge from the deluge of personal data, one has to leverage these devices as the data-mining platforms in ubiquitous, pervasive, and big data environments. This study presents the personal ecosystem where all computational resources, communication facilities, storage and knowledge management systems are available in user proximity. An extensive review on recent literature has been conducted and a detailed taxonomy is presented. The performance evaluation metrics and their empirical evidences are sorted out in this paper. Finally, we have highlighted some future research directions and potentially emerging application areas for personal data mining using smartphones and wearable devices. PMID:25688592
Single-electron random-number generator (RNG) for highly secure ubiquitous computing applications
NASA Astrophysics Data System (ADS)
Uchida, Ken; Tanamoto, Tetsufumi; Fujita, Shinobu
2007-11-01
Since the security of all modern cryptographic techniques relies on unpredictable and irreproducible digital keys generated by random-number generators (RNGs), the realization of high-quality RNG is essential for secure communications. In this report, a new RNG, which utilizes single-electron phenomena, is proposed. A room-temperature operating silicon single-electron transistor (SET) having nearby an electron pocket is used as a high-quality, ultra-small RNG. In the proposed RNG, stochastic single-electron capture/emission processes to/from the electron pocket are detected with high sensitivity by the SET, and result in giant random telegraphic signals (GRTS) on the SET current. It is experimentally demonstrated that the single-electron RNG generates extremely high-quality random digital sequences at room temperature, in spite of its simple configuration. Because of its small-size and low-power properties, the single-electron RNG is promising as a key nanoelectronic device for future ubiquitous computing systems with highly secure mobile communication capabilities.
Wearable ear EEG for brain interfacing
NASA Astrophysics Data System (ADS)
Schroeder, Eric D.; Walker, Nicholas; Danko, Amanda S.
2017-02-01
Brain-computer interfaces (BCIs) measuring electrical activity via electroencephalogram (EEG) have evolved beyond clinical applications to become wireless consumer products. Typically marketed for meditation and neu- rotherapy, these devices are limited in scope and currently too obtrusive to be a ubiquitous wearable. Stemming from recent advancements made in hearing aid technology, wearables have been shrinking to the point that the necessary sensors, circuitry, and batteries can be fit into a small in-ear wearable device. In this work, an ear-EEG device is created with a novel system for artifact removal and signal interpretation. The small, compact, cost-effective, and discreet device is demonstrated against existing consumer electronics in this space for its signal quality, comfort, and usability. A custom mobile application is developed to process raw EEG from each device and display interpreted data to the user. Artifact removal and signal classification is accomplished via a combination of support matrix machines (SMMs) and soft thresholding of relevant statistical properties.
Photorefraction of eyes: history and future prospects.
Howland, Howard C
2009-06-01
A brief history of photorefraction, i.e., the refraction of eyes by photography or computer image capture, is given. The method of photorefraction originated from an optical scheme for secret communication across the Berlin wall. This scheme used a lens whose focus about infinity was modulated by a movable reflecting surface. From this device, it was recognized that the vertebrate eye was such a reflector and that its double-pass pointspread could be used to compute its degree of defocus. Subsequently, a second, totally independent invention, more accurately termed "photoretinoscopy," used an eccentric light source and obtained retinoscopic-like images of the reflex in the pupil of the subject's eyes. Photoretinoscopy has become the preferred method of photorefraction and has been instantiated in a wide variety of devices used in vision screening and research. This has been greatly helped by the parallel development of computer and digital camera technology. It seems likely that photorefractive methods will continue to be refined and may eventually become ubiquitous in clinical practice.
Bang, Magnus; Timpka, Toomas
2007-06-01
Co-located teams often use material objects to communicate messages in collaboration. Modern desktop computing systems with abstract graphical user interface (GUIs) fail to support this material dimension of inter-personal communication. The aim of this study is to investigate how tangible user interfaces can be used in computer systems to better support collaborative routines among co-located clinical teams. The semiotics of physical objects used in team collaboration was analyzed from data collected during 1 month of observations at an emergency room. The resulting set of communication patterns was used as a framework when designing an experimental system. Following the principles of augmented reality, physical objects were mapped into a physical user interface with the goal of maintaining the symbolic value of those objects. NOSTOS is an experimental ubiquitous computing environment that takes advantage of interaction devices integrated into the traditional clinical environment, including digital pens, walk-up displays, and a digital desk. The design uses familiar workplace tools to function as user interfaces to the computer in order to exploit established cognitive and collaborative routines. Paper-based tangible user interfaces and digital desks are promising technologies for co-located clinical teams. A key issue that needs to be solved before employing such solutions in practice is associated with limited feedback from the passive paper interfaces.
Service-oriented Software Defined Optical Networks for Cloud Computing
NASA Astrophysics Data System (ADS)
Liu, Yuze; Li, Hui; Ji, Yuefeng
2017-10-01
With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.g., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). This paper proposes a new service-oriented software defined optical network architecture, including a resource layer, a service abstract layer, a control layer and an application layer. We then dwell on the corresponding service providing method. Different service ID is used to identify the service a device can offer. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit different services based on the service ID in the service-oriented software defined optical network.
mHealth data security: the need for HIPAA-compliant standardization.
Luxton, David D; Kayl, Robert A; Mishkind, Matthew C
2012-05-01
The rise in the use of mobile devices, such as smartphones, tablet personal computers, and wireless medical devices, as well as the wireless networks that enable their use, has raised new concerns for data security and integrity. Standardized Health Insurance Portability and Accountability Act of 1996 (HIPAA)-compliant electronic data security that will allow ubiquitous use of mobile health technologies is needed. The lack of standardized data security to assure privacy, to allow interoperability, and to maximize the full capabilities of mobile devices presents a significant barrier to care. The purpose of this article is to provide an overview of the issue and to encourage discussion of this important topic. Current security needs, standards, limitations, and recommendations for how to address this barrier to care are discussed.
Mobile Computing and Ubiquitous Networking: Concepts, Technologies and Challenges.
ERIC Educational Resources Information Center
Pierre, Samuel
2001-01-01
Analyzes concepts, technologies and challenges related to mobile computing and networking. Defines basic concepts of cellular systems. Describes the evolution of wireless technologies that constitute the foundations of mobile computing and ubiquitous networking. Presents characterization and issues of mobile computing. Analyzes economical and…
ERIC Educational Resources Information Center
Hwang, Gwo-Haur; Chen, Beyin; Huang, Cin-Wei
2016-01-01
In recent years, with the gradual increase in the importance of professional certificates, improvement in certification tutoring systems has become more important. In this study, we have developed a personalized ubiquitous multi-device certification tutoring system (PUMDCTS) based on "Bloom's Taxonomy of Educational Objectives," and…
Multimodal and ubiquitous computing systems: supporting independent-living older users.
Perry, Mark; Dowdall, Alan; Lines, Lorna; Hone, Kate
2004-09-01
We document the rationale and design of a multimodal interface to a pervasive/ubiquitous computing system that supports independent living by older people in their own homes. The Millennium Home system involves fitting a resident's home with sensors--these sensors can be used to trigger sequences of interaction with the resident to warn them about dangerous events, or to check if they need external help. We draw lessons from the design process and conclude the paper with implications for the design of multimodal interfaces to ubiquitous systems developed for the elderly and in healthcare, as well as for more general ubiquitous computing applications.
Bott, O J; Ammenwerth, E; Brigl, B; Knaup, P; Lang, E; Pilgram, R; Pfeifer, B; Ruderich, F; Wolff, A C; Haux, R; Kulikowski, C
2005-01-01
To review recent research efforts in the field of ubiquitous computing in health care. To identify current research trends and further challenges for medical informatics. Analysis of the contents of the Yearbook on Medical Informatics 2005 of the International Medical Informatics Association (IMIA). The Yearbook of Medical Informatics 2005 includes 34 original papers selected from 22 peer-reviewed scientific journals related to several distinct research areas: health and clinical management, patient records, health information systems, medical signal processing and biomedical imaging, decision support, knowledge representation and management, education and consumer informatics as well as bioinformatics. A special section on ubiquitous health care systems is devoted to recent developments in the application of ubiquitous computing in health care. Besides additional synoptical reviews of each of the sections the Yearbook includes invited reviews concerning E-Health strategies, primary care informatics and wearable healthcare. Several publications demonstrate the potential of ubiquitous computing to enhance effectiveness of health services delivery and organization. But ubiquitous computing is also a societal challenge, caused by the surrounding but unobtrusive character of this technology. Contributions from nearly all of the established sub-disciplines of medical informatics are demanded to turn the visions of this promising new research field into reality.
Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks
NASA Astrophysics Data System (ADS)
Cagalaban, Giovanni; Kim, Seoksoo
The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.
Choi, Okkyung; Han, SangYong
2007-01-01
Ubiquitous Computing makes it possible to determine in real time the location and situations of service requesters in a web service environment as it enables access to computers at any time and in any place. Though research on various aspects of ubiquitous commerce is progressing at enterprises and research centers, both domestically and overseas, analysis of a customer's personal preferences based on semantic web and rule based services using semantics is not currently being conducted. This paper proposes a Ubiquitous Computing Services System that enables a rule based search as well as semantics based search to support the fact that the electronic space and the physical space can be combined into one and the real time search for web services and the construction of efficient web services thus become possible.
The Status of Ubiquitous Computing.
ERIC Educational Resources Information Center
Brown, David G.; Petitto, Karen R.
2003-01-01
Explains the prevalence and rationale of ubiquitous computing on college campuses--teaching with the assumption or expectation that all faculty and students have access to the Internet--and offers lessons learned by pioneering institutions. Lessons learned involve planning, technology, implementation and management, adoption of computer-enhanced…
ERIC Educational Resources Information Center
Purba, Siska Wati Dewi; Hwang, Wu-Yuin
2017-01-01
In this study, we designed and developed an app called Ubiquitous-Physics (U-Physics) for mobile devices like tablet PC or smart phones to help students learn the principles behind a simple pendulum in Physics. The unique characteristic of U-Physics is the use of sensors on mobile devices to collect acceleration and velocity data during pendulum…
ERIC Educational Resources Information Center
Hsu, Ching-Kun; Hwang, Gwo-Jen
2014-01-01
Personal computer assembly courses have been recognized as being essential in helping students understand computer structure as well as the functionality of each computer component. In this study, a context-aware ubiquitous learning approach is proposed for providing instant assistance to individual students in the learning activity of a…
Martinez-Espronceda, Miguel; Martinez, Ignacio; Serrano, Luis; Led, Santiago; Trigo, Jesús Daniel; Marzo, Asier; Escayola, Javier; Garcia, José
2011-05-01
Traditionally, e-Health solutions were located at the point of care (PoC), while the new ubiquitous user-centered paradigm draws on standard-based personal health devices (PHDs). Such devices place strict constraints on computation and battery efficiency that encouraged the International Organization for Standardization/IEEE11073 (X73) standard for medical devices to evolve from X73PoC to X73PHD. In this context, low-voltage low-power (LV-LP) technologies meet the restrictions of X73PHD-compliant devices. Since X73PHD does not approach the software architecture, the accomplishment of an efficient design falls directly on the software developer. Therefore, computational and battery performance of such LV-LP-constrained devices can even be outperformed through an efficient X73PHD implementation design. In this context, this paper proposes a new methodology to implement X73PHD into microcontroller-based platforms with LV-LP constraints. Such implementation methodology has been developed through a patterns-based approach and applied to a number of X73PHD-compliant agents (including weighing scale, blood pressure monitor, and thermometer specializations) and microprocessor architectures (8, 16, and 32 bits) as a proof of concept. As a reference, the results obtained in the weighing scale guarantee all features of X73PHD running over a microcontroller architecture based on ARM7TDMI requiring only 168 B of RAM and 2546 B of flash memory.
Development of a Ubiquitous Learning Platform Based on a Real-Time Help-Seeking Mechanism
ERIC Educational Resources Information Center
Hwang, Gwo-Jen; Wu, Chih-Hsiang; Tseng, Judy C. R.; Huang, Iwen
2011-01-01
The popularity of mobile devices has encouraged the advance of ubiquitous learning, in which students are situated in a real-world learning environment with support from the digital world via the use of mobile, wireless communications, or even sensing technologies. Most of the ubiquitous learning systems are implemented with high-cost sensing…
NASA Astrophysics Data System (ADS)
Oukacha, Hassan
The rapid advancement of Complementary Metal Oxide Semiconductor (CMOS) technology has formed the backbone of the modern computing revolution enabling the development of computationally intensive electronic devices that are smaller, faster, less expensive, and consume less power. This well-established technology has transformed the mobile computing and communications industries by providing high levels of system integration on a single substrate, high reliability and low manufacturing cost. The driving force behind this computing revolution is the scaling of semiconductor devices to smaller geometries which has resulted in faster switching speeds and the promise of replacing traditional, bulky radio frequency (RF) components with miniaturized devices. Such devices play an important role in our society enabling ubiquitous computing and on-demand data access. This thesis presents the design and development of a magnetic circulator component in a standard 180 nm CMOS process. The design approach involves integration of nanoscale ferrite materials on a CMOS chip to avoid using bulky magnetic materials employed in conventional circulators. This device constitutes the next generation broadband millimeter-wave circulator integrated in CMOS using ferrite materials operating in the 60GHz frequency band. The unlicensed ultra-high frequency spectrum around 60GHz offers many benefits: very high immunity to interference, high security, and frequency re-use. Results of both simulations and measurements are presented in this thesis. The presented results show the benefits of this technique and the potential that it has in incorporating a complete system-on-chip (SoC) that includes low noise amplifier, power amplier, and antenna. This system-on-chip can be used in the same applications where the conventional circulator has been employed, including communication systems, radar systems, navigation and air traffic control, and military equipment. This set of applications of circulator shows how crucial this device is to many industries and the need for smaller, cost effective RF components.
Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks.
Anwar, Asim; Seet, Boon-Chong; Ding, Zhiguo
2018-02-08
Ubiquitous wireless sensor networks (UWSNs) have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA) technique originally proposed for 5th Generation (5G) cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA) technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.
NASA Astrophysics Data System (ADS)
Cheok, Adrian David
This chapter details the Human Pacman system to illuminate entertainment computing which ventures to embed the natural physical world seamlessly with a fantasy virtual playground by capitalizing on infrastructure provided by mobile computing, wireless LAN, and ubiquitous computing. With Human Pacman, we have a physical role-playing computer fantasy together with real human-social and mobile-gaming that emphasizes on collaboration and competition between players in a wide outdoor physical area that allows natural wide-area human-physical movements. Pacmen and Ghosts are now real human players in the real world experiencing mixed computer graphics fantasy-reality provided by using the wearable computers on them. Virtual cookies and actual tangible physical objects are incorporated into the game play to provide novel experiences of seamless transitions between the real and virtual worlds. This is an example of a new form of gaming that anchors on physicality, mobility, social interaction, and ubiquitous computing.
Cheon, Gyeongwoo; Shin, Il Hyung; Jung, Min Yang; Kim, Hee Chan
2009-01-01
We developed a gateway server to support various types of bio-signal monitoring devices for ubiquitous emergency healthcare in a reliable, effective, and scalable way. The server provides multiple channels supporting real-time N-to-N client connections. We applied our system to four types of health monitoring devices including a 12-channel electrocardiograph (ECG), oxygen saturation (SpO(2)), and medical imaging devices (a ultrasonograph and a digital skin microscope). Different types of telecommunication networks were tested: WIBRO, CDMA, wireless LAN, and wired internet. We measured the performance of our system in terms of the transmission rate and the number of simultaneous connections. The results show that the proposed network communication strategy can be successfully applied to the ubiquitous emergency healthcare service by providing a fast rate enough for real-time video transmission and multiple connections among patients and medical personnel.
Surface Traps in Colloidal Quantum Dots: A Combined Experimental and Theoretical Perspective.
Giansante, Carlo; Infante, Ivan
2017-10-19
Surface traps are ubiquitous to nanoscopic semiconductor materials. Understanding their atomistic origin and manipulating them chemically have capital importance to design defect-free colloidal quantum dots and make a leap forward in the development of efficient optoelectronic devices. Recent advances in computing power established computational chemistry as a powerful tool to describe accurately complex chemical species and nowadays it became conceivable to model colloidal quantum dots with realistic sizes and shapes. In this Perspective, we combine the knowledge gathered in recent experimental findings with the computation of quantum dot electronic structures. We analyze three different systems: namely, CdSe, PbS, and CsPbI 3 as benchmark semiconductor nanocrystals showing how different types of trap states can form at their surface. In addition, we suggest experimental healing of such traps according to their chemical origin and nanocrystal composition.
Trust models in ubiquitous computing.
Krukow, Karl; Nielsen, Mogens; Sassone, Vladimiro
2008-10-28
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.
ERIC Educational Resources Information Center
Tsai, Chia-Wen; Shen, Pei-Di; Tsai, Meng-Chuan; Chen, Wen-Yu
2017-01-01
Much application software education in Taiwan can hardly be regarded as practical. The researchers in this study provided a flexible means of ubiquitous learning (u-learning) with a mobile app for students to access the learning material. In addition, the authors also adopted computational thinking (CT) to help students develop practical computing…
Ubiquitous Complete in a Web 2.0 World
ERIC Educational Resources Information Center
Bull, Glen; Ferster, Bill
2006-01-01
In the third wave of computing, people will interact with multiple computers in multiple ways in every setting. The value of ubiquitous computing is enhanced and reinforced by another trend: the transition to a Web 2.0 world. In a Web 2.0 world, applications and data reside on the Web itself. Schools are not yet approaching a ratio of one…
[Facing the challenges of ubiquitous computing in the health care sector].
Georgieff, Peter; Friedewald, Michael
2010-01-01
The steady progress of microelectronics, communications and information technology will enable the realisation of the vision for "ubiquitous computing" where the Internet extends into the real world embracing everyday objects. The necessary technical basis is already in place. Due to their diminishing size, constantly falling price and declining energy consumption, processors, communications modules and sensors are being increasingly integrated into everyday objects today. This development is opening up huge opportunities for both the economy and individuals. In the present paper we discuss possible applications, but also technical, social and economic barriers to a wide-spread use of ubiquitous computing in the health care sector. .
Commentary: Ubiquitous Computing Revisited--A New Perspective
ERIC Educational Resources Information Center
Bull, Glen; Garofalo, Joe
2006-01-01
In 2002, representatives from the teacher educator associations representing the core content areas (science, mathematics, language arts, and social studies) and educational technology met at the National Technology Leadership Retreat (NTLR) to discuss potential implications of ubiquitous computing for K-12 schools. This paper re-examines some of…
FleXConf: A Flexible Conference Assistant Using Context-Aware Notification Services
NASA Astrophysics Data System (ADS)
Armenatzoglou, Nikos; Marketakis, Yannis; Kriara, Lito; Apostolopoulos, Elias; Papavasiliou, Vicky; Kampas, Dimitris; Kapravelos, Alexandros; Kartsonakis, Eythimis; Linardakis, Giorgos; Nikitaki, Sofia; Bikakis, Antonis; Antoniou, Grigoris
Integrating context-aware notification services to ubiquitous computing systems aims at the provision of the right information to the right users, at the right time, in the right place, and on the right device, and constitutes a significant step towards the realization of the Ambient Intelligence vision. In this paper, we present FlexConf, a semantics-based system that supports location-based, personalized notification services for the assistance of conference attendees. Its special features include an ontology-based representation model, rule-based context-aware reasoning, and a novel positioning system for indoor environments.
Campus Móvil: Designing a Mobile Web 2.0 Startup for Higher Education Uses
NASA Astrophysics Data System (ADS)
Kuklinski, Hugo Pardo; Brandt, Joel
In the intersection between the mobile Internet, social software and educational environments, Campus Móvil is a prototype of an online application for mobile devices created for a Spanish university community, providing exclusive and transparent access via an institutional email account. Campus Móvil was proposed and developed to address needs not currently being met in a university community due to a lack of ubiquitous services. It also facilitates network access for numerous specialized activities that complement those normally carried out on campus and in lecture rooms using personal computers.
Implementing Internet of Things in a military command and control environment
NASA Astrophysics Data System (ADS)
Raglin, Adrienne; Metu, Somiya; Russell, Stephen; Budulas, Peter
2017-05-01
While the term Internet of Things (IoT) has been coined relatively recently, it has deep roots in multiple other areas of research including cyber-physical systems, pervasive and ubiquitous computing, embedded systems, mobile ad-hoc networks, wireless sensor networks, cellular networks, wearable computing, cloud computing, big data analytics, and intelligent agents. As the Internet of Things, these technologies have created a landscape of diverse heterogeneous capabilities and protocols that will require adaptive controls to effect linkages and changes that are useful to end users. In the context of military applications, it will be necessary to integrate disparate IoT devices into a common platform that necessarily must interoperate with proprietary military protocols, data structures, and systems. In this environment, IoT devices and data will not be homogeneous and provenance-controlled (i.e. single vendor/source/supplier owned). This paper presents a discussion of the challenges of integrating varied IoT devices and related software in a military environment. A review of contemporary commercial IoT protocols is given and as a practical example, a middleware implementation is proffered that provides transparent interoperability through a proactive message dissemination system. The implementation is described as a framework through which military applications can integrate and utilize commercial IoT in conjunction with existing military sensor networks and command and control (C2) systems.
Su, Chuan-Jun; Chiang, Chang-Yu; Chih, Meng-Chun
2014-03-07
Good physical fitness generally makes the body less prone to common diseases. A personalized exercise plan that promotes a balanced approach to fitness helps promotes fitness, while inappropriate forms of exercise can have adverse consequences for health. This paper aims to develop an ontology-driven knowledge-based system for generating custom-designed exercise plans based on a user's profile and health status, incorporating international standard Health Level Seven International (HL7) data on physical fitness and health screening. The generated plan exposing Representational State Transfer (REST) style web services which can be accessed from any Internet-enabled device and deployed in cloud computing environments. To ensure the practicality of the generated exercise plans, encapsulated knowledge used as a basis for inference in the system is acquired from domain experts. The proposed Ubiquitous Exercise Plan Generation for Personalized Physical Fitness (UFIT) will not only improve health-related fitness through generating personalized exercise plans, but also aid users in avoiding inappropriate work outs.
Su, Chuan-Jun; Chiang, Chang-Yu; Chih, Meng-Chun
2014-01-01
Good physical fitness generally makes the body less prone to common diseases. A personalized exercise plan that promotes a balanced approach to fitness helps promotes fitness, while inappropriate forms of exercise can have adverse consequences for health. This paper aims to develop an ontology-driven knowledge-based system for generating custom-designed exercise plans based on a user's profile and health status, incorporating international standard Health Level Seven International (HL7) data on physical fitness and health screening. The generated plan exposing Representational State Transfer (REST) style web services which can be accessed from any Internet-enabled device and deployed in cloud computing environments. To ensure the practicality of the generated exercise plans, encapsulated knowledge used as a basis for inference in the system is acquired from domain experts. The proposed Ubiquitous Exercise Plan Generation for Personalized Physical Fitness (UFIT) will not only improve health-related fitness through generating personalized exercise plans, but also aid users in avoiding inappropriate work outs. PMID:24608002
PERKAM: Personalized Knowledge Awareness Map for Computer Supported Ubiquitous Learning
ERIC Educational Resources Information Center
El-Bishouty, Moushir M.; Ogata, Hiroaki; Yano, Yoneo
2007-01-01
This paper introduces a ubiquitous computing environment in order to support the learners while doing tasks; this environment is called PERKAM (PERsonalized Knowledge Awareness Map). PERKAM allows the learners to share knowledge, interact, collaborate, and exchange individual experiences. It utilizes the RFID ubiquities technology to detect the…
A New Approach to Understanding Information Assurance
NASA Astrophysics Data System (ADS)
Blyth, Andrew; Williams, Colin; Bryant, Ian; Mattinson, Harvey
The growth of technologies such as ubiquitous and the mobile computing has resulted in the need for a rethinking of the security paradigm. Over the past forty years technology has made fast steps forward, yet most organisations still view security in terms of Confidentiality, Integrity and Availability (CIA). This model of security has expanded to include Non-Repudiation and Authentication. However this thinking fails to address the social, ethical and business requirements that the modern use of computing has generated. Today computing devices are integrated into every facet of business with the result that security technologies have struggled to keep pace with the rate of change. In this paper we will argue that the currently view that most organisations/stakeholders have of security is out-of-date, or in some cases wrong, and that the new view of security needs to be rooted in business impact and business function.
Surface Traps in Colloidal Quantum Dots: A Combined Experimental and Theoretical Perspective
2017-01-01
Surface traps are ubiquitous to nanoscopic semiconductor materials. Understanding their atomistic origin and manipulating them chemically have capital importance to design defect-free colloidal quantum dots and make a leap forward in the development of efficient optoelectronic devices. Recent advances in computing power established computational chemistry as a powerful tool to describe accurately complex chemical species and nowadays it became conceivable to model colloidal quantum dots with realistic sizes and shapes. In this Perspective, we combine the knowledge gathered in recent experimental findings with the computation of quantum dot electronic structures. We analyze three different systems: namely, CdSe, PbS, and CsPbI3 as benchmark semiconductor nanocrystals showing how different types of trap states can form at their surface. In addition, we suggest experimental healing of such traps according to their chemical origin and nanocrystal composition. PMID:28972763
Massive parallelization of serial inference algorithms for a complex generalized linear model
Suchard, Marc A.; Simpson, Shawn E.; Zorych, Ivan; Ryan, Patrick; Madigan, David
2014-01-01
Following a series of high-profile drug safety disasters in recent years, many countries are redoubling their efforts to ensure the safety of licensed medical products. Large-scale observational databases such as claims databases or electronic health record systems are attracting particular attention in this regard, but present significant methodological and computational concerns. In this paper we show how high-performance statistical computation, including graphics processing units, relatively inexpensive highly parallel computing devices, can enable complex methods in large databases. We focus on optimization and massive parallelization of cyclic coordinate descent approaches to fit a conditioned generalized linear model involving tens of millions of observations and thousands of predictors in a Bayesian context. We find orders-of-magnitude improvement in overall run-time. Coordinate descent approaches are ubiquitous in high-dimensional statistics and the algorithms we propose open up exciting new methodological possibilities with the potential to significantly improve drug safety. PMID:25328363
Non-standard analysis and embedded software
NASA Technical Reports Server (NTRS)
Platek, Richard
1995-01-01
One model for computing in the future is ubiquitous, embedded computational devices analogous to embedded electrical motors. Many of these computers will control physical objects and processes. Such hidden computerized environments introduce new safety and correctness concerns whose treatment go beyond present Formal Methods. In particular, one has to begin to speak about Real Space software in analogy with Real Time software. By this we mean, computerized systems which have to meet requirements expressed in the real geometry of space. How to translate such requirements into ordinary software specifications and how to carry out proofs is a major challenge. In this talk we propose a research program based on the use of no-standard analysis. Much detail remains to be carried out. The purpose of the talk is to inform the Formal Methods community that Non-Standard Analysis provides a possible avenue to attack which we believe will be fruitful.
mORCA: ubiquitous access to life science web services.
Diaz-Del-Pino, Sergio; Trelles, Oswaldo; Falgueras, Juan
2018-01-16
Technical advances in mobile devices such as smartphones and tablets have produced an extraordinary increase in their use around the world and have become part of our daily lives. The possibility of carrying these devices in a pocket, particularly mobile phones, has enabled ubiquitous access to Internet resources. Furthermore, in the life sciences world there has been a vast proliferation of data types and services that finish as Web Services. This suggests the need for research into mobile clients to deal with life sciences applications for effective usage and exploitation. Analysing the current features in existing bioinformatics applications managing Web Services, we have devised, implemented, and deployed an easy-to-use web-based lightweight mobile client. This client is able to browse, select, compose parameters, invoke, and monitor the execution of Web Services stored in catalogues or central repositories. The client is also able to deal with huge amounts of data between external storage mounts. In addition, we also present a validation use case, which illustrates the usage of the application while executing, monitoring, and exploring the results of a registered workflow. The software its available in the Apple Store and Android Market and the source code is publicly available in Github. Mobile devices are becoming increasingly important in the scientific world due to their strong potential impact on scientific applications. Bioinformatics should not fall behind this trend. We present an original software client that deals with the intrinsic limitations of such devices and propose different guidelines to provide location-independent access to computational resources in bioinformatics and biomedicine. Its modular design makes it easily expandable with the inclusion of new repositories, tools, types of visualization, etc.
New functionalities in abundant element oxides: ubiquitous element strategy
Hosono, Hideo; Hayashi, Katsuro; Kamiya, Toshio; Atou, Toshiyuki; Susaki, Tomofumi
2011-01-01
While most ceramics are composed of ubiquitous elements (the ten most abundant elements within the Earth's crust), many advanced materials are based on rare elements. A ‘rare-element crisis’ is approaching owing to the imbalance between the limited supply of rare elements and the increasing demand. Therefore, we propose a ‘ubiquitous element strategy’ for materials research, which aims to apply abundant elements in a variety of innovative applications. Creation of innovative oxide materials and devices based on conventional ceramics is one specific challenge. This review describes the concept of ubiquitous element strategy and gives some highlights of our recent research on the synthesis of electronic, thermionic and structural materials using ubiquitous elements. PMID:27877391
Mobile Modelling for Crowdsourcing Building Interior Data
NASA Astrophysics Data System (ADS)
Rosser, J.; Morley, J.; Jackson, M.
2012-06-01
Indoor spatial data forms an important foundation to many ubiquitous computing applications. It gives context to users operating location-based applications, provides an important source of documentation of buildings and can be of value to computer systems where an understanding of environment is required. Unlike external geographic spaces, no centralised body or agency is charged with collecting or maintaining such information. Widespread deployment of mobile devices provides a potential tool that would allow rapid model capture and update by a building's users. Here we introduce some of the issues involved in volunteering building interior data and outline a simple mobile tool for capture of indoor models. The nature of indoor data is inherently private; however in-depth analysis of this issue and legal considerations are not discussed in detail here.
A new mobile ubiquitous computing application to control obesity: SapoFit.
Rodrigues, Joel J P C; Lopes, Ivo M C; Silva, Bruno M C; Torre, Isabel de La
2013-01-01
The objective of this work was the proposal, design, construction and validation of a mobile health system for dietetic monitoring and assessment, called SapoFit. This application may be personalized to keep a daily personal health record of an individual's food intake and daily exercise and to share this with a social network. The initiative is a partnership with SAPO - Portugal Telecom. SapoFit uses Web services architecture, a relatively new model for distributed computing and application integration. SapoFit runs on a range of mobile platforms, and it has been implemented successfully in a range of mobile devices and has been evaluated by over 100 users. Most users strongly agree that SapoFit has an attractive design, the environment is user-friendly and intuitive, and the navigation options are clear.
Design requirements for ubiquitous computing environments for healthcare professionals.
Bång, Magnus; Larsson, Anders; Eriksson, Henrik
2004-01-01
Ubiquitous computing environments can support clinical administrative routines in new ways. The aim of such computing approaches is to enhance routine physical work, thus it is important to identify specific design requirements. We studied healthcare professionals in an emergency room and developed the computer-augmented environment NOSTOS to support teamwork in that setting. NOSTOS uses digital pens and paper-based media as the primary input interface for data capture and as a means of controlling the system. NOSTOS also includes a digital desk, walk-up displays, and sensor technology that allow the system to track documents and activities in the workplace. We propose a set of requirements and discuss the value of tangible user interfaces for healthcare personnel. Our results suggest that the key requirements are flexibility in terms of system usage and seamless integration between digital and physical components. We also discuss how ubiquitous computing approaches like NOSTOS can be beneficial in the medical workplace.
Boyer, Edward W; Smelson, David; Fletcher, Richard; Ziedonis, Douglas; Picard, Rosalind W
2010-06-01
Beneficial advances in the treatment of substance abuse and compliance with medical therapies, including HAART, are possible with new mobile technologies related to personal physiological sensing and computational methods. When incorporated into mobile platforms that allow for ubiquitous computing, these technologies have great potential for extending the reach of behavioral interventions from clinical settings where they are learned into natural environments.
Twenty-First Century Learning: Communities, Interaction and Ubiquitous Computing
ERIC Educational Resources Information Center
Leh, Amy S.C.; Kouba, Barbara; Davis, Dirk
2005-01-01
Advanced technology makes 21st century learning, communities and interactions unique and leads people to an era of ubiquitous computing. The purpose of this article is to contribute to the discussion of learning in the 21st century. The paper will review literature on learning community, community learning, interaction, 21st century learning and…
Conditions for Ubiquitous Computing: What Can Be Learned from a Longitudinal Study
ERIC Educational Resources Information Center
Lei, Jing
2010-01-01
Based on survey data and interview data collected over four academic years, this longitudinal study examined how a ubiquitous computing project evolved along with the changes in teachers, students, the human infrastructure, and technology infrastructure in the school. This study also investigated what conditions were necessary for successful…
Ubiquitous Computing--Are We Crazy? Point/Counterpoint
ERIC Educational Resources Information Center
DeWitt, Scott W.; Horn, Patricia S.
2005-01-01
The push for ubiquitous computing (UC) relies on an understandable and well-intentioned belief that teaching and schooling need to be transformed. This view appears credible based on large-scale criteria, such as test scores relative to other countries, drop-out rates, and economic changes. And the use of technology to achieve this goal is…
NASA Astrophysics Data System (ADS)
Pavlichin, Dmitri S.; Mabuchi, Hideo
2014-06-01
Nanoscale integrated photonic devices and circuits offer a path to ultra-low power computation at the few-photon level. Here we propose an optical circuit that performs a ubiquitous operation: the controlled, random-access readout of a collection of stored memory phases or, equivalently, the computation of the inner product of a vector of phases with a binary selector" vector, where the arithmetic is done modulo 2pi and the result is encoded in the phase of a coherent field. This circuit, a collection of cascaded interferometers driven by a coherent input field, demonstrates the use of coherence as a computational resource, and of the use of recently-developed mathematical tools for modeling optical circuits with many coupled parts. The construction extends in a straightforward way to the computation of matrix-vector and matrix-matrix products, and, with the inclusion of an optical feedback loop, to the computation of a weighted" readout of stored memory phases. We note some applications of these circuits for error correction and for computing tasks requiring fast vector inner products, e.g. statistical classification and some machine learning algorithms.
Computational Physics' Greatest Hits
NASA Astrophysics Data System (ADS)
Bug, Amy
2011-03-01
The digital computer, has worked its way so effectively into our profession that now, roughly 65 years after its invention, it is virtually impossible to find a field of experimental or theoretical physics unaided by computational innovation. It is tough to think of another device about which one can make that claim. In the session ``What is computational physics?'' speakers will distinguish computation within the field of computational physics from this ubiquitous importance across all subfields of physics. This talk will recap the invited session ``Great Advances...Past, Present and Future'' in which five dramatic areas of discovery (five of our ``greatest hits'') are chronicled: The physics of many-boson systems via Path Integral Monte Carlo, the thermodynamic behavior of a huge number of diverse systems via Monte Carlo Methods, the discovery of new pharmaceutical agents via molecular dynamics, predictive simulations of global climate change via detailed, cross-disciplinary earth system models, and an understanding of the formation of the first structures in our universe via galaxy formation simulations. The talk will also identify ``greatest hits'' in our field from the teaching and research perspectives of other members of DCOMP, including its Executive Committee.
Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing.
Ehatisham-Ul-Haq, Muhammad; Azam, Muhammad Awais; Loo, Jonathan; Shuang, Kai; Islam, Syed; Naeem, Usman; Amin, Yasar
2017-09-06
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and convenience, many users tend to store their private data, such as personal identifiers and bank account details, on their smartphone. However, this sensitive data can be vulnerable if the device gets stolen or lost. A traditional approach for protecting this type of data on mobile devices is to authenticate users with mechanisms such as PINs, passwords, and fingerprint recognition. However, these techniques are vulnerable to user compliance and a plethora of attacks, such as smudge attacks. The work in this paper addresses these challenges by proposing a novel authentication framework, which is based on recognizing the behavioral traits of smartphone users using the embedded sensors of smartphone, such as Accelerometer, Gyroscope and Magnetometer. The proposed framework also provides a platform for carrying out multi-class smart user authentication, which provides different levels of access to a wide range of smartphone users. This work has been validated with a series of experiments, which demonstrate the effectiveness of the proposed framework.
Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing
Ehatisham-ul-Haq, Muhammad; Azam, Muhammad Awais; Loo, Jonathan; Shuang, Kai; Islam, Syed; Naeem, Usman; Amin, Yasar
2017-01-01
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and convenience, many users tend to store their private data, such as personal identifiers and bank account details, on their smartphone. However, this sensitive data can be vulnerable if the device gets stolen or lost. A traditional approach for protecting this type of data on mobile devices is to authenticate users with mechanisms such as PINs, passwords, and fingerprint recognition. However, these techniques are vulnerable to user compliance and a plethora of attacks, such as smudge attacks. The work in this paper addresses these challenges by proposing a novel authentication framework, which is based on recognizing the behavioral traits of smartphone users using the embedded sensors of smartphone, such as Accelerometer, Gyroscope and Magnetometer. The proposed framework also provides a platform for carrying out multi-class smart user authentication, which provides different levels of access to a wide range of smartphone users. This work has been validated with a series of experiments, which demonstrate the effectiveness of the proposed framework. PMID:28878177
Visualisation of Interaction Footprints for Engagement in Online Communities
ERIC Educational Resources Information Center
Glahn, Christian; Specht, Marcus; Koper, Rob
2009-01-01
Contextualised and ubiquitous learning are relatively new research areas that combine the latest developments in ubiquitous and context aware computing with educational approaches in order to provide structure to more situated and context aware learning. The majority of recent activities in contextualised and ubiquitous learning focus on mobile…
A wireless potentiostat for mobile chemical sensing and biosensing.
Steinberg, Matthew D; Kassal, Petar; Kereković, Irena; Steinberg, Ivana Murković
2015-10-01
Wireless chemical sensors are used as analytical devices in homeland defence, home-based healthcare, food logistics and more generally for the Sensor Internet of Things (SIoT). Presented here is a battery-powered and highly portable credit-card size potentiostat that is suitable for performing mobile and wearable amperometric electrochemical measurements with seamless wireless data transfer to mobile computing devices. The mobile electrochemical analytical system has been evaluated in the laboratory with a model redox system - the reduction of hexacyanoferrate(III) - and also with commercially available enzymatic blood-glucose test-strips. The potentiostat communicates wirelessly with mobile devices such as tablets or Smartphones by near-field communication (NFC) or with personal computers by radio-frequency identification (RFID), and thus provides a solution to the 'missing link' in connectivity that often exists between low-cost mobile and wearable chemical sensors and ubiquitous mobile computing products. The mobile potentiostat has been evaluated in the laboratory with a set of proof-of-concept experiments, and its analytical performance compared with a commercial laboratory potentiostat (R(2)=0.9999). These first experimental results demonstrate the functionality of the wireless potentiostat and suggest that the device could be suitable for wearable and point-of-sample analytical measurements. We conclude that the wireless potentiostat could contribute significantly to the advancement of mobile chemical sensor research and adoption, in particular for wearable sensors in healthcare and sport physiology, for wound monitoring and in mobile point-of-sample diagnostics as well as more generally as a part of the Sensor Internet of Things. Copyright © 2015 Elsevier B.V. All rights reserved.
Toward Psychoinformatics: Computer Science Meets Psychology
Duke, Éilish; Markowetz, Alexander
2016-01-01
The present paper provides insight into an emerging research discipline called Psychoinformatics. In the context of Psychoinformatics, we emphasize the cooperation between the disciplines of psychology and computer science in handling large data sets derived from heavily used devices, such as smartphones or online social network sites, in order to shed light on a large number of psychological traits, including personality and mood. New challenges await psychologists in light of the resulting “Big Data” sets, because classic psychological methods will only in part be able to analyze this data derived from ubiquitous mobile devices, as well as other everyday technologies. As a consequence, psychologists must enrich their scientific methods through the inclusion of methods from informatics. The paper provides a brief review of one area of this research field, dealing mainly with social networks and smartphones. Moreover, we highlight how data derived from Psychoinformatics can be combined in a meaningful way with data from human neuroscience. We close the paper with some observations of areas for future research and problems that require consideration within this new discipline. PMID:27403204
An experimental study of the putative mechanism of a synthetic autonomous rotary DNA nanomotor
NASA Astrophysics Data System (ADS)
Dunn, K. E.; Leake, M. C.; Wollman, A. J. M.; Trefzer, M. A.; Johnson, S.; Tyrrell, A. M.
2017-03-01
DNA has been used to construct a wide variety of nanoscale molecular devices. Inspiration for such synthetic molecular machines is frequently drawn from protein motors, which are naturally occurring and ubiquitous. However, despite the fact that rotary motors such as ATP synthase and the bacterial flagellar motor play extremely important roles in nature, very few rotary devices have been constructed using DNA. This paper describes an experimental study of the putative mechanism of a rotary DNA nanomotor, which is based on strand displacement, the phenomenon that powers many synthetic linear DNA motors. Unlike other examples of rotary DNA machines, the device described here is designed to be capable of autonomous operation after it is triggered. The experimental results are consistent with operation of the motor as expected, and future work on an enhanced motor design may allow rotation to be observed at the single-molecule level. The rotary motor concept presented here has potential applications in molecular processing, DNA computing, biosensing and photonics.
Supporting Teacher Orchestration in Ubiquitous Learning Environments: A Study in Primary Education
ERIC Educational Resources Information Center
Muñoz-Cristóbal, Juan A.; Jorrín-Abellán, Iván M.; Asensio-Pérez, Juan I.; Martínez-Monés, Alejandra; Prieto, Luis P.; Dimitriadis, Yannis
2015-01-01
During the last decades, educational contexts have transformed into complex technological and social ecologies, with mobile devices expanding the scope of education beyond the traditional classroom, creating so-called Ubiquitous Learning Environments (ULEs). However, these new technological opportunities entail an additional burden for teachers,…
Persistent Memory in Single Node Delay-Coupled Reservoir Computing.
Kovac, André David; Koall, Maximilian; Pipa, Gordon; Toutounji, Hazem
2016-01-01
Delays are ubiquitous in biological systems, ranging from genetic regulatory networks and synaptic conductances, to predator/pray population interactions. The evidence is mounting, not only to the presence of delays as physical constraints in signal propagation speed, but also to their functional role in providing dynamical diversity to the systems that comprise them. The latter observation in biological systems inspired the recent development of a computational architecture that harnesses this dynamical diversity, by delay-coupling a single nonlinear element to itself. This architecture is a particular realization of Reservoir Computing, where stimuli are injected into the system in time rather than in space as is the case with classical recurrent neural network realizations. This architecture also exhibits an internal memory which fades in time, an important prerequisite to the functioning of any reservoir computing device. However, fading memory is also a limitation to any computation that requires persistent storage. In order to overcome this limitation, the current work introduces an extended version to the single node Delay-Coupled Reservoir, that is based on trained linear feedback. We show by numerical simulations that adding task-specific linear feedback to the single node Delay-Coupled Reservoir extends the class of solvable tasks to those that require nonfading memory. We demonstrate, through several case studies, the ability of the extended system to carry out complex nonlinear computations that depend on past information, whereas the computational power of the system with fading memory alone quickly deteriorates. Our findings provide the theoretical basis for future physical realizations of a biologically-inspired ultrafast computing device with extended functionality.
Persistent Memory in Single Node Delay-Coupled Reservoir Computing
Pipa, Gordon; Toutounji, Hazem
2016-01-01
Delays are ubiquitous in biological systems, ranging from genetic regulatory networks and synaptic conductances, to predator/pray population interactions. The evidence is mounting, not only to the presence of delays as physical constraints in signal propagation speed, but also to their functional role in providing dynamical diversity to the systems that comprise them. The latter observation in biological systems inspired the recent development of a computational architecture that harnesses this dynamical diversity, by delay-coupling a single nonlinear element to itself. This architecture is a particular realization of Reservoir Computing, where stimuli are injected into the system in time rather than in space as is the case with classical recurrent neural network realizations. This architecture also exhibits an internal memory which fades in time, an important prerequisite to the functioning of any reservoir computing device. However, fading memory is also a limitation to any computation that requires persistent storage. In order to overcome this limitation, the current work introduces an extended version to the single node Delay-Coupled Reservoir, that is based on trained linear feedback. We show by numerical simulations that adding task-specific linear feedback to the single node Delay-Coupled Reservoir extends the class of solvable tasks to those that require nonfading memory. We demonstrate, through several case studies, the ability of the extended system to carry out complex nonlinear computations that depend on past information, whereas the computational power of the system with fading memory alone quickly deteriorates. Our findings provide the theoretical basis for future physical realizations of a biologically-inspired ultrafast computing device with extended functionality. PMID:27783690
Four Stages of Research on the Educational Use of Ubiquitous Computing
ERIC Educational Resources Information Center
Laru, Jari; Naykki, Piia; Järvelä, Sanna
2015-01-01
In this paper, the Gartner Group's hype cycle is used as the basis for categorizing and analyzing research on the educational use of ubiquitous computing. There are five phases of the hype cycle: the technology trigger, the peak of inflated expectations, the trough of disillusionment, the slope of enlightenment, and the plateau of productivity.…
Network architecture test-beds as platforms for ubiquitous computing.
Roscoe, Timothy
2008-10-28
Distributed systems research, and in particular ubiquitous computing, has traditionally assumed the Internet as a basic underlying communications substrate. Recently, however, the networking research community has come to question the fundamental design or 'architecture' of the Internet. This has been led by two observations: first, that the Internet as it stands is now almost impossible to evolve to support new functionality; and second, that modern applications of all kinds now use the Internet rather differently, and frequently implement their own 'overlay' networks above it to work around its perceived deficiencies. In this paper, I discuss recent academic projects to allow disruptive change to the Internet architecture, and also outline a radically different view of networking for ubiquitous computing that such proposals might facilitate.
ERIC Educational Resources Information Center
Phelps, Megan; Scott, Karen M.; Chauffeté-Manillier, Martine; Lenne, Frédéric; Le Jeunne, Claire
2017-01-01
Mobile devices are ubiquitous worldwide, including in hospitals. "Just in time" learning provided by these devices is important for students. We investigated current use of, and learning with, smartphones and other mobile devices by medical students in Parisian hospitals. A survey with quantitative and qualitative items previously used…
Application of ubiquitous computing in personal health monitoring systems.
Kunze, C; Grossmann, U; Stork, W; Müller-Glaser, K D
2002-01-01
A possibility to significantly reduce the costs of public health systems is to increasingly use information technology. The Laboratory for Information Processing Technology (ITIV) at the University of Karlsruhe is developing a personal health monitoring system, which should improve health care and at the same time reduce costs by combining micro-technological smart sensors with personalized, mobile computing systems. In this paper we present how ubiquitous computing theory can be applied in the health-care domain.
Cardone, Daniela; Merla, Arcangelo
2017-01-01
Thermal infrared imaging has been proposed, and is now used, as a tool for the non-contact and non-invasive computational assessment of human autonomic nervous activity and psychophysiological states. Thanks to a new generation of high sensitivity infrared thermal detectors and the development of computational models of the autonomic control of the facial cutaneous temperature, several autonomic variables can be computed through thermal infrared imaging, including localized blood perfusion rate, cardiac pulse rate, breath rate, sudomotor and stress responses. In fact, all of these parameters impact on the control of the cutaneous temperature. The physiological information obtained through this approach, could then be used to infer about a variety of psychophysiological or emotional states, as proved by the increasing number of psychophysiology or neurosciences studies that use thermal infrared imaging. This paper presents a review of the principal achievements of thermal infrared imaging in computational psychophysiology, focusing on the capability of the technique for providing ubiquitous and unwired monitoring of psychophysiological activity and affective states. It also presents a summary on the modern, up-to-date infrared sensors technology. PMID:28475155
Cardone, Daniela; Merla, Arcangelo
2017-05-05
Thermal infrared imaging has been proposed, and is now used, as a tool for the non-contact and non-invasive computational assessment of human autonomic nervous activity and psychophysiological states. Thanks to a new generation of high sensitivity infrared thermal detectors and the development of computational models of the autonomic control of the facial cutaneous temperature, several autonomic variables can be computed through thermal infrared imaging, including localized blood perfusion rate, cardiac pulse rate, breath rate, sudomotor and stress responses. In fact, all of these parameters impact on the control of the cutaneous temperature. The physiological information obtained through this approach, could then be used to infer about a variety of psychophysiological or emotional states, as proved by the increasing number of psychophysiology or neurosciences studies that use thermal infrared imaging. This paper presents a review of the principal achievements of thermal infrared imaging in computational psychophysiology, focusing on the capability of the technique for providing ubiquitous and unwired monitoring of psychophysiological activity and affective states. It also presents a summary on the modern, up-to-date infrared sensors technology.
ERIC Educational Resources Information Center
Bernard, Robert M.; Bethel, Edward Clement; Abrami, Philip C.; Wade, C. Anne
2007-01-01
This study examines the achievement outcomes accompanying the implementation of a Grade 3 laptop or so-called "ubiquitous computing" program in a Quebec school district. CAT3 reading, language, and mathematics batteries were administered at the end of Grade 2 and again at the end of Grade 3, after the first year of computer…
A service based adaptive U-learning system using UX.
Jeong, Hwa-Young; Yi, Gangman
2014-01-01
In recent years, traditional development techniques for e-learning systems have been changing to become more convenient and efficient. One new technology in the development of application systems includes both cloud and ubiquitous computing. Cloud computing can support learning system processes by using services while ubiquitous computing can provide system operation and management via a high performance technical process and network. In the cloud computing environment, a learning service application can provide a business module or process to the user via the internet. This research focuses on providing the learning material and processes of courses by learning units using the services in a ubiquitous computing environment. And we also investigate functions that support users' tailored materials according to their learning style. That is, we analyzed the user's data and their characteristics in accordance with their user experience. We subsequently applied the learning process to fit on their learning performance and preferences. Finally, we demonstrate how the proposed system outperforms learning effects to learners better than existing techniques.
A Service Based Adaptive U-Learning System Using UX
Jeong, Hwa-Young
2014-01-01
In recent years, traditional development techniques for e-learning systems have been changing to become more convenient and efficient. One new technology in the development of application systems includes both cloud and ubiquitous computing. Cloud computing can support learning system processes by using services while ubiquitous computing can provide system operation and management via a high performance technical process and network. In the cloud computing environment, a learning service application can provide a business module or process to the user via the internet. This research focuses on providing the learning material and processes of courses by learning units using the services in a ubiquitous computing environment. And we also investigate functions that support users' tailored materials according to their learning style. That is, we analyzed the user's data and their characteristics in accordance with their user experience. We subsequently applied the learning process to fit on their learning performance and preferences. Finally, we demonstrate how the proposed system outperforms learning effects to learners better than existing techniques. PMID:25147832
ERIC Educational Resources Information Center
Peng, Hsinyi; Chuang, Po-Ya; Hwang, Gwo-Jen; Chu, Hui-Chun; Wu, Ting-Ting; Huang, Shu-Xian
2009-01-01
Researchers have conducted various studies on applying wireless communication and ubiquitous computing technologies to education, so that the technologies can provide learners and educators with more active and adaptive support. This study proposes a Ubiquitous Performance-support System (UPSS) that can facilitate the seamless use of powerful new…
Ubiquitous Learning Project Using Life-Logging Technology in Japan
ERIC Educational Resources Information Center
Ogata, Hiroaki; Hou, Bin; Li, Mengmeng; Uosaki, Noriko; Mouri, Kosuke; Liu, Songran
2014-01-01
A Ubiquitous Learning Log (ULL) is defined as a digital record of what a learner has learned in daily life using ubiquitous computing technologies. In this paper, a project which developed a system called SCROLL (System for Capturing and Reusing Of Learning Log) is presented. The aim of developing SCROLL is to help learners record, organize,…
Villalonga, Claudia; Damas, Miguel
2014-01-01
Technological advances on the development of mobile devices, medical sensors, and wireless communication systems support a new generation of unobtrusive, portable, and ubiquitous health monitoring systems for continuous patient assessment and more personalized health care. There exist a growing number of mobile apps in the health domain; however, little contribution has been specifically provided, so far, to operate this kind of apps with wearable physiological sensors. The PhysioDroid, presented in this paper, provides a personalized means to remotely monitor and evaluate users' conditions. The PhysioDroid system provides ubiquitous and continuous vital signs analysis, such as electrocardiogram, heart rate, respiration rate, skin temperature, and body motion, intended to help empower patients and improve clinical understanding. The PhysioDroid is composed of a wearable monitoring device and an Android app providing gathering, storage, and processing features for the physiological sensor data. The versatility of the developed app allows its use for both average users and specialists, and the reduced cost of the PhysioDroid puts it at the reach of most people. Two exemplary use cases for health assessment and sports training are presented to illustrate the capabilities of the PhysioDroid. Next technical steps include generalization to other mobile platforms and health monitoring devices. PMID:25295301
Banos, Oresti; Villalonga, Claudia; Damas, Miguel; Gloesekoetter, Peter; Pomares, Hector; Rojas, Ignacio
2014-01-01
Technological advances on the development of mobile devices, medical sensors, and wireless communication systems support a new generation of unobtrusive, portable, and ubiquitous health monitoring systems for continuous patient assessment and more personalized health care. There exist a growing number of mobile apps in the health domain; however, little contribution has been specifically provided, so far, to operate this kind of apps with wearable physiological sensors. The PhysioDroid, presented in this paper, provides a personalized means to remotely monitor and evaluate users' conditions. The PhysioDroid system provides ubiquitous and continuous vital signs analysis, such as electrocardiogram, heart rate, respiration rate, skin temperature, and body motion, intended to help empower patients and improve clinical understanding. The PhysioDroid is composed of a wearable monitoring device and an Android app providing gathering, storage, and processing features for the physiological sensor data. The versatility of the developed app allows its use for both average users and specialists, and the reduced cost of the PhysioDroid puts it at the reach of most people. Two exemplary use cases for health assessment and sports training are presented to illustrate the capabilities of the PhysioDroid. Next technical steps include generalization to other mobile platforms and health monitoring devices.
Logic-centered architecture for ubiquitous health monitoring.
Lewandowski, Jacek; Arochena, Hisbel E; Naguib, Raouf N G; Chao, Kuo-Ming; Garcia-Perez, Alexeis
2014-09-01
One of the key points to maintain and boost research and development in the area of smart wearable systems (SWS) is the development of integrated architectures for intelligent services, as well as wearable systems and devices for health and wellness management. This paper presents such a generic architecture for multiparametric, intelligent and ubiquitous wireless sensing platforms. It is a transparent, smartphone-based sensing framework with customizable wireless interfaces and plug'n'play capability to easily interconnect third party sensor devices. It caters to wireless body, personal, and near-me area networks. A pivotal part of the platform is the integrated inference engine/runtime environment that allows the mobile device to serve as a user-adaptable personal health assistant. The novelty of this system lays in a rapid visual development and remote deployment model. The complementary visual Inference Engine Editor that comes with the package enables artificial intelligence specialists, alongside with medical experts, to build data processing models by assembling different components and instantly deploying them (remotely) on patient mobile devices. In this paper, the new logic-centered software architecture for ubiquitous health monitoring applications is described, followed by a discussion as to how it helps to shift focus from software and hardware development, to medical and health process-centered design of new SWS applications.
AUDIS wear: a smartwatch based assistive device for ubiquitous awareness of environmental sounds.
Mielke, Matthias; Bruck, Rainer
2016-08-01
A multitude of assistive devices is available for deaf people (i.e. deaf, deafened, and hard of hearing). Besides hearing and communication aids, devices to access environmental sounds are available commercially. But the devices have two major drawbacks: 1. they are targeted at indoor environments (e.g. home or work), and 2. only specific events are supported (e.g. the doorbell or telephone). Recent research shows that important sounds can occur in all contexts and that the interests in sounds are diverse. These drawbacks can be tackled by using modern information and communication technology that enables the development of new and improved assistive devices. The smartwatch, a new computing platform in the form of a wristwatch, offers new potential for assistive technology. Its design promises a perfect integration into various different social contexts and thus blends perfectly into the user's life. Based on a smartwatch and algorithms from pattern recognition, a prototype for awareness of environmental sounds is presented here. It observes the acoustic environment of the user and detects environmental sounds. A vibration is triggered when a sound is detected and the type of sound is shown on the display. The design of the prototype was discussed with deaf people in semi-structured interviews, leading to a set of implications for the design of such a device.
Multiplatform E-Learning Systems and Technologies: Mobile Devices for Ubiquitous ICT-Based Education
ERIC Educational Resources Information Center
Goh, Tiong Thye, Ed.
2010-01-01
Multiplatform e-learning systems are emerging technologies that provide integrated learning content to various accessing devices. This book addresses technical challenges, design frameworks, and development experiences of the future that integrate multiple mobile devices into a single multiplatform e-learning system. With expert international…
Expressing clinical data sets with openEHR archetypes: a solid basis for ubiquitous computing.
Garde, Sebastian; Hovenga, Evelyn; Buck, Jasmin; Knaup, Petra
2007-12-01
The purpose of this paper is to analyse the feasibility and usefulness of expressing clinical data sets (CDSs) as openEHR archetypes. For this, we present an approach to transform CDS into archetypes, and outline typical problems with CDS and analyse whether some of these problems can be overcome by the use of archetypes. Literature review and analysis of a selection of existing Australian, German, other European and international CDSs; transfer of a CDS for Paediatric Oncology into openEHR archetypes; implementation of CDSs in application systems. To explore the feasibility of expressing CDS as archetypes an approach to transform existing CDSs into archetypes is presented in this paper. In case of the Paediatric Oncology CDS (which consists of 260 data items) this lead to the definition of 48 openEHR archetypes. To analyse the usefulness of expressing CDS as archetypes, we identified nine problems with CDS that currently remain unsolved without a common model underpinning the CDS. Typical problems include incompatible basic data types and overlapping and incompatible definitions of clinical content. A solution to most of these problems based on openEHR archetypes is motivated. With regard to integrity constraints, further research is required. While openEHR cannot overcome all barriers to Ubiquitous Computing, it can provide the common basis for ubiquitous presence of meaningful and computer-processable knowledge and information, which we believe is a basic requirement for Ubiquitous Computing. Expressing CDSs as openEHR archetypes is feasible and advantageous as it fosters semantic interoperability, supports ubiquitous computing, and helps to develop archetypes that are arguably of better quality than the original CDS.
Mobile Devices: Toys or Learning Tools for the 21st Century Teenagers?
ERIC Educational Resources Information Center
Kee, Ch'ng Lay; Samsudin, Zarina
2014-01-01
Learning is interwoven in daily life and so it can be take place at anytime and anywhere by using mobile device. In the 21st century, mobile devices have become ubiquitous, affordable and accessible for the teenagers. The teenagers have the opportunity to perform the learning activities by using the mobile devices. However, what are they used…
ERIC Educational Resources Information Center
Pogany, Wade S.
2009-01-01
With technology changing the world at a rapid rate, the impact of ubiquitous computing in the classroom has had an influence on education. As the number of one-to-one laptop initiatives grows, the need for further research on the effects of teaching and learning also increases. This case study sought to examine changes in teaching that resulted…
Garde, Sebastian; Hovenga, Evelyn; Buck, Jasmin; Knaup, Petra
2006-01-01
Ubiquitous computing requires ubiquitous access to information and knowledge. With the release of openEHR Version 1.0 there is a common model available to solve some of the problems related to accessing information and knowledge by improving semantic interoperability between clinical systems. Considerable work has been undertaken by various bodies to standardise Clinical Data Sets. Notwithstanding their value, several problems remain unsolved with Clinical Data Sets without the use of a common model underpinning them. This paper outlines these problems like incompatible basic data types and overlapping and incompatible definitions of clinical content. A solution to this based on openEHR archetypes is motivated and an approach to transform existing Clinical Data Sets into archetypes is presented. To avoid significant overlaps and unnecessary effort during archetype development, archetype development needs to be coordinated nationwide and beyond and also across the various health professions in a formalized process.
Petousis, Ioannis; Mrdjenovich, David; Ballouz, Eric; ...
2017-01-31
Dielectrics are an important class of materials that are ubiquitous in modern electronic applications. Even though their properties are important for the performance of devices, the number of compounds with known dielectric constant is on the order of a few hundred. Here, we use Density Functional Perturbation Theory as a way to screen for the dielectric constant and refractive index of materials in a fast and computationally efficient way. Our results constitute the largest dielectric tensors database to date, containing 1,056 compounds. Details regarding the computational methodology and technical validation are presented along with the format of our publicly availablemore » data. In addition, we integrate our dataset with the Materials Project allowing users easy access to material properties. Finally, we explain how our dataset and calculation methodology can be used in the search for novel dielectric compounds.« less
Petousis, Ioannis; Mrdjenovich, David; Ballouz, Eric; Liu, Miao; Winston, Donald; Chen, Wei; Graf, Tanja; Schladt, Thomas D.; Persson, Kristin A.; Prinz, Fritz B.
2017-01-01
Dielectrics are an important class of materials that are ubiquitous in modern electronic applications. Even though their properties are important for the performance of devices, the number of compounds with known dielectric constant is on the order of a few hundred. Here, we use Density Functional Perturbation Theory as a way to screen for the dielectric constant and refractive index of materials in a fast and computationally efficient way. Our results constitute the largest dielectric tensors database to date, containing 1,056 compounds. Details regarding the computational methodology and technical validation are presented along with the format of our publicly available data. In addition, we integrate our dataset with the Materials Project allowing users easy access to material properties. Finally, we explain how our dataset and calculation methodology can be used in the search for novel dielectric compounds. PMID:28140408
Petousis, Ioannis; Mrdjenovich, David; Ballouz, Eric; Liu, Miao; Winston, Donald; Chen, Wei; Graf, Tanja; Schladt, Thomas D; Persson, Kristin A; Prinz, Fritz B
2017-01-31
Dielectrics are an important class of materials that are ubiquitous in modern electronic applications. Even though their properties are important for the performance of devices, the number of compounds with known dielectric constant is on the order of a few hundred. Here, we use Density Functional Perturbation Theory as a way to screen for the dielectric constant and refractive index of materials in a fast and computationally efficient way. Our results constitute the largest dielectric tensors database to date, containing 1,056 compounds. Details regarding the computational methodology and technical validation are presented along with the format of our publicly available data. In addition, we integrate our dataset with the Materials Project allowing users easy access to material properties. Finally, we explain how our dataset and calculation methodology can be used in the search for novel dielectric compounds.
Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components.
Fragopoulos, Anastasios; Gialelis, John; Serpanos, Dimitrios
2009-01-01
Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers.
ERIC Educational Resources Information Center
Huang, Yong-Ming; Chen, Chao-Chun; Wang, Ding-Chau
2012-01-01
Ubiquitous learning receives much attention in these few years due to its wide spectrum of applications, such as the T-learning application. The learner can use mobile devices to watch the digital TV based course content, and thus, the T-learning provides the ubiquitous learning environment. However, in real-world data broadcast environments, the…
NASA Astrophysics Data System (ADS)
Sporea, R. A.; Trainor, M. J.; Young, N. D.; Shannon, J. M.; Silva, S. R. P.
2014-03-01
Ultra-large-scale integrated (ULSI) circuits have benefited from successive refinements in device architecture for enormous improvements in speed, power efficiency and areal density. In large-area electronics (LAE), however, the basic building-block, the thin-film field-effect transistor (TFT) has largely remained static. Now, a device concept with fundamentally different operation, the source-gated transistor (SGT) opens the possibility of unprecedented functionality in future low-cost LAE. With its simple structure and operational characteristics of low saturation voltage, stability under electrical stress and large intrinsic gain, the SGT is ideally suited for LAE analog applications. Here, we show using measurements on polysilicon devices that these characteristics lead to substantial improvements in gain, noise margin, power-delay product and overall circuit robustness in digital SGT-based designs. These findings have far-reaching consequences, as LAE will form the technological basis for a variety of future developments in the biomedical, civil engineering, remote sensing, artificial skin areas, as well as wearable and ubiquitous computing, or lightweight applications for space exploration.
Sporea, R. A.; Trainor, M. J.; Young, N. D.; Shannon, J. M.; Silva, S. R. P.
2014-01-01
Ultra-large-scale integrated (ULSI) circuits have benefited from successive refinements in device architecture for enormous improvements in speed, power efficiency and areal density. In large-area electronics (LAE), however, the basic building-block, the thin-film field-effect transistor (TFT) has largely remained static. Now, a device concept with fundamentally different operation, the source-gated transistor (SGT) opens the possibility of unprecedented functionality in future low-cost LAE. With its simple structure and operational characteristics of low saturation voltage, stability under electrical stress and large intrinsic gain, the SGT is ideally suited for LAE analog applications. Here, we show using measurements on polysilicon devices that these characteristics lead to substantial improvements in gain, noise margin, power-delay product and overall circuit robustness in digital SGT-based designs. These findings have far-reaching consequences, as LAE will form the technological basis for a variety of future developments in the biomedical, civil engineering, remote sensing, artificial skin areas, as well as wearable and ubiquitous computing, or lightweight applications for space exploration. PMID:24599023
ERIC Educational Resources Information Center
Bartholomew, Scott
2016-01-01
With the increasingly ubiquitous nature of mobile devices among K-12 students, many argue for and against the inclusion of these devices in K-12 classrooms. Arguments in favor cite instant access to information and collaboration with others as positive affordances made possible through mobile devices. Self-directed learning, a process where…
Prevention of sexually transmitted infections using mobile devices and ubiquitous computing.
Besoain, Felipe; Perez-Navarro, Antoni; Caylà, Joan A; Aviñó, Constanza Jacques; de Olalla, Patricia García
2015-05-03
Advances in the development of information and communication technologies have facilitated social interrelationships, but also sexual contacts without appropriate preventive measures. In this paper, we will focus on situations in which people use applications to meet sexual partners nearby, which could increase their chance of exposure to sexually transmitted infections (STI). How can we encourage users to adopt preventive measures without violating their privacy or infringing on the character of the application? To achieve the goal of preventing STI, we have used the design and creation methodology and have developed a prototype software package. This prototype follows the RESTful services principles and has two parts: an Android OS application with emphasis on ubiquitous computing and designed according to General Responsibility Assignment Software Patterns (GRASP), and a server with a web page. To choose the preventive messages, we performed a test in 17 men who have sex with men (MSM). Our software sends preventive notifications to users when it detects situations such as the activation of particular applications on their smartphones, or their proximity to areas with a high probability of intercourse (hot zones). The underlying idea is the same as that for warning messages on cigarette packets, since users read the message just when they are going to smoke. The messages used have been selected from a list that has been rated by the users themselves. The most popular message is "Enjoy sex and enjoy life. Do not expose yourself to HIV". The user is unaware of the software, which runs in the background. Ubiquitous computing may be useful for alerting users with preventive and educational messages. The proposed application is non-intrusive because: 1) the users themselves decide to install it and, therefore, users' privacy rights are preserved; 2) it sends a message that helps users think about taking appropriate preventive measures; and 3) it works in the background without interfering with users unless a trigger situation is detected. Thus, this type of application could become an important tool in the complex task of STI prevention.
Development of HIHM (Home Integrated Health Monitor) for ubiquitous home healthcare.
Kim, Jung Soo; Kim, Beom Oh; Park, Kwang Suk
2007-01-01
Home Integrated Health Monitor (HIHM) was developed for ubiquitous home healthcare. From quantitative analysis, we have elicited modal of chair. The HIHM could detect Electrocardiogram (ECG) and Photoplethysmography (PPG) non-intrusively. Also, it could estimate blood pressure (BP) non-intrusively, measure blood glucose and ear temperature. Detected signals and information were transmitted to home gateway and home server through Zigbee communication technology. Home server carried them to Healthcare Center, and specialists such as medical doctors could monitor by Internet. There was also feedback system. This device has a potential to study about ubiquitous home healthcare.
Perceptions of Using Smart Mobile Devices in Higher Education Teaching: A Case Study from Palestine
ERIC Educational Resources Information Center
Shraim, Khitam; Crompton, Helen
2015-01-01
Smart mobile devices (SMDs), especially smartphones and tablets, are becoming increasingly ubiquitous among educators and students in Palestine. While their use is on the rise, many academics are not effectively incorporating this technology into their teaching, which may be attributable to their negative perceptions of these devices. This study…
Relationships between Access to Mobile Devices, Student Self-Directed Learning, and Achievement
ERIC Educational Resources Information Center
Bartholomew, Scott R.; Reeve, Ed; Veon, Raymond; Goodridge, Wade; Lee, Victor; Nadelson, Louis
2017-01-01
Today's students are growing up in a world of constant connectivity, instant information, and ever-changing technological advancements. The increasingly ubiquitous nature of mobile devices among K-12 students has led many to argue for and against the inclusion of these devices in K-12 classrooms. Arguments in favor cite instant access to…
A Comprehensive Ubiquitous Healthcare Solution on an Android™ Mobile Device
Hii, Pei-Cheng; Chung, Wan-Young
2011-01-01
Provision of ubiquitous healthcare solutions which provide healthcare services at anytime anywhere has become more favorable nowadays due to the emphasis on healthcare awareness and also the growth of mobile wireless technologies. Following this approach, an Android™ smart phone device is proposed as a mobile monitoring terminal to observe and analyze ECG (electrocardiography) waveforms from wearable ECG devices in real time under the coverage of a wireless sensor network (WSN). The exploitation of WSN in healthcare is able to substitute the complicated wired technology, moving healthcare away from a fixed location setting. As an extension to the monitoring scheme, medicine care is taken into consideration by utilizing the mobile phone as a barcode decoder, to verify and assist out-patients in the medication administration process, providing a better and more comprehensive healthcare service. PMID:22163986
ERIC Educational Resources Information Center
Wang, Hong-You; Liu, Gi-Zen; Hwang, Gwo-Jen
2017-01-01
Context-dependent learning systems are now becoming more common in museums, as most students are equipped with mobile devices. As there has been little research into context-aware mobile applications in museums, the present study aims to investigate ubiquitous language learning in socio-cultural contexts, as well as recent trends in using…
ERIC Educational Resources Information Center
Peluso, Deanna C. C.
2012-01-01
Stepping into a modern day classroom, one will find that it is filled with a ubiquitous array of multimodal and digital resources, yet a majority of these revolutionary resources are likely not school issued, rather they were brought by the young people themselves. Digital mediums for communication, expression and multimodally engaging in one's…
ERIC Educational Resources Information Center
Sundgren, Marcus
2017-01-01
The use of mobile devices is increasing rapidly in society, and student device ownership is becoming more or less ubiquitous in many parts of the world. This might be an under-utilised resource that could benefit the educational practices of institutions of higher education. This review examines 91 journal articles from 28 countries published in…
ERIC Educational Resources Information Center
Cho, Vincent; Littenberg-Tobias, Joshua
2016-01-01
Even as digital devices (e.g., tablets, smart phones, laptops) have become increasingly ubiquitous in schools, concerns have also been raised that such devices might hinder students' social, emotional, and personal development. Educators' perspectives on such matters could shape the success or failure of 1:1 technology initiatives. Thus, there is…
Song, Min Su; Lee, Jae Dong; Jeong, Young-Sik; Jeong, Hwa-Young; Park, Jong Hyuk
2014-01-01
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.
Song, Min Su; Lee, Jae Dong; Jeong, Hwa-Young; Park, Jong Hyuk
2014-01-01
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system. PMID:25243205
ERIC Educational Resources Information Center
Dalsgaard, Christian; Pedersen, Nicholai Friis; Aaen, Janus Holst
2013-01-01
The aim of this paper is to identify the key learning potentials of the ubiquitous internet. Rather than focusing on mobile technology or the mobility of the learner, the paper emphasises the ubiquity of internet access as a paramount catalyst for new learning in the digital age. From a sociocultural perspective the paper discusses different ways…
Frequency-encoded photonic qubits for scalable quantum information processing
Lukens, Joseph M.; Lougovski, Pavel
2016-12-21
Among the objectives for large-scale quantum computation is the quantum interconnect: a device that uses photons to interface qubits that otherwise could not interact. However, the current approaches require photons indistinguishable in frequency—a major challenge for systems experiencing different local environments or of different physical compositions altogether. Here, we develop an entirely new platform that actually exploits such frequency mismatch for processing quantum information. Labeled “spectral linear optical quantum computation” (spectral LOQC), our protocol offers favorable linear scaling of optical resources and enjoys an unprecedented degree of parallelism, as an arbitrary Ν-qubit quantum gate may be performed in parallel onmore » multiple Ν-qubit sets in the same linear optical device. Here, not only does spectral LOQC offer new potential for optical interconnects, but it also brings the ubiquitous technology of high-speed fiber optics to bear on photonic quantum information, making wavelength-configurable and robust optical quantum systems within reach.« less
Frequency-encoded photonic qubits for scalable quantum information processing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lukens, Joseph M.; Lougovski, Pavel
Among the objectives for large-scale quantum computation is the quantum interconnect: a device that uses photons to interface qubits that otherwise could not interact. However, the current approaches require photons indistinguishable in frequency—a major challenge for systems experiencing different local environments or of different physical compositions altogether. Here, we develop an entirely new platform that actually exploits such frequency mismatch for processing quantum information. Labeled “spectral linear optical quantum computation” (spectral LOQC), our protocol offers favorable linear scaling of optical resources and enjoys an unprecedented degree of parallelism, as an arbitrary Ν-qubit quantum gate may be performed in parallel onmore » multiple Ν-qubit sets in the same linear optical device. Here, not only does spectral LOQC offer new potential for optical interconnects, but it also brings the ubiquitous technology of high-speed fiber optics to bear on photonic quantum information, making wavelength-configurable and robust optical quantum systems within reach.« less
Cheng, Chihwen; Stokes, Todd H.; Hang, Sovandy; Wang, May D.
2016-01-01
Doctors need fast and convenient access to medical data. This motivates the use of mobile devices for knowledge retrieval and sharing. We have developed TissueWikiMobile on the Apple iPhone and iPad to seamlessly access TissueWiki, an enormous repository of medical histology images. TissueWiki is a three terabyte database of antibody information and histology images from the Human Protein Atlas (HPA). Using TissueWikiMobile, users are capable of extracting knowledge from protein expression, adding annotations to highlight regions of interest on images, and sharing their professional insight. By providing an intuitive human computer interface, users can efficiently operate TissueWikiMobile to access important biomedical data without losing mobility. TissueWikiMobile furnishes the health community a ubiquitous way to collaborate and share their expert opinions not only on the performance of various antibodies stains but also on histology image annotation. PMID:27532057
Applying Utility Functions to Adaptation Planning for Home Automation Applications
NASA Astrophysics Data System (ADS)
Bratskas, Pyrros; Paspallis, Nearchos; Kakousis, Konstantinos; Papadopoulos, George A.
A pervasive computing environment typically comprises multiple embedded devices that may interact together and with mobile users. These users are part of the environment, and they experience it through a variety of devices embedded in the environment. This perception involves technologies which may be heterogeneous, pervasive, and dynamic. Due to the highly dynamic properties of such environments, the software systems running on them have to face problems such as user mobility, service failures, or resource and goal changes which may happen in an unpredictable manner. To cope with these problems, such systems must be autonomous and self-managed. In this chapter we deal with a special kind of a ubiquitous environment, a smart home environment, and introduce a user-preference-based model for adaptation planning. The model, which dynamically forms a set of configuration plans for resources, reasons automatically and autonomously, based on utility functions, on which plan is likely to best achieve the user's goals with respect to resource availability and user needs.
Pervasive Computing Goes to School
ERIC Educational Resources Information Center
Plymale, William O.
2005-01-01
In 1991 Mark Weiser introduced the idea of ubiquitous computing: a world in which computers and associated technologies become invisible, and thus indistinguishable from everyday life. This invisible computing is accomplished by means of "embodied virtuality," the process of drawing computers into the physical world. Weiser proposed that…
On Curating Multimodal Sensory Data for Health and Wellness Platforms
Amin, Muhammad Bilal; Banos, Oresti; Khan, Wajahat Ali; Muhammad Bilal, Hafiz Syed; Gong, Jinhyuk; Bui, Dinh-Mao; Cho, Soung Ho; Hussain, Shujaat; Ali, Taqdir; Akhtar, Usman; Chung, Tae Choong; Lee, Sungyoung
2016-01-01
In recent years, the focus of healthcare and wellness technologies has shown a significant shift towards personal vital signs devices. The technology has evolved from smartphone-based wellness applications to fitness bands and smartwatches. The novelty of these devices is the accumulation of activity data as their users go about their daily life routine. However, these implementations are device specific and lack the ability to incorporate multimodal data sources. Data accumulated in their usage does not offer rich contextual information that is adequate for providing a holistic view of a user’s lifelog. As a result, making decisions and generating recommendations based on this data are single dimensional. In this paper, we present our Data Curation Framework (DCF) which is device independent and accumulates a user’s sensory data from multimodal data sources in real time. DCF curates the context of this accumulated data over the user’s lifelog. DCF provides rule-based anomaly detection over this context-rich lifelog in real time. To provide computation and persistence over the large volume of sensory data, DCF utilizes the distributed and ubiquitous environment of the cloud platform. DCF has been evaluated for its performance, correctness, ability to detect complex anomalies, and management support for a large volume of sensory data. PMID:27355955
Social Knowledge Awareness Map for Computer Supported Ubiquitous Learning Environment
ERIC Educational Resources Information Center
El-Bishouty, Moushir M.; Ogata, Hiroaki; Rahman, Samia; Yano, Yoneo
2010-01-01
Social networks are helpful for people to solve problems by providing useful information. Therefore, the importance of mobile social software for learning has been supported by many researches. In this research, a model of personalized collaborative ubiquitous learning environment is designed and implemented in order to support learners doing…
Student Laptop Use and Scores on Standardized Tests
ERIC Educational Resources Information Center
Kposowa, Augustine J.; Valdez, Amanda D.
2013-01-01
Objectives: The primary objective of the study was to investigate the relationship between ubiquitous laptop use and academic achievement. It was hypothesized that students with ubiquitous laptops would score on average higher on standardized tests than those without such computers. Methods: Data were obtained from two sources. First, demographic…
Psychophysical Calibration of Mobile Touch-Screens for Vision Testing in the Field
NASA Technical Reports Server (NTRS)
Mulligan, Jeffrey B.
2015-01-01
The now ubiquitous nature of touch-screen displays in cell phones and tablet computers makes them an attractive option for vision testing outside of the laboratory or clinic. Accurate measurement of parameters such as contrast sensitivity, however, requires precise control of absolute and relative screen luminances. The nonlinearity of the display response (gamma) can be measured or checked using a minimum motion technique similar to that developed by Anstis and Cavanagh (1983) for the determination of isoluminance. While the relative luminances of the color primaries vary between subjects (due to factors such as individual differences in pre-retinal pigment densities), the gamma nonlinearity can be checked in the lab using a photometer. Here we compare results obtained using the psychophysical method with physical measurements for a number of different devices. In addition, we present a novel physical method using the device's built-in front-facing camera in conjunction with a mirror to jointly calibrate the camera and display. A high degree of consistency between devices is found, but some departures from ideal performance are observed. In spite of this, the effects of calibration errors and display artifacts on estimates of contrast sensitivity are found to be small.
Introduction to This Special Issue on Context-Aware Computing.
ERIC Educational Resources Information Center
Moran, Thomas P.; Dourish, Paul
2001-01-01
Discusses pervasive, or ubiquitous, computing; explains the notion of context; and defines context-aware computing as the key to disperse and enmesh computation into our lives. Considers context awareness in human-computer interaction and describes the broad topic areas of the essays included in this special issue. (LRW)
Ubiquitous Learning Website: Scaffold Learners by Mobile Devices with Information-Aware Techniques
ERIC Educational Resources Information Center
Chen, G. D.; Chang, C. K.; Wang, C. Y.
2008-01-01
The portability and immediate communication properties of mobile devices influence the learning processes in interacting with peers, accessing resources and transferring data. For example, the short message and browsing functions in a cell phone provide users with timely and adaptive information access. Although many studies of mobile learning…
Mobile Learning: A Powerful Tool for Ubiquitous Language Learning
ERIC Educational Resources Information Center
Gomes, Nelson; Lopes, Sérgio; Araújo, Sílvia
2016-01-01
Mobile devices (smartphones, tablets, e-readers, etc.) have come to be used as tools for mobile learning. Several studies support the integration of such technological devices with learning, particularly with language learning. In this paper, we wish to present an Android app designed for the teaching and learning of Portuguese as a foreign…
Teachers' Attitudes toward Mobile Learning in Korea
ERIC Educational Resources Information Center
Baek, Youngkyun; Zhang, Hui; Yun, Seongchul
2017-01-01
Mobile devices have become ubiquitous, and their uses are various. In schools, many discussions about mobile devices are ongoing as more and more teachers are adopting the technology for use in their classrooms. Teachers' attitudes toward mobile learning takes an important role in initiating its usage in schools. This study aims to investigate the…
Meeting the challenges--the role of medical informatics in an ageing society.
Koch, Sabine
2006-01-01
The objective of this paper is to identify trends and new technological developments that appear due to an ageing society and to relate them to current research in the field of medical informatics. A survey of the current literature reveals that recent technological advances have been made in the fields of "telecare and home-monitoring", "smart homes and robotics" and "health information systems and knowledge management". Innovative technologies such as wearable devices, bio- and environmental sensors and mobile, humanoid robots do already exist and ambient assistant living environments are being created for an ageing society. However, those technologies have to be adapted to older people's self-care processes and coping strategies, and to support new ways of healthcare delivery. Medical informatics can support this process by providing the necessary information infrastructure, contribute to standardisation, interoperability and security issues and provide modelling and simulation techniques for educational purposes. Research fields of increasing importance with regard to an ageing society are, moreover, the fields of knowledge management, ubiquitous computing and human-computer interaction.
Noise and Vibration Risk Prevention Virtual Web for Ubiquitous Training
ERIC Educational Resources Information Center
Redel-Macías, María Dolores; Cubero-Atienza, Antonio J.; Martínez-Valle, José Miguel; Pedrós-Pérez, Gerardo; del Pilar Martínez-Jiménez, María
2015-01-01
This paper describes a new Web portal offering experimental labs for ubiquitous training of university engineering students in work-related risk prevention. The Web-accessible computer program simulates the noise and machine vibrations met in the work environment, in a series of virtual laboratories that mimic an actual laboratory and provide the…
Ubiquitous Knowledge Construction: Mobile Learning Re-Defined and a Conceptual Framework
ERIC Educational Resources Information Center
Peng, Hsinyi; Su, Yi-Ju; Chou, Chien; Tsai, Chin-Chung
2009-01-01
Emerging from recent mobile technologies, mobile learning, or m-learning, is beginning to offer "stunning new technical capabilities" in education (DiGiano et al., 2003). This new genre of learning is viewed as a revolutionary stage in educational technology. However, ubiquitous computing technologies have given rise to several issues. This…
Classification of Alzheimer's Patients through Ubiquitous Computing.
Nieto-Reyes, Alicia; Duque, Rafael; Montaña, José Luis; Lage, Carmen
2017-07-21
Functional data analysis and artificial neural networks are the building blocks of the proposed methodology that distinguishes the movement patterns among c's patients on different stages of the disease and classifies new patients to their appropriate stage of the disease. The movement patterns are obtained by the accelerometer device of android smartphones that the patients carry while moving freely. The proposed methodology is relevant in that it is flexible on the type of data to which it is applied. To exemplify that, it is analyzed a novel real three-dimensional functional dataset where each datum is observed in a different time domain. Not only is it observed on a difference frequency but also the domain of each datum has different length. The obtained classification success rate of 83 % indicates the potential of the proposed methodology.
A ubiquitous reflective e-portfolio architecture.
Forte, Marcos; de Souza, Wanderley L; da Silva, Roseli F; do Prado, Antonio F; Rodrigues, Jose F
2013-11-01
In nurse and in medicine courses, the use of reflective portfolios as a pedagogical tool is becoming a common practice; in the last years, this practice has gradually migrated from paper-based to electronic-based portfolios. Current approaches for reflective e-portfolios, however, do not widely operate at outdoor sites, where data networks are limited or nonexistent. Considering that many of the activities related to nurse and medicine courses relate to professional practices conducted in such conditions, these network shortcomings restrict the adoption of e-portfolios. The present study describes the requirements specification, design, implementation, and evaluation of the Ubiquitous Reflective E-Portfolio Architecture, a solution proposed to support the development of systems based on mobile and wired access for both online and offline operation. We have implemented a prototype named Professional Practice Module to evaluate the Ubiquitous Reflective E-Portfolio Architecture; the module was based on requirements observed during the professional practice, the paper-based portfolio in use, and related learning meetings in the Medicine Course of a Brazilian University. The evaluation of the system was carried out with a learning group of 2nd year students of the medicine course, who answered to extensive evaluation questionnaires. The prototype proved to be operational in the activities of the professional practice of the Medicine Course object of the study, including homework tasks, patient care, data sharing, and learning meetings. It also demonstrated to be versatile with respect to the availability of the computer network that, many times, was not accessible. Moreover, the students considered the module useful and easy to use, but pointed out difficulties about the keyboard and the display sizes of the netbook devices, and about their operational system. Lastly, most of the students declared preference for the electronic Professional Practice Module in internal and in group activities, and for the paper-based version while in patient attendance. There is evidence that the environment where the professional practice takes place influences the usage of the e-portfolio. Mobile devices were able to support students in their professional practice; however, these devices present characteristics that must be judiciously selected, otherwise, they may limit the execution of important tasks. The main shortcoming identified during the evaluation tests was about the use of the module, and of the access device, during patient attendance. For this reason, we have envisioned a new version of the Professional Practice Module that shall follow a twofold requisite: by one side, it will include all the features of the module, to be used at the university or in the students' homes; from the other side, it will include only the features that are essential for the practice of patient attendance. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
ERIC Educational Resources Information Center
Hanson, Cody
2011-01-01
In 2011, cell phones and mobile devices are ubiquitous. The vast majority of Americans now own cell phones, and over half of them have mobile access to the Internet through a phone or other mobile device. For libraries to stay relevant, they must be able to offer content and services through the mobile web. In this issue of "Library Technology…
Designing a Self-Contained Group Area Network for Ubiquitous Learning
ERIC Educational Resources Information Center
Chen, Nian-Shing; Kinshuk; Wei, Chun-Wang; Yang, Stephen J. H.
2008-01-01
A number of studies have evidenced that handheld devices are appropriate tools to facilitate face-to-face collaborative learning effectively because of the possibility of ample social interactions. Group Area Network, or GroupNet, proposed in this paper, uses handheld devices to fill the gap between Local Area Network and Body Area Network.…
Programmable ubiquitous telerobotic devices
NASA Astrophysics Data System (ADS)
Doherty, Michael; Greene, Matthew; Keaton, David; Och, Christian; Seidl, Matthew L.; Waite, William; Zorn, Benjamin G.
1997-12-01
We are investigating a field of research that we call ubiquitous telepresence, which involves the design and implementation of low-cost robotic devices that can be programmed and operated from anywhere on the Internet. These devices, which we call ubots, can be used for academic purposes (e.g., a biologist could remote conduct a population survey), commercial purposes (e.g., a house could be shown remotely by a real-estate agent), and for recreation and education (e.g., someone could tour a museum remotely). We anticipate that such devices will become increasingly common due to recent changes in hardware and software technology. In particular, current hardware technology enables such devices to be constructed very cheaply (less than $500), and current software and network technology allows highly portable code to be written and downloaded across the Internet. In this paper, we present our prototype system architecture, and the ubot implementation we have constructed based on it. The hardware technology we use is the handy board, a 6811-based controller board with digital and analog inputs and outputs. Our software includes a network layer based on TCP/IP and software layers written in Java. Our software enables users across the Internet to program the behavior of the vehicle and to receive image feedback from a camera mounted on it.
NASA Astrophysics Data System (ADS)
Liang, Albert K.; Koniczek, Martin; Antonuk, Larry E.; El-Mohri, Youcef; Zhao, Qihua; Jiang, Hao; Street, Robert A.; Lu, Jeng Ping
2014-03-01
The thin-film semiconductor processing methods that enabled creation of inexpensive liquid crystal displays based on amorphous silicon transistors for cell phones and televisions, as well as desktop, laptop and mobile computers, also facilitated the development of devices that have become ubiquitous in medical x-ray imaging environments. These devices, called active matrix flat-panel imagers (AMFPIs), measure the integrated signal generated by incident X rays and offer detection areas as large as ~43×43 cm2. In recent years, there has been growing interest in medical x-ray imagers that record information from X ray photons on an individual basis. However, such photon counting devices have generally been based on crystalline silicon, a material not inherently suited to the cost-effective manufacture of monolithic devices of a size comparable to that of AMFPIs. Motivated by these considerations, we have developed an initial set of small area prototype arrays using thin-film processing methods and polycrystalline silicon transistors. These prototypes were developed in the spirit of exploring the possibility of creating large area arrays offering single photon counting capabilities and, to our knowledge, are the first photon counting arrays fabricated using thin film techniques. In this paper, the architecture of the prototype pixels is presented and considerations that influenced the design of the pixel circuits, including amplifier noise, TFT performance variations, and minimum feature size, are discussed.
Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA
Lee, Donggeon; Kim, Dong-Chan; Kwon, Daesung; Kim, Howon
2014-01-01
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, the computing environment is changing. Because our daily life is deeply intertwined with ubiquitous networks, the importance of security is growing. A lightweight encryption algorithm is essential for secure communication between these kinds of resource-constrained devices, and many researchers have been investigating this field. Recently, a lightweight block cipher called LEA was proposed. LEA was originally targeted for efficient implementation on microprocessors, as it is fast when implemented in software and furthermore, it has a small memory footprint. To reflect on recent technology, all required calculations utilize 32-bit wide operations. In addition, the algorithm is comprised of not complex S-Box-like structures but simple Addition, Rotation, and XOR operations. To the best of our knowledge, this paper is the first report on a comprehensive hardware implementation of LEA. We present various hardware structures and their implementation results according to key sizes. Even though LEA was originally targeted at software efficiency, it also shows high efficiency when implemented as hardware. PMID:24406859
NASA Astrophysics Data System (ADS)
Olivares-Amaya, Roberto; Hachmann, Johannes; Amador-Bedolla, Carlos; Daly, Aidan; Jinich, Adrian; Atahan-Evrenk, Sule; Boixo, Sergio; Aspuru-Guzik, Alán
2012-02-01
Organic photovoltaic devices have emerged as competitors to silicon-based solar cells, currently reaching efficiencies of over 9% and offering desirable properties for manufacturing and installation. We study conjugated donor polymers for high-efficiency bulk-heterojunction photovoltaic devices with a molecular library motivated by experimental feasibility. We use quantum mechanics and a distributed computing approach to explore this vast molecular space. We will detail the screening approach starting from the generation of the molecular library, which can be easily extended to other kinds of molecular systems. We will describe the screening method for these materials which ranges from descriptor models, ubiquitous in the drug discovery community, to eventually reaching first principles quantum chemistry methods. We will present results on the statistical analysis, based principally on machine learning, specifically partial least squares and Gaussian processes. Alongside, clustering methods and the use of the hypergeometric distribution reveal moieties important for the donor materials and allow us to quantify structure-property relationships. These efforts enable us to accelerate materials discovery in organic photovoltaics through our collaboration with experimental groups.
Energy-Aware Topology Control Strategy for Human-Centric Wireless Sensor Networks
Meseguer, Roc; Molina, Carlos; Ochoa, Sergio F.; Santos, Rodrigo
2014-01-01
The adoption of mobile and ubiquitous solutions that involve participatory or opportunistic sensing increases every day. This situation has highlighted the relevance of optimizing the energy consumption of these solutions, because their operation depends on the devices' battery lifetimes. This article presents a study that intends to understand how the prediction of topology control messages in human-centric wireless sensor networks can be used to help reduce the energy consumption of the participating devices. In order to do that, five research questions have been defined and a study based on simulations was conducted to answer these questions. The obtained results help identify suitable mobile computing scenarios where the prediction of topology control messages can be used to save energy of the network nodes. These results also allow estimating the percentage of energy saving that can be expected, according to the features of the work scenario and the participants behavior. Designers of mobile collaborative applications that involve participatory or opportunistic sensing, can take advantage of these findings to increase the autonomy of their solutions. PMID:24514884
Designing Ubiquitous Computing to Enhance Children's Learning in Museums
ERIC Educational Resources Information Center
Hall, T.; Bannon, L.
2006-01-01
In recent years, novel paradigms of computing have emerged, which enable computational power to be embedded in artefacts and in environments in novel ways. These developments may create new possibilities for using computing to enhance learning. This paper presents the results of a design process that set out to explore interactive techniques,…
Emerging CAE technologies and their role in Future Ambient Intelligence Environments
NASA Astrophysics Data System (ADS)
Noor, Ahmed K.
2011-03-01
Dramatic improvements are on the horizon in Computer Aided Engineering (CAE) and various simulation technologies. The improvements are due, in part, to the developments in a number of leading-edge technologies and their synergistic combinations/convergence. The technologies include ubiquitous, cloud, and petascale computing; ultra high-bandwidth networks, pervasive wireless communication; knowledge based engineering; networked immersive virtual environments and virtual worlds; novel human-computer interfaces; and powerful game engines and facilities. This paper describes the frontiers and emerging simulation technologies, and their role in the future virtual product creation and learning/training environments. The environments will be ambient intelligence environments, incorporating a synergistic combination of novel agent-supported visual simulations (with cognitive learning and understanding abilities); immersive 3D virtual world facilities; development chain management systems and facilities (incorporating a synergistic combination of intelligent engineering and management tools); nontraditional methods; intelligent, multimodal and human-like interfaces; and mobile wireless devices. The Virtual product creation environment will significantly enhance the productivity and will stimulate creativity and innovation in future global virtual collaborative enterprises. The facilities in the learning/training environment will provide timely, engaging, personalized/collaborative and tailored visual learning.
ERIC Educational Resources Information Center
Bagley, Katherine G.
2012-01-01
Technological devices are ubiquitous in nearly every facet of society. There are substantial investments made in organizations on a daily basis to improve information technology. From a military perspective, the ultimate goal of these highly sophisticated devices is to assist soldiers in achieving mission success across dynamic and often chaotic…
ERIC Educational Resources Information Center
Cheon, Jongpil; Lee, Sangno; Crooks, Steven M.; Song, Jaeki
2012-01-01
This study investigated the current state of college students' perceptions toward mobile learning in higher education. Mobile learning is a new form of learning utilizing the unique capabilities of mobile devices. Although mobile devices are ubiquitous on college campuses, student readiness for mobile learning has yet to be fully explored in the…
Salaberria, Itziar; Perallos, Asier; Azpilicueta, Leire; Falcone, Francisco; Carballedo, Roberto; Angulo, Ignacio; Elejoste, Pilar; Bahillo, Alfonso; Astrain, José Javier; Villadangos, Jesús
2014-01-01
During the last years, the application of different wireless technologies has been explored in order to enable Internet connectivity from vehicles. In addition, the widespread adoption of smartphones by citizens represents a great opportunity to integrate such nomadic devices inside vehicles in order to provide new and personalized on trip services for passengers. In this paper, a proposal of communication architecture to provide the ubiquitous connectivity needed to enhance the smart train concept is presented and preliminarily tested. It combines an intra-wagon communication system based on nomadic devices connected through a Bluetooth Piconet Network with a highly innovative train-to-ground communication system. In order to validate this communication solution, several tests and simulations have been performed and their results are described in this paper. PMID:24803192
Privacy Policy Enforcement for Ambient Ubiquitous Services
NASA Astrophysics Data System (ADS)
Oyomno, Were; Jäppinen, Pekka; Kerttula, Esa
Ubiquitous service providers leverage miniaturised computing terminals equipped with wireless capabilities to avail new service models. These models are pivoted on personal and inexpensive terminals to customise services to individual preferences. Portability, small sizes and compact keyboards are few features popularising mobile terminals. Features enable storing and carrying of ever increasing proportions of personal data and ability to use them in service adaptations. Ubiquitous services automate deeper soliciting of personal data transparently without the need for user interactions. Transparent solicitations, acquisitions and handling of personal data legitimises privacy concerns regarding disclosures, retention and re-use of the data. This study presents a policy enforcement for ubiquitous services that safeguards handling of users personal data and monitors adherence to stipulated privacy policies. Enforcement structures towards usability and scalability are presented.
Kim, Jeongeun; Kim, Sukwha; Kim, Hee-Chan; Kim, Kyung-Hwan; Yang, Seok-Chul; Lee, Choon-Taek; Kong, Hyoun-Joong; Lee, Kyungsoon
2012-12-01
Through the use of ubiquitous health, or u-Health, services, medical information can be adapted and made accessible via computer and Internet to provide quality healthcare to anybody, any place, and any time. We developed and implemented u-Health services for patients with chronic obstructive pulmonary disease and studied their experiences with respect to their knowledge of chronic obstructive pulmonary disease and skill and attitude toward the u-Health devices. The u-Health services were composed of telemonitoring and teleconsultation supplemented with home visits. To determine its effectiveness, the u-Health service system was implemented for 2 years with 144 chronic obstructive pulmonary disease patients in a clinical experiment. The subjects were divided into three experimental groups, each provided with different services, compared before and after intervention, and among groups. The analysis of data gathered through the system suggested that u-Health services can support patients with chronic obstructive pulmonary disease, improve patients' knowledge about chronic obstructive pulmonary disease self-management, build u-Health device usage skills, and foster a positive attitude toward u-Health devices. The u-Health services for the chronic obstructive pulmonary disease patients were both feasible and effective from the patients' perspective.
Analysis of Security Protocols for Mobile Healthcare.
Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga
2016-11-01
Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.
Classification of Alzheimer’s Patients through Ubiquitous Computing †
Nieto-Reyes, Alicia; Duque, Rafael; Montaña, José Luis; Lage, Carmen
2017-01-01
Functional data analysis and artificial neural networks are the building blocks of the proposed methodology that distinguishes the movement patterns among c’s patients on different stages of the disease and classifies new patients to their appropriate stage of the disease. The movement patterns are obtained by the accelerometer device of android smartphones that the patients carry while moving freely. The proposed methodology is relevant in that it is flexible on the type of data to which it is applied. To exemplify that, it is analyzed a novel real three-dimensional functional dataset where each datum is observed in a different time domain. Not only is it observed on a difference frequency but also the domain of each datum has different length. The obtained classification success rate of 83% indicates the potential of the proposed methodology. PMID:28753975
ERIC Educational Resources Information Center
Willis, Katharine S.; Corino, Gianni
2014-01-01
In design teaching ubiquitous technologies can offer new ways of situating learning within real world experiences. Yet they require new types of knowledge; both an understanding of how to work with the technology and also an understanding of how to use the technologies to respond to changing contexts such as the place and the people. We sought to…
Gender Differences in Computer Use and Attitudes on a Ubiquitous Computing Campus.
ERIC Educational Resources Information Center
McCoy, Leah P.; Heafner, Tina L.; Burdick, Matthew G.; Nagle, Laura M.
As colleges and universities consider various options for wide scale "computerization," one southern liberal arts university has instituted a technology program that insures that all students have equal access to laptop computers. At this university, each student is issued his or her own IBM ThinkPad, and activities involving this computer are…
Easy, Collaborative and Engaging--The Use of Cloud Computing in the Design of Management Classrooms
ERIC Educational Resources Information Center
Schneckenberg, Dirk
2014-01-01
Background: Cloud computing has recently received interest in information systems research and practice as a new way to organise information with the help of an increasingly ubiquitous computer infrastructure. However, the use of cloud computing in higher education institutions and business schools, as well as its potential to create novel…
CyberPsychological Computation on Social Community of Ubiquitous Learning.
Zhou, Xuan; Dai, Genghui; Huang, Shuang; Sun, Xuemin; Hu, Feng; Hu, Hongzhi; Ivanović, Mirjana
2015-01-01
Under the modern network environment, ubiquitous learning has been a popular way for people to study knowledge, exchange ideas, and share skills in the cyberspace. Existing research findings indicate that the learners' initiative and community cohesion play vital roles in the social communities of ubiquitous learning, and therefore how to stimulate the learners' interest and participation willingness so as to improve their enjoyable experiences in the learning process should be the primary consideration on this issue. This paper aims to explore an effective method to monitor the learners' psychological reactions based on their behavioral features in cyberspace and therefore provide useful references for adjusting the strategies in the learning process. In doing so, this paper firstly analyzes the psychological assessment of the learners' situations as well as their typical behavioral patterns and then discusses the relationship between the learners' psychological reactions and their observable features in cyberspace. Finally, this paper puts forward a CyberPsychological computation method to estimate the learners' psychological states online. Considering the diversity of learners' habitual behaviors in the reactions to their psychological changes, a BP-GA neural network is proposed for the computation based on their personalized behavioral patterns.
CyberPsychological Computation on Social Community of Ubiquitous Learning
Zhou, Xuan; Dai, Genghui; Huang, Shuang; Sun, Xuemin; Hu, Feng; Hu, Hongzhi; Ivanović, Mirjana
2015-01-01
Under the modern network environment, ubiquitous learning has been a popular way for people to study knowledge, exchange ideas, and share skills in the cyberspace. Existing research findings indicate that the learners' initiative and community cohesion play vital roles in the social communities of ubiquitous learning, and therefore how to stimulate the learners' interest and participation willingness so as to improve their enjoyable experiences in the learning process should be the primary consideration on this issue. This paper aims to explore an effective method to monitor the learners' psychological reactions based on their behavioral features in cyberspace and therefore provide useful references for adjusting the strategies in the learning process. In doing so, this paper firstly analyzes the psychological assessment of the learners' situations as well as their typical behavioral patterns and then discusses the relationship between the learners' psychological reactions and their observable features in cyberspace. Finally, this paper puts forward a CyberPsychological computation method to estimate the learners' psychological states online. Considering the diversity of learners' habitual behaviors in the reactions to their psychological changes, a BP-GA neural network is proposed for the computation based on their personalized behavioral patterns. PMID:26557846
GISpark: A Geospatial Distributed Computing Platform for Spatiotemporal Big Data
NASA Astrophysics Data System (ADS)
Wang, S.; Zhong, E.; Wang, E.; Zhong, Y.; Cai, W.; Li, S.; Gao, S.
2016-12-01
Geospatial data are growing exponentially because of the proliferation of cost effective and ubiquitous positioning technologies such as global remote-sensing satellites and location-based devices. Analyzing large amounts of geospatial data can provide great value for both industrial and scientific applications. Data- and compute- intensive characteristics inherent in geospatial big data increasingly pose great challenges to technologies of data storing, computing and analyzing. Such challenges require a scalable and efficient architecture that can store, query, analyze, and visualize large-scale spatiotemporal data. Therefore, we developed GISpark - a geospatial distributed computing platform for processing large-scale vector, raster and stream data. GISpark is constructed based on the latest virtualized computing infrastructures and distributed computing architecture. OpenStack and Docker are used to build multi-user hosting cloud computing infrastructure for GISpark. The virtual storage systems such as HDFS, Ceph, MongoDB are combined and adopted for spatiotemporal data storage management. Spark-based algorithm framework is developed for efficient parallel computing. Within this framework, SuperMap GIScript and various open-source GIS libraries can be integrated into GISpark. GISpark can also integrated with scientific computing environment (e.g., Anaconda), interactive computing web applications (e.g., Jupyter notebook), and machine learning tools (e.g., TensorFlow/Orange). The associated geospatial facilities of GISpark in conjunction with the scientific computing environment, exploratory spatial data analysis tools, temporal data management and analysis systems make up a powerful geospatial computing tool. GISpark not only provides spatiotemporal big data processing capacity in the geospatial field, but also provides spatiotemporal computational model and advanced geospatial visualization tools that deals with other domains related with spatial property. We tested the performance of the platform based on taxi trajectory analysis. Results suggested that GISpark achieves excellent run time performance in spatiotemporal big data applications.
Ubiquitous Presenter: A Tablet PC-based System to Support Instructors and Students
NASA Astrophysics Data System (ADS)
Price, Edward; Simon, Beth
2009-12-01
Digital lecturing systems (computer and projector, often with PowerPoint) offer physics instructors the ability to incorporate graphics and the power to share and reuse materials. But these systems do a poor job of supporting interaction in the classroom. For instance, with digital presentation systems, instructors have limited ability to spontaneously respond to student questions. This limitation is especially acute during classroom activities such as problem solving, Peer Instruction, and Interactive Lecture Demonstrations (ILDs).2 A Tablet PC, a laptop computer with a stylus that can be used to "write" on the screen, provides a way for instructors to add digital ink spontaneously to a presentation in progress. The Tablet PC can be a powerful tool for teaching,3,4 especially when combined with software systems specifically designed to leverage digital ink for pedagogical uses. Ubiquitous Presenter (UP) is one such freely available system.5 Developed at the University of California, San Diego, and based on Classroom Presenter,6 UP allows the instructor to ink prepared digital material (such as exported PowerPoint slides) in real time in class. Ink is automatically archived stroke by stroke and can be reviewed through a web browser (by both students and instructors). The system also supports spontaneous in-class interaction through a web interface—students with web-enabled devices (Tablet PCs, regular laptops, PDAs, and cell phones) can make text-, ink-, or image-based submissions on the instructor's slides. The instructor can review and then project submitted slides to the class and add additional ink, so that material generated by students can be a focus for discussion. A brief video showing UP in action is at http://physics.csusm.edu/UP. In this article, we describe UP and give examples of how UP can support the physics classroom.
A Ubiquitous Sensor Network Platform for Integrating Smart Devices into the Semantic Sensor Web
de Vera, David Díaz Pardo; Izquierdo, Álvaro Sigüenza; Vercher, Jesús Bernat; Gómez, Luis Alfonso Hernández
2014-01-01
Ongoing Sensor Web developments make a growing amount of heterogeneous sensor data available to smart devices. This is generating an increasing demand for homogeneous mechanisms to access, publish and share real-world information. This paper discusses, first, an architectural solution based on Next Generation Networks: a pilot Telco Ubiquitous Sensor Network (USN) Platform that embeds several OGC® Sensor Web services. This platform has already been deployed in large scale projects. Second, the USN-Platform is extended to explore a first approach to Semantic Sensor Web principles and technologies, so that smart devices can access Sensor Web data, allowing them also to share richer (semantically interpreted) information. An experimental scenario is presented: a smart car that consumes and produces real-world information which is integrated into the Semantic Sensor Web through a Telco USN-Platform. Performance tests revealed that observation publishing times with our experimental system were well within limits compatible with the adequate operation of smart safety assistance systems in vehicles. On the other hand, response times for complex queries on large repositories may be inappropriate for rapid reaction needs. PMID:24945678
A ubiquitous sensor network platform for integrating smart devices into the semantic sensor web.
de Vera, David Díaz Pardo; Izquierdo, Alvaro Sigüenza; Vercher, Jesús Bernat; Hernández Gómez, Luis Alfonso
2014-06-18
Ongoing Sensor Web developments make a growing amount of heterogeneous sensor data available to smart devices. This is generating an increasing demand for homogeneous mechanisms to access, publish and share real-world information. This paper discusses, first, an architectural solution based on Next Generation Networks: a pilot Telco Ubiquitous Sensor Network (USN) Platform that embeds several OGC® Sensor Web services. This platform has already been deployed in large scale projects. Second, the USN-Platform is extended to explore a first approach to Semantic Sensor Web principles and technologies, so that smart devices can access Sensor Web data, allowing them also to share richer (semantically interpreted) information. An experimental scenario is presented: a smart car that consumes and produces real-world information which is integrated into the Semantic Sensor Web through a Telco USN-Platform. Performance tests revealed that observation publishing times with our experimental system were well within limits compatible with the adequate operation of smart safety assistance systems in vehicles. On the other hand, response times for complex queries on large repositories may be inappropriate for rapid reaction needs.
Mobile Life - Innovation in the Wild
NASA Astrophysics Data System (ADS)
Höök, Kristina
After a decade of work in our research labs on mobile and ubiquitous technology, often formed by the early visions of ubiquitous computing, with the urge to move interaction from the desktop out into the wild, these technologies have now moved out into the world - into the wild. We are in the middle of a second IT-revolution, caused by the spread of mobile and ubiquitous services, in combination with a broad consumer-oriented market pull. The first ITrevolution, the introduction and deployment of Internet and the World Wide Web during the 1990’s, had a major impact on all parts of our society. As mobile, ubiquitous technology now becomes wide-spread, the design and evaluation of mobile services - i.e. information technology that can be accessed and used in virtually any setting - represents an important business arena for the IT- and telecom industry. Together we have to look for a sustainable web of work, leisure and ubiquitous technology we can call the mobile life.
An Infrastructure to Enable Lightweight Context-Awareness for Mobile Users
Curiel, Pablo; Lago, Ana B.
2013-01-01
Mobile phones enable us to carry out a wider range of tasks every day, and as a result they have become more ubiquitous than ever. However, they are still more limited in terms of processing power and interaction capabilities than traditional computers, and the often distracting and time-constricted scenarios in which we use them do not help in alleviating these limitations. Context-awareness is a valuable technique to address these issues, as it enables to adapt application behaviour to each situation. In this paper we present a context management infrastructure for mobile environments, aimed at controlling context information life-cycle in this kind of scenarios, with the main goal of enabling application and services to adapt their behaviour to better meet end-user needs. This infrastructure relies on semantic technologies and open standards to improve interoperability, and is based on a central element, the context manager. This element acts as a central context repository and takes most of the computational burden derived from dealing with this kind of information, thus relieving from these tasks to more resource-scarce devices in the system. PMID:23899932
Distance Learning and Cloud Computing: "Just Another Buzzword or a Major E-Learning Breakthrough?"
ERIC Educational Resources Information Center
Romiszowski, Alexander J.
2012-01-01
"Cloud computing is a model for the enabling of ubiquitous, convenient, and on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and other services) that can be rapidly provisioned and released with minimal management effort or service provider interaction." This…
Assured Access/Mobile Computing Initiatives on Five University Campuses.
ERIC Educational Resources Information Center
Blurton, Craig; Chee, Yam San; Long, Phillip D.; Resmer, Mark; Runde, Craig
Mobile computing and assured access are becoming popular terms to describe a growing number of university programs which take advantage of ubiquitous network access points and the portability of notebook computers to ensure all students have access to digital tools and resources. However, the implementation of such programs varies widely from…
Commentary: It Is Not Only about the Computers--An Argument for Broadening the Conversation
ERIC Educational Resources Information Center
DeWitt, Scott W.
2006-01-01
In 2002 the members of the National Technology Leadership Initiative (NTLI) framed seven conclusions relating to handheld computers and ubiquitous computing in schools. While several of the conclusions are laudable efforts to increase research and professional development, the factual and conceptual bases for this document are seriously flawed.…
Ubiquitous Robotic Technology for Smart Manufacturing System.
Wang, Wenshan; Zhu, Xiaoxiao; Wang, Liyu; Qiu, Qiang; Cao, Qixin
2016-01-01
As the manufacturing tasks become more individualized and more flexible, the machines in smart factory are required to do variable tasks collaboratively without reprogramming. This paper for the first time discusses the similarity between smart manufacturing systems and the ubiquitous robotic systems and makes an effort on deploying ubiquitous robotic technology to the smart factory. Specifically, a component based framework is proposed in order to enable the communication and cooperation of the heterogeneous robotic devices. Further, compared to the service robotic domain, the smart manufacturing systems are often in larger size. So a hierarchical planning method was implemented to improve the planning efficiency. A test bed of smart factory is developed. It demonstrates that the proposed framework is suitable for industrial domain, and the hierarchical planning method is able to solve large problems intractable with flat methods.
Ubiquitous Robotic Technology for Smart Manufacturing System
Zhu, Xiaoxiao; Wang, Liyu; Qiu, Qiang; Cao, Qixin
2016-01-01
As the manufacturing tasks become more individualized and more flexible, the machines in smart factory are required to do variable tasks collaboratively without reprogramming. This paper for the first time discusses the similarity between smart manufacturing systems and the ubiquitous robotic systems and makes an effort on deploying ubiquitous robotic technology to the smart factory. Specifically, a component based framework is proposed in order to enable the communication and cooperation of the heterogeneous robotic devices. Further, compared to the service robotic domain, the smart manufacturing systems are often in larger size. So a hierarchical planning method was implemented to improve the planning efficiency. A test bed of smart factory is developed. It demonstrates that the proposed framework is suitable for industrial domain, and the hierarchical planning method is able to solve large problems intractable with flat methods. PMID:27446206
NASA Astrophysics Data System (ADS)
Klopfer, Eric; Yoon, Susan; Perry, Judy
2005-09-01
This paper reports on teachers' perceptions of the educational affordances of a handheld application called Participatory Simulations. It presents evidence from five cases representing each of the populations who work with these computational tools. Evidence across multiple data sources yield similar results to previous research evaluations of handheld activities with respect to enhancing motivation, engagement and self-directed learning. Three additional themes are discussed that provide insight into understanding curricular applicability of Participatory Simulations that suggest a new take on ubiquitous and accessible mobile computing. These themes generally point to the multiple layers of social and cognitive flexibility intrinsic to their design: ease of adaptation to subject-matter content knowledge and curricular integration; facility in attending to teacher-individualized goals; and encouraging the adoption of learner-centered strategies.
On Maximizing the Throughput of Packet Transmission under Energy Constraints.
Wu, Weiwei; Dai, Guangli; Li, Yan; Shan, Feng
2018-06-23
More and more Internet of Things (IoT) wireless devices have been providing ubiquitous services over the recent years. Since most of these devices are powered by batteries, a fundamental trade-off to be addressed is the depleted energy and the achieved data throughput in wireless data transmission. By exploiting the rate-adaptive capacities of wireless devices, most existing works on energy-efficient data transmission try to design rate-adaptive transmission policies to maximize the amount of transmitted data bits under the energy constraints of devices. Such solutions, however, cannot apply to scenarios where data packets have respective deadlines and only integrally transmitted data packets contribute. Thus, this paper introduces a notion of weighted throughput, which measures how much total value of data packets are successfully and integrally transmitted before their own deadlines. By designing efficient rate-adaptive transmission policies, this paper aims to make the best use of the energy and maximize the weighted throughput. What is more challenging but with practical significance, we consider the fading effect of wireless channels in both offline and online scenarios. In the offline scenario, we develop an optimal algorithm that computes the optimal solution in pseudo-polynomial time, which is the best possible solution as the problem undertaken is NP-hard. In the online scenario, we propose an efficient heuristic algorithm based on optimal properties derived for the optimal offline solution. Simulation results validate the efficiency of the proposed algorithm.
Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments.
Lee, Jaeseung; Sung, Yunsick; Park, Jong Hyuk
2016-12-01
The Internet of Things (IoT) is the intelligent technologies and services that mutually communicate information between humans and devices or between Internet-based devices. In IoT environments, various device information is collected from the user for intelligent technologies and services that control the devices. Recently, wireless sensor networks based on IoT environments are being used in sectors as diverse as medicine, the military, and commerce. Specifically, sensor techniques that collect relevant area data via mini-sensors after distributing smart dust in inaccessible areas like forests or military zones have been embraced as the future of information technology. IoT environments that utilize smart dust are composed of the sensor nodes that detect data using wireless sensors and transmit the detected data to middle nodes. Currently, since the sensors used in these environments are composed of mini-hardware, they have limited memory, processing power, and energy, and a variety of research that aims to make the best use of these limited resources is progressing. This paper proposes a method to utilize these resources while considering energy efficiency, and suggests lightweight mutual verification and key exchange methods based on a hash function that has no restrictions on operation quantity, velocity, and storage space. This study verifies the security and energy efficiency of this method through security analysis and function evaluation, comparing with existing approaches. The proposed method has great value in its applicability as a lightweight security technology for IoT environments.
Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments
Lee, Jaeseung; Sung, Yunsick; Park, Jong Hyuk
2016-01-01
The Internet of Things (IoT) is the intelligent technologies and services that mutually communicate information between humans and devices or between Internet-based devices. In IoT environments, various device information is collected from the user for intelligent technologies and services that control the devices. Recently, wireless sensor networks based on IoT environments are being used in sectors as diverse as medicine, the military, and commerce. Specifically, sensor techniques that collect relevant area data via mini-sensors after distributing smart dust in inaccessible areas like forests or military zones have been embraced as the future of information technology. IoT environments that utilize smart dust are composed of the sensor nodes that detect data using wireless sensors and transmit the detected data to middle nodes. Currently, since the sensors used in these environments are composed of mini-hardware, they have limited memory, processing power, and energy, and a variety of research that aims to make the best use of these limited resources is progressing. This paper proposes a method to utilize these resources while considering energy efficiency, and suggests lightweight mutual verification and key exchange methods based on a hash function that has no restrictions on operation quantity, velocity, and storage space. This study verifies the security and energy efficiency of this method through security analysis and function evaluation, comparing with existing approaches. The proposed method has great value in its applicability as a lightweight security technology for IoT environments. PMID:27916962
A vision for ubiquitous sequencing
Erlich, Yaniv
2015-01-01
Genomics has recently celebrated reaching the $1000 genome milestone, making affordable DNA sequencing a reality. With this goal successfully completed, the next goal of the sequencing revolution can be sequencing sensors—miniaturized sequencing devices that are manufactured for real-time applications and deployed in large quantities at low costs. The first part of this manuscript envisions applications that will benefit from moving the sequencers to the samples in a range of domains. In the second part, the manuscript outlines the critical barriers that need to be addressed in order to reach the goal of ubiquitous sequencing sensors. PMID:26430149
Importance of the spatial data and the sensor web in the ubiquitous computing area
NASA Astrophysics Data System (ADS)
Akçit, Nuhcan; Tomur, Emrah; Karslıoǧlu, Mahmut O.
2014-08-01
Spatial data has become a critical issue in recent years. In the past years, nearly more than three quarters of databases, were related directly or indirectly to locations referring to physical features, which constitute the relevant aspects. Spatial data is necessary to identify or calculate the relationships between spatial objects when using spatial operators in programs or portals. Originally, calculations were conducted using Geographic Information System (GIS) programs on local computers. Subsequently, through the Internet, they formed a geospatial web, which is integrated into a discoverable collection of geographically related web standards and key features, and constitutes a global network of geospatial data that employs the World Wide Web to process textual data. In addition, the geospatial web is used to gather spatial data producers, resources, and users. Standards also constitute a critical dimension in further globalizing the idea of the geospatial web. The sensor web is an example of the real time service that the geospatial web can provide. Sensors around the world collect numerous types of data. The sensor web is a type of sensor network that is used for visualizing, calculating, and analyzing collected sensor data. Today, people use smart devices and systems more frequently because of the evolution of technology and have more than one mobile device. The considerable number of sensors and different types of data that are positioned around the world have driven the production of interoperable and platform-independent sensor web portals. The focus of such production has been on further developing the idea of an interoperable and interdependent sensor web of all devices that share and collect information. The other pivotal idea consists of encouraging people to use and send data voluntarily for numerous purposes with the some level of credibility. The principal goal is to connect mobile and non-mobile device in the sensor web platform together to operate for serving and collecting information from people.
A model for ubiquitous care of noncommunicable diseases.
Vianna, Henrique Damasceno; Barbosa, Jorge Luis Victória
2014-09-01
The ubiquitous computing, or ubicomp, is a promising technology to help chronic diseases patients managing activities, offering support to them anytime, anywhere. Hence, ubicomp can aid community and health organizations to continuously communicate with patients and to offer useful resources for their self-management activities. Communication is prioritized in works of ubiquitous health for noncommunicable diseases care, but the management of resources is not commonly employed. We propose the UDuctor, a model for ubiquitous care of noncommunicable diseases. UDuctor focuses the resources offering, without losing self-management and communication supports. We implemented a system and applied it in two practical experiments. First, ten chronic patients tried the system and filled out a questionnaire based on the technology acceptance model. After this initial evaluation, an alpha test was done. The system was used daily for one month and a half by a chronic patient. The results were encouraging and show potential for implementing UDuctor in real-life situations.
Navigation studies based on the ubiquitous positioning technologies
NASA Astrophysics Data System (ADS)
Ye, Lei; Mi, Weijie; Wang, Defeng
2007-11-01
This paper summarized the nowadays positioning technologies, such as absolute positioning methods and relative positioning methods, indoor positioning and outdoor positioning, active positioning and passive positioning. Global Navigation Satellite System (GNSS) technologies were introduced as the omnipresent out-door positioning technologies, including GPS, GLONASS, Galileo and BD-1/2. After analysis of the shortcomings of GNSS, indoor positioning technologies were discussed and compared, including A-GPS, Cellular network, Infrared, Electromagnetism, Computer Vision Cognition, Embedded Pressure Sensor, Ultrasonic, RFID (Radio Frequency IDentification), Bluetooth, WLAN etc.. Then the concept and characteristics of Ubiquitous Positioning was proposed. After the ubiquitous positioning technologies contrast and selection followed by system engineering methodology, a navigation system model based on Incorporate Indoor-Outdoor Positioning Solution was proposed. And this model was simulated in the Galileo Demonstration for World Expo Shanghai project. In the conclusion, the prospects of ubiquitous positioning based navigation were shown, especially to satisfy the public location information acquiring requirement.
Nonlinear dynamics of a rack-pinion-rack device powered by the Casimir force.
Miri, MirFaez; Nekouie, Vahid; Golestanian, Ramin
2010-01-01
Using the lateral Casimir force-a manifestation of the quantum fluctuations of the electromagnetic field between objects with corrugated surfaces-as the main force transduction mechanism, a nanomechanical device with rich dynamical behaviors is proposed. The device is made of two parallel racks that are moving in the same direction and a pinion in the middle that couples with both racks via the noncontact lateral Casimir force. The built-in frustration in the device causes it to be very sensitive and react dramatically to minute changes in the geometrical parameters and initial conditions of the system. The noncontact nature of the proposed device could help with the ubiquitous wear problem in nanoscale mechanical systems.
Computers on Wheels: An Alternative to Each One Has One
ERIC Educational Resources Information Center
Grant, Michael M.; Ross, Steven M.; Wang, Weiping; Potter, Allison
2005-01-01
Four fifth-grade classrooms embarked on a modified ubiquitous computing initiative in the fall of 2003. Two 15-computer wireless laptop carts were shared among the four classrooms in an effort to integrate technology across the curriculum and affect change in student learning and teacher pedagogy. This initiative--in contrast to other one-to-one…
Experiences with Efficient Methodologies for Teaching Computer Programming to Geoscientists
ERIC Educational Resources Information Center
Jacobs, Christian T.; Gorman, Gerard J.; Rees, Huw E.; Craig, Lorraine E.
2016-01-01
Computer programming was once thought of as a skill required only by professional software developers. But today, given the ubiquitous nature of computation and data science it is quickly becoming necessary for all scientists and engineers to have at least a basic knowledge of how to program. Teaching how to program, particularly to those students…
A Year in the Life: Two Seventh Grade Teachers Implement One-to-One Computing
ERIC Educational Resources Information Center
Garthwait, Abigail; Weller, Herman G.
2005-01-01
Maine was the first state to put laptops in the hands of an entire grade of students. This interpretive case study of two middle school science-math teachers was driven by the general question: Given ubiquitous computing, how do teachers use computers in constructing curriculum and delivering instruction? Specifically, the researchers sought to…
Low Cost Sensor Calibration Options
Low-cost sensors ($1 D0-500) represent a unique class of air monitoring devices that may provide for more ubiquitous pollutant monitoring. They vary widely in design and measure pollutants, ranging from ozone, particulate matter, to volatile organic compounds. Many of these senso...
A Web of Things-Based Emerging Sensor Network Architecture for Smart Control Systems.
Khan, Murad; Silva, Bhagya Nathali; Han, Kijun
2017-02-09
The Web of Things (WoT) plays an important role in the representation of the objects connected to the Internet of Things in a more transparent and effective way. Thus, it enables seamless and ubiquitous web communication between users and the smart things. Considering the importance of WoT, we propose a WoT-based emerging sensor network (WoT-ESN), which collects data from sensors, routes sensor data to the web, and integrate smart things into the web employing a representational state transfer (REST) architecture. A smart home scenario is introduced to evaluate the proposed WoT-ESN architecture. The smart home scenario is tested through computer simulation of the energy consumption of various household appliances, device discovery, and response time performance. The simulation results show that the proposed scheme significantly optimizes the energy consumption of the household appliances and the response time of the appliances.
A Web of Things-Based Emerging Sensor Network Architecture for Smart Control Systems
Khan, Murad; Silva, Bhagya Nathali; Han, Kijun
2017-01-01
The Web of Things (WoT) plays an important role in the representation of the objects connected to the Internet of Things in a more transparent and effective way. Thus, it enables seamless and ubiquitous web communication between users and the smart things. Considering the importance of WoT, we propose a WoT-based emerging sensor network (WoT-ESN), which collects data from sensors, routes sensor data to the web, and integrate smart things into the web employing a representational state transfer (REST) architecture. A smart home scenario is introduced to evaluate the proposed WoT-ESN architecture. The smart home scenario is tested through computer simulation of the energy consumption of various household appliances, device discovery, and response time performance. The simulation results show that the proposed scheme significantly optimizes the energy consumption of the household appliances and the response time of the appliances. PMID:28208787
Psycho-informatics: Big Data shaping modern psychometrics.
Markowetz, Alexander; Błaszkiewicz, Konrad; Montag, Christian; Switala, Christina; Schlaepfer, Thomas E
2014-04-01
For the first time in history, it is possible to study human behavior on great scale and in fine detail simultaneously. Online services and ubiquitous computational devices, such as smartphones and modern cars, record our everyday activity. The resulting Big Data offers unprecedented opportunities for tracking and analyzing behavior. This paper hypothesizes the applicability and impact of Big Data technologies in the context of psychometrics both for research and clinical applications. It first outlines the state of the art, including the severe shortcomings with respect to quality and quantity of the resulting data. It then presents a technological vision, comprised of (i) numerous data sources such as mobile devices and sensors, (ii) a central data store, and (iii) an analytical platform, employing techniques from data mining and machine learning. To further illustrate the dramatic benefits of the proposed methodologies, the paper then outlines two current projects, logging and analyzing smartphone usage. One such study attempts to thereby quantify severity of major depression dynamically; the other investigates (mobile) Internet Addiction. Finally, the paper addresses some of the ethical issues inherent to Big Data technologies. In summary, the proposed approach is about to induce the single biggest methodological shift since the beginning of psychology or psychiatry. The resulting range of applications will dramatically shape the daily routines of researches and medical practitioners alike. Indeed, transferring techniques from computer science to psychiatry and psychology is about to establish Psycho-Informatics, an entire research direction of its own. Copyright © 2013 Elsevier Ltd. All rights reserved.
Teaching Information Technology Law
ERIC Educational Resources Information Center
Taylor, M. J.; Jones, R. P.; Haggerty, J.; Gresty, D.
2009-01-01
In this paper we discuss an approach to the teaching of information technology law to higher education computing students that attempts to prepare them for professional computing practice. As information technology has become ubiquitous its interactions with the law have become more numerous. Information technology practitioners, and in particular…
Biology Inspired Approach for Communal Behavior in Sensor Networks
NASA Technical Reports Server (NTRS)
Jones, Kennie H.; Lodding, Kenneth N.; Olariu, Stephan; Wilson, Larry; Xin, Chunsheng
2006-01-01
Research in wireless sensor network technology has exploded in the last decade. Promises of complex and ubiquitous control of the physical environment by these networks open avenues for new kinds of science and business. Due to the small size and low cost of sensor devices, visionaries promise systems enabled by deployment of massive numbers of sensors working in concert. Although the reduction in size has been phenomenal it results in severe limitations on the computing, communicating, and power capabilities of these devices. Under these constraints, research efforts have concentrated on developing techniques for performing relatively simple tasks with minimal energy expense assuming some form of centralized control. Unfortunately, centralized control does not scale to massive size networks and execution of simple tasks in sparsely populated networks will not lead to the sophisticated applications predicted. These must be enabled by new techniques dependent on local and autonomous cooperation between sensors to effect global functions. As a step in that direction, in this work we detail a technique whereby a large population of sensors can attain a global goal using only local information and by making only local decisions without any form of centralized control.
Tweeting in the Classroom: Instant feedback and assessment using a mobile web app
NASA Astrophysics Data System (ADS)
Saravanan, R.
2011-12-01
Cell phones with texting capabilities are ubiquitous in the college classroom, and smart phones are becoming increasingly common. These phones are used primarily for personal activities, including social networking, and are expected to remain switched off during instruction. The powerful communication capability of these devices, which could potentially facilitate novel forms of "instructional networking", remains untapped. Instead, special-purpose devices ("clickers") are used when instant feedback is desired in the classroom. A number of technical and behavioral challenges need to be overcome before mobile phones can be used routinely to assist in classroom instruction. This presentation will describe the experience of developing and deploying a mobile web app that enables students to provide instant feedback in the classroom using their mobile phones. The web app leverages existing social networking infrastructure, e.g., using the Twitter microblogging service to aggregate text messages sent by students, to promote classroom interaction. The web app was deployed both in a regular lecture hall and in a computer lab. Topics to be discussed include the technical challenges of deploying a mobile web app in a classroom setting, such as internet accessibility and latency, as well as non-technical issues relating to privacy, student reactions, etc.
The mixed reality of things: emerging challenges for human-information interaction
NASA Astrophysics Data System (ADS)
Spicer, Ryan P.; Russell, Stephen M.; Rosenberg, Evan Suma
2017-05-01
Virtual and mixed reality technology has advanced tremendously over the past several years. This nascent medium has the potential to transform how people communicate over distance, train for unfamiliar tasks, operate in challenging environments, and how they visualize, interact, and make decisions based on complex data. At the same time, the marketplace has experienced a proliferation of network-connected devices and generalized sensors that are becoming increasingly accessible and ubiquitous. As the "Internet of Things" expands to encompass a predicted 50 billion connected devices by 2020, the volume and complexity of information generated in pervasive and virtualized environments will continue to grow exponentially. The convergence of these trends demands a theoretically grounded research agenda that can address emerging challenges for human-information interaction (HII). Virtual and mixed reality environments can provide controlled settings where HII phenomena can be observed and measured, new theories developed, and novel algorithms and interaction techniques evaluated. In this paper, we describe the intersection of pervasive computing with virtual and mixed reality, identify current research gaps and opportunities to advance the fundamental understanding of HII, and discuss implications for the design and development of cyber-human systems for both military and civilian use.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jarillo-Herrero, Pablo
This is the final report of our research program on electronic transport experiments on Topological Insulator (TI) devices, funded by the DOE Office of Basic Energy Sciences. TI-based electronic devices are attractive as platforms for spintronic applications, and for detection of emergent properties such as Majorana excitations , electron-hole condensates , and the topological magneto-electric effect . Most theoretical proposals envision geometries consisting of a planar TI device integrated with materials of distinctly different physical phases (such as ferromagnets and superconductors). Experimental realization of physics tied to the surface states is a challenge due to the ubiquitous presence of bulkmore » carriers in most TI compounds as well as degradation during device fabrication.« less
Trelease, Robert B
2016-11-01
Until the late-twentieth century, primary anatomical sciences education was relatively unenhanced by advanced technology and dependent on the mainstays of printed textbooks, chalkboard- and photographic projection-based classroom lectures, and cadaver dissection laboratories. But over the past three decades, diffusion of innovations in computer technology transformed the practices of anatomical education and research, along with other aspects of work and daily life. Increasing adoption of first-generation personal computers (PCs) in the 1980s paved the way for the first practical educational applications, and visionary anatomists foresaw the usefulness of computers for teaching. While early computers lacked high-resolution graphics capabilities and interactive user interfaces, applications with video discs demonstrated the practicality of programming digital multimedia linking descriptive text with anatomical imaging. Desktop publishing established that computers could be used for producing enhanced lecture notes, and commercial presentation software made it possible to give lectures using anatomical and medical imaging, as well as animations. Concurrently, computer processing supported the deployment of medical imaging modalities, including computed tomography, magnetic resonance imaging, and ultrasound, that were subsequently integrated into anatomy instruction. Following its public birth in the mid-1990s, the World Wide Web became the ubiquitous multimedia networking technology underlying the conduct of contemporary education and research. Digital video, structural simulations, and mobile devices have been more recently applied to education. Progressive implementation of computer-based learning methods interacted with waves of ongoing curricular change, and such technologies have been deemed crucial for continuing medical education reforms, providing new challenges and opportunities for anatomical sciences educators. Anat Sci Educ 9: 583-602. © 2016 American Association of Anatomists. © 2016 American Association of Anatomists.
Challenges and Security in Cloud Computing
NASA Astrophysics Data System (ADS)
Chang, Hyokyung; Choi, Euiin
People who live in this world want to solve any problems as they happen then. An IT technology called Ubiquitous computing should help the situations easier and we call a technology which makes it even better and powerful cloud computing. Cloud computing, however, is at the stage of the beginning to implement and use and it faces a lot of challenges in technical matters and security issues. This paper looks at the cloud computing security.
Ubiquitous Green Computing Techniques for High Demand Applications in Smart Environments
Zapater, Marina; Sanchez, Cesar; Ayala, Jose L.; Moya, Jose M.; Risco-Martín, José L.
2012-01-01
Ubiquitous sensor network deployments, such as the ones found in Smart cities and Ambient intelligence applications, require constantly increasing high computational demands in order to process data and offer services to users. The nature of these applications imply the usage of data centers. Research has paid much attention to the energy consumption of the sensor nodes in WSNs infrastructures. However, supercomputing facilities are the ones presenting a higher economic and environmental impact due to their very high power consumption. The latter problem, however, has been disregarded in the field of smart environment services. This paper proposes an energy-minimization workload assignment technique, based on heterogeneity and application-awareness, that redistributes low-demand computational tasks from high-performance facilities to idle nodes with low and medium resources in the WSN infrastructure. These non-optimal allocation policies reduce the energy consumed by the whole infrastructure and the total execution time. PMID:23112621
Ubiquitous green computing techniques for high demand applications in Smart environments.
Zapater, Marina; Sanchez, Cesar; Ayala, Jose L; Moya, Jose M; Risco-Martín, José L
2012-01-01
Ubiquitous sensor network deployments, such as the ones found in Smart cities and Ambient intelligence applications, require constantly increasing high computational demands in order to process data and offer services to users. The nature of these applications imply the usage of data centers. Research has paid much attention to the energy consumption of the sensor nodes in WSNs infrastructures. However, supercomputing facilities are the ones presenting a higher economic and environmental impact due to their very high power consumption. The latter problem, however, has been disregarded in the field of smart environment services. This paper proposes an energy-minimization workload assignment technique, based on heterogeneity and application-awareness, that redistributes low-demand computational tasks from high-performance facilities to idle nodes with low and medium resources in the WSN infrastructure. These non-optimal allocation policies reduce the energy consumed by the whole infrastructure and the total execution time.
E-Textile Antennas for Space Environments
NASA Technical Reports Server (NTRS)
Kennedy, Timothy F.; Fink, Patrick W.; Chu, Andrew W.
2007-01-01
The ability to integrate antennas and other radio frequency (RF) devices into wearable systems is increasingly important as wireless voice, video, and data sources become ubiquitous. Consumer applications including mobile computing, communications, and entertainment, as well as military and space applications for integration of biotelemetry, detailed tracking information and status of handheld tools, devices and on-body inventories are driving forces for research into wearable antennas and other e-textile devices. Operational conditions for military and space applications of wireless systems are often such that antennas are a limiting factor in wireless performance. The changing antenna platform, i.e. the dynamic wearer, can detune and alter the radiation characteristics of e-textile antennas, making antenna element selection and design challenging. Antenna designs and systems that offer moderate bandwidth, perform well with flexure, and are electronically reconfigurable are ideally suited to wearable applications. Several antennas, shown in Figure 1, have been created using a NASA-developed process for e-textiles that show promise in being integrated into a robust wireless system for space-based applications. Preliminary characterization of the antennas with flexure indicates that antenna performance can be maintained, and that a combination of antenna design and placement are useful in creating robust designs. Additionally, through utilization of modern smart antenna techniques, even greater flexibility can be achieved since antenna performance can be adjusted in real-time to compensate for the antenna s changing environment.
ERIC Educational Resources Information Center
Kennedy, Mike
2007-01-01
With classroom Internet access nearly universal in public schools and computers ubiquitous on every school and university campus, classroom furnishings have evolved to accommodate the machines so students can take full advantage of the technology. The desks, tables and other furniture that a school chooses for its computers will depend on the…
ERIC Educational Resources Information Center
Schaffhauser, Dian
2010-01-01
Institutions already cater to the technology needs of students. According to the 2008 Campus Computing survey, 60 percent of colleges and universities offer pervasive or near-pervasive wireless; computers are as ubiquitous as water bottles; course management systems have become one-stop shops for class content; few classrooms lack projectors; and…
Pervasive Computing and Communication Technologies for U-Learning
ERIC Educational Resources Information Center
Park, Young C.
2014-01-01
The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…
Ubiquitous Computing Technologies in Education
ERIC Educational Resources Information Center
Hwang, Gwo-Jen; Wu, Ting-Ting; Chen, Yen-Jung
2007-01-01
The prosperous development of wireless communication and sensor technologies has attracted the attention of researchers from both computer and education fields. Various investigations have been made for applying the new technologies to education purposes, such that more active and adaptive learning activities can be conducted in the real world.…
Addressing Gender Differences in Computer Ability, Attitudes and Use: The Laptop Effect
ERIC Educational Resources Information Center
Kay, Robin
2006-01-01
The impact of gender on computer related attitudes, ability, and use has been actively documented, but little research has been done examining how to modify and reduce imbalances. The purpose of this study was to explore the effect of ubiquitous computing (24-hour access to a laptop and the Internet) on gender differences in pre-service teachers…
Ubiquitous computing in sports: A review and analysis.
Baca, Arnold; Dabnichki, Peter; Heller, Mario; Kornfeind, Philipp
2009-10-01
Ubiquitous (pervasive) computing is a term for a synergetic use of sensing, communication and computing. Pervasive use of computing has seen a rapid increase in the current decade. This development has propagated in applied sport science and everyday life. The work presents a survey of recent developments in sport and leisure with emphasis on technology and computational techniques. A detailed analysis on new technological developments is performed. Sensors for position and motion detection, and such for equipment and physiological monitoring are discussed. Aspects of novel trends in communication technologies and data processing are outlined. Computational advancements have started a new trend - development of smart and intelligent systems for a wide range of applications - from model-based posture recognition to context awareness algorithms for nutrition monitoring. Examples particular to coaching and training are discussed. Selected tools for monitoring rules' compliance and automatic decision-making are outlined. Finally, applications in leisure and entertainment are presented, from systems supporting physical activity to systems providing motivation. It is concluded that the emphasis in future will shift from technologies to intelligent systems that allow for enhanced social interaction as efforts need to be made to improve user-friendliness and standardisation of measurement and transmission protocols.
Nurses and health information technology: working with and around computers.
Peace, Jane
2011-01-01
Information technology is nearly ubiquitous in health care settings. Nurses need basic computer skills and information literacy to effectively practice nursing. In addition, nurses must be prepared not only to work around complex health information technology, but also to communicate with individuals who can address the underlying problems.
Learning Group Formation Based on Learner Profile and Context
ERIC Educational Resources Information Center
Muehlenbrock, Martin
2006-01-01
An important but often neglected aspect in Computer-Supported Collaborative Learning (CSCL) is the formation of learning groups. Until recently, most support for group formation was based on learner profile information. In addition, the perspective of ubiquitous computing and ambient intelligence allows for a wider perspective on group formation,…
ERIC Educational Resources Information Center
Lucking, Robert A.; Christmann, Edwin P.; Wighting, Mervyn J.
2010-01-01
Although in some schools cell phones have to be turned off or perhaps kept in lockers to avoid misuse, the authors hope to demonstrate in this article how they can be used under supervision to assist learning. This ubiquitous device can be a powerful classroom tool. (Contains 2 figures.)
Mobile and Accessible Learning for MOOCs
ERIC Educational Resources Information Center
Sharples, Mike; Kloos, Carlos Delgado; Dimitriadis, Yannis; Garlatti, Serge; Specht, Marcus
2015-01-01
Many modern web-based systems provide a "responsive" design that allows material and services to be accessed on mobile and desktop devices, with the aim of providing "ubiquitous access." Besides offering access to learning materials such as podcasts and videos across multiple locations, mobile, wearable and ubiquitous…
International Symposium on Grids and Clouds (ISGC) 2016
NASA Astrophysics Data System (ADS)
The International Symposium on Grids and Clouds (ISGC) 2016 will be held at Academia Sinica in Taipei, Taiwan from 13-18 March 2016, with co-located events and workshops. The conference is hosted by the Academia Sinica Grid Computing Centre (ASGC). The theme of ISGC 2016 focuses on“Ubiquitous e-infrastructures and Applications”. Contemporary research is impossible without a strong IT component - researchers rely on the existence of stable and widely available e-infrastructures and their higher level functions and properties. As a result of these expectations, e-Infrastructures are becoming ubiquitous, providing an environment that supports large scale collaborations that deal with global challenges as well as smaller and temporal research communities focusing on particular scientific problems. To support those diversified communities and their needs, the e-Infrastructures themselves are becoming more layered and multifaceted, supporting larger groups of applications. Following the call for the last year conference, ISGC 2016 continues its aim to bring together users and application developers with those responsible for the development and operation of multi-purpose ubiquitous e-Infrastructures. Topics of discussion include Physics (including HEP) and Engineering Applications, Biomedicine & Life Sciences Applications, Earth & Environmental Sciences & Biodiversity Applications, Humanities, Arts, and Social Sciences (HASS) Applications, Virtual Research Environment (including Middleware, tools, services, workflow, etc.), Data Management, Big Data, Networking & Security, Infrastructure & Operations, Infrastructure Clouds and Virtualisation, Interoperability, Business Models & Sustainability, Highly Distributed Computing Systems, and High Performance & Technical Computing (HPTC), etc.
ERIC Educational Resources Information Center
Teo, Timothy; Luan, Wong Su; Sing, Chai Ching
2008-01-01
As computers becomes more ubiquitous in our everyday lives, educational settings are being transformed where educators and students are expected to teach and learn, using computers (Lee, 2003). This study, therefore, explored pre-service teachers' self reported future intentions to use computers in Singapore and Malaysia. A survey methodology was…
Sigint Application for Polymorphous Computing Architecture (PCA): Wideband DF
2006-08-01
Polymorphous Computing Architecture (PCA) program as stated by Robert Graybill is to Develop the computing foundation for agile systems by establishing...ubiquitous MUSIC algorithm rely upon an underlying narrowband signal model [8]. In this case, narrowband means that the signal bandwidth is less than...a wideband DF algorithm is needed to compensate for this model inadequacy. Among the various wideband DF techniques available, the coherent signal
Machine-assisted editing of user-generated content
NASA Astrophysics Data System (ADS)
Cremer, Markus; Cook, Randall
2009-02-01
Over recent years user-generated content has become ubiquitously available and an attractive entertainment source for millions of end-users. Particularly for larger events, where many people use their devices to capture the action, a great number of short video clips are made available through appropriate web services. The objective of this presentation is to describe a way to combine these clips by analyzing them, and automatically reconstruct the time line in which the individual video clips were captured. This will enable people to easily create a compelling multimedia experience by leveraging multiple clips taken by different users from different angles, and across different time spans. The user will be able to shift into the role of a movie director mastering a multi-camera recording of the event. To achieve this goal, the audio portion of the video clips is analyzed, and waveform characteristics are computed with high temporal granularity in order to facilitate precise time alignment and overlap computation of the user-generated clips. Special care has to be given not only to the robustness of the selected audio features against ambient noise and various distortions, but also to the matching algorithm used to align the user-generated clips properly.
Redefining the Longitude/Latitude Experience with a Scaffolded Geocache
ERIC Educational Resources Information Center
Hammond, Thomas; Bozdin, Alec M.; Stanlick, Sarah E.
2014-01-01
Latitude and longitude are foundational concepts for geography education, yet they are typically poorly understood by students and receive indifferent attention from instructors and publishers' materials. Social studies teachers can take advantage of increasingly ubiquitous geolocating devices such as Global Positions Systems (GPS) to provide…
Streamlining machine learning in mobile devices for remote sensing
NASA Astrophysics Data System (ADS)
Coronel, Andrei D.; Estuar, Ma. Regina E.; Garcia, Kyle Kristopher P.; Dela Cruz, Bon Lemuel T.; Torrijos, Jose Emmanuel; Lim, Hadrian Paulo M.; Abu, Patricia Angela R.; Victorino, John Noel C.
2017-09-01
Mobile devices have been at the forefront of Intelligent Farming because of its ubiquitous nature. Applications on precision farming have been developed on smartphones to allow small farms to monitor environmental parameters surrounding crops. Mobile devices are used for most of these applications, collecting data to be sent to the cloud for storage, analysis, modeling and visualization. However, with the issue of weak and intermittent connectivity in geographically challenged areas of the Philippines, the solution is to provide analysis on the phone itself. Given this, the farmer gets a real time response after data submission. Though Machine Learning is promising, hardware constraints in mobile devices limit the computational capabilities, making model development on the phone restricted and challenging. This study discusses the development of a Machine Learning based mobile application using OpenCV libraries. The objective is to enable the detection of Fusarium oxysporum cubense (Foc) in juvenile and asymptomatic bananas using images of plant parts and microscopic samples as input. Image datasets of attached, unattached, dorsal, and ventral views of leaves were acquired through sampling protocols. Images of raw and stained specimens from soil surrounding the plant, and sap from the plant resulted to stained and unstained samples respectively. Segmentation and feature extraction techniques were applied to all images. Initial findings show no significant differences among the different feature extraction techniques. For differentiating infected from non-infected leaves, KNN yields highest average accuracy, as opposed to Naive Bayes and SVM. For microscopic images using MSER feature extraction, KNN has been tested as having a better accuracy than SVM or Naive-Bayes.
AI Techniques in a Context-Aware Ubiquitous Environment
NASA Astrophysics Data System (ADS)
Coppola, Paolo; Mea, Vincenzo Della; di Gaspero, Luca; Lomuscio, Raffaella; Mischis, Danny; Mizzaro, Stefano; Nazzi, Elena; Scagnetto, Ivan; Vassena, Luca
Nowadays, the mobile computing paradigm and the widespread diffusion of mobile devices are quickly changing and replacing many common assumptions about software architectures and interaction/communication models. The environment, in particular, or more generally, the so-called user context is claiming a central role in everyday’s use of cellular phones, PDAs, etc. This is due to the huge amount of data “suggested” by the surrounding environment that can be helpful in many common tasks. For instance, the current context can help a search engine to refine the set of results in a useful way, providing the user with a more suitable and exploitable information. Moreover, we can take full advantage of this new data source by “pushing” active contents towards mobile devices, empowering the latter with new features (e.g., applications) that can allow the user to fruitfully interact with the current context. Following this vision, mobile devices become dynamic self-adapting tools, according to the user needs and the possibilities offered by the environment. The present work proposes MoBe: an approach for providing a basic infrastructure for pervasive context-aware applications on mobile devices, in which AI techniques (namely a principled combination of rule-based systems, Bayesian networks and ontologies) are applied to context inference. The aim is to devise a general inferential framework to make easier the development of context-aware applications by integrating the information coming from physical and logical sensors (e.g., position, agenda) and reasoning about this information in order to infer new and more abstract contexts.
Saldaña Barrios, Juan Jose; Mendoza, Luis; Pitti, Edgardo; Vargas, Miguel
2016-10-21
In this work, the authors present two eHealth platforms that are examples of how health systems are migrating from client-server architecture to the web-based and ubiquitous paradigm. These two platforms were modeled, designed, developed and implemented with positive results. First, using ambient-assisted living and ubiquitous computing, the authors enhance how palliative care is being provided to the elderly patients and patients with terminal illness, making the work of doctors, nurses and other health actors easier. Second, applying machine learning methods and a data-centered, ubiquitous, patient's results' repository, the authors intent to improve the Down's syndrome risk estimation process with more accurate predictions based on local woman patients' parameters. These two eHealth platforms can improve the quality of life, not only physically but also psychologically, of the patients and their families in the country of Panama. © The Author(s) 2016.
Biomedical digital assistant for ubiquitous healthcare.
Lee, Tae-Soo; Hong, Joo-Hyun; Cho, Myeong-Chan
2007-01-01
The concept of ubiquitous healthcare service, which emerged as one of measures to solve healthcare problems in aged society, means that patients can receive services such as prevention, diagnosis, therapy and prognosis management at any time and in any place with the help of advanced information and communication technology. This service requires not only biomedical digital assistant that can monitor continuously the patients' health condition regardless of time and place, but also wired and wireless communication devices and telemedicine servers that provide doctors with data on patients' present health condition. In order to implement a biomedical digital assistant that is portable and wearable to patients, the present study developed a device that minimizes size, weight and power consumption, measures ECG and PPG signals, and even monitors moving patients' state. The biomedical sensor with the function of wireless communication was designed to be highly portable and wearable, to be operable 24 hours with small-size batteries, and to monitor the subject's heart rate, step count and respiratory rate in his daily life. The biomedical signal receiving device was implemented in two forms, PDA and cellular phone. The movement monitoring device embedded in the battery pack of a cellular phone does not have any problem in operating 24 hours, but the real-time biomedical signal receiving device implemented with PDA operated up to 6 hours due to the limited battery capacity of PDA. This problem is expected to be solved by reducing wireless communication load through improving the processing and storage functions of the sensor. The developed device can transmit a message on the patient's emergency to the remote server through the cellular phone network, and is expected to play crucial roles in the health management of chronic-aged patients in their daily life.
A Case for Ubiquitous, Integrated Computing in Teacher Education
ERIC Educational Resources Information Center
Kay, Robin H.; Knaack, Liesel
2005-01-01
The purpose of this study was to evaluate the effect of an integrated, laptop-based approach on pre-service teachers' computer attitudes, ability and use. Pre-post program analysis revealed significant differences in behavioural attitudes and perceived control (self-efficacy), but not in affective and cognitive attitudes. In addition, there was a…
Polycyclic aromatic hydrocarbons (PAHs) are a class of ubiquitous, anthropogenic chemicals found in the environment. In the present study, computational methods are used to evaluate their potential estrogenicity and the contribution chemicals in this class make to environmental e...
2005-03-28
consequently users are torn between taking advantage of increasingly pervasive computing systems, and the price (in attention and skill) that they have to... advantage of the surrounding computing environments; and (c) that it is usable by non-experts. Second, from a software architect’s perspective, we...take full advantage of the computing systems accessible to them, much as they take advantage of the furniture in each physical space. In the example
Language Learning Podcasts and Learners' Belief Change
ERIC Educational Resources Information Center
Basaran, Süleyman; Cabaroglu, Nese
2014-01-01
The ubiquitous use of Internet-based mobile devices in educational contexts means that mobile learning has become a plausible alternative to or a good complement for conventional classroom-based teaching. However, there is a lack of research that explores and defines the characteristics and effects of mobile language learning (LL) through language…
Mobile Learning: Extreme Outcomes of "Everywhere, Anytime"
ERIC Educational Resources Information Center
De Simone, Giuseppe Cosimo
2016-01-01
Mobile learning, if considered in its most enthusiastic versions, promises to transform the world of learning. It seems that mobile devices will lead to overcome the narrow limits of the classroom to achieve ubiquitous learning. But if we analyze critically the promise of the everywhere, anytime, suspending judgment on its feasibility, interesting…
ERIC Educational Resources Information Center
Shakur, Asif; Sinatra, Taylor
2013-01-01
The gyroscope in a smartphone was employed in a physics laboratory setting to verify the conservation of angular momentum and the nonconservation of rotational kinetic energy. As is well-known, smartphones are ubiquitous on college campuses. These devices have a panoply of built-in sensors. This creates a unique opportunity for a new paradigm in…
Demonstrating the Direction of Angular Velocity in Circular Motion
ERIC Educational Resources Information Center
Demircioglu, Salih; Yurumezoglu, Kemal; Isik, Hakan
2015-01-01
Rotational motion is ubiquitous in nature, from astronomical systems to household devices in everyday life to elementary models of atoms. Unlike the tangential velocity vector that represents the instantaneous linear velocity (magnitude and direction), an angular velocity vector is conceptually more challenging for students to grasp. In physics…
Connecting Learning Spaces Using Mobile Technology
ERIC Educational Resources Information Center
Chen, Wenli; Seow, Peter; So, Hyo-Jeong; Toh, Yancy; Looi, Chee-Kit
2010-01-01
The use of mobile technology can help extend children's learning spaces and enrich the learning experiences in their everyday lives where they move from one context to another, switching locations, social groups, technologies, and topics. When students have ubiquitous access to mobile devices with full connectivity, the in-situ use of the mobile…
The Comparison of Students' Satisfaction between Ubiquitous and Web-Based Learning Environments
ERIC Educational Resources Information Center
Virtanen, Mari Aulikki; Kääriäinen, Maria; Liikanen, Eeva; Haavisto, Elina
2017-01-01
Higher education is moving towards digitalized learning. The rapid development of technological resources, devices and wireless networks enables more flexible opportunities to study and learn in innovative learning environments. New technologies enable combining of authentic and virtual learning spaces and digital resources as multifunctional…
Clinician Use of a Palmtop Drug Reference Guide
Rothschild, Jeffrey M.; Lee, Thomas H.; Bae, Taran; Bates, David W.
2002-01-01
Objective: Problems involving drug knowledge are one of the most common causes of serious medication errors. Although the information that clinicians need is often available somewhere, retrieving it expeditiously has been problematic. At the same time, clinicians are faced with an ever-expanding pharmacology knowledge base. Recently, point-of-care technology has become more widely available and more practical with the advent of handheld, or palmtop, computing. Therefore, the authors evaluated the clinical contribution of a drug database developed for the handheld computer. ePocrates Rx (formerly known as qRx; ePocrates, San Carlos, California) is a comprehensive drug information guide that is downloadable free from the Internet and designed for the Palm OS platform align="right". Design: A seven-day online survey of 3,000 randomly selected ePocrates Rx users was conducted during March 2000. Measurements: User technology experience, product evaluation and usage patterns, and the effects of the drug reference database on information-seeking behavior, practice efficiency, decision making, and patient care. Results: The survey response rate was 32 percent (n=946). Physicians reported that ePocrates Rx saves time during information retrieval, is easily incorporated into their usual workflow, and improves drug-related decision making. They also felt that it reduced the rate of preventable adverse drug events. Conclusions: Self-reported perceptions by responding clinicians endorse improved access to drug information and improved practice efficiency associated with the use of handheld devices. The clinical and practical value of using these devices in clinical settings will clearly grow further as wireless communication becomes more ubiquitous and as more applications become available. PMID:11971883
KODAMA and VPC based Framework for Ubiquitous Systems and its Experiment
NASA Astrophysics Data System (ADS)
Takahashi, Kenichi; Amamiya, Satoshi; Iwao, Tadashige; Zhong, Guoqiang; Kainuma, Tatsuya; Amamiya, Makoto
Recently, agent technologies have attracted a lot of interest as an emerging programming paradigm. With such agent technologies, services are provided through collaboration among agents. At the same time, the spread of mobile technologies and communication infrastructures has made it possible to access the network anytime and from anywhere. Using agents and mobile technologies to realize ubiquitous computing systems, we propose a new framework based on KODAMA and VPC. KODAMA provides distributed management mechanisms by using the concept of community and communication infrastructure to deliver messages among agents without agents being aware of the physical network. VPC provides a method of defining peer-to-peer services based on agent communication with policy packages. By merging the characteristics of both KODAMA and VPC functions, we propose a new framework for ubiquitous computing environments. It provides distributed management functions according to the concept of agent communities, agent communications which are abstracted from the physical environment, and agent collaboration with policy packages. Using our new framework, we conducted a large-scale experiment in shopping malls in Nagoya, which sent advertisement e-mails to users' cellular phones according to user location and attributes. The empirical results showed that our new framework worked effectively for sales in shopping malls.
Ubiquitous computing in shared-care environments.
Koch, S
2006-07-01
In light of future challenges, such as growing numbers of elderly, increase in chronic diseases, insufficient health care budgets and problems with staff recruitment for the health-care sector, information and communication technology (ICT) becomes a possible means to meet these challenges. Organizational changes such as the decentralization of the health-care system lead to a shift from in-hospital to both advanced and basic home health care. Advanced medical technologies provide solutions for distant home care in form of specialist consultations and home monitoring. Furthermore, the shift towards home health care will increase mobile work and the establishment of shared care teams which require ICT-based solutions that support ubiquitous information access and cooperative work. Clinical documentation and decision support systems are the main ICT-based solutions of interest in the context of ubiquitous computing for shared care environments. This paper therefore describes the prerequisites for clinical documentation and decision support at the point of care, the impact of mobility on the documentation process, and how the introduction of ICT-based solutions will influence organizations and people. Furthermore, the role of dentistry in shared-care environments is discussed and illustrated in the form of a future scenario.
Kwon, Hyok Chon; Na, Doosu; Ko, Byung Geun; Lee, Songjun
2008-01-01
Wireless sensor networks have been studied in the area of intelligent transportation systems, disaster perception, environment monitoring, ubiquitous healthcare, home network, and so on. For the ubiquitous healthcare, the previous systems collect the sensed health related data at portable devices without regard to correlations of various biological signals to determine the health conditions. It is not the energy-efficient method to gather a lot of information into a specific node to decide the health condition. Since the biological signals are related with each other to estimate certain body condition, it is necessary to be collected selectively by their relationship for energy efficiency of the networked nodes. One of researches about low power consumption is the reduction of the amount of packet transmission. In this paper, a health monitoring system, which allows the transmission of the reduced number of packets by means of setting the routing path considered the relations of biological signals, is proposed.
NASA Astrophysics Data System (ADS)
Hwang, Jeonghwan; Lee, Jiwoong; Lee, Hochul; Yoe, Hyun
The wireless sensor networks (WSN) technology based on low power consumption is one of the important technologies in the realization of ubiquitous society. When the technology would be applied to the agricultural field, it can give big change in the existing agricultural environment such as livestock growth environment, cultivation and harvest of agricultural crops. This research paper proposes the 'Pig Farm Integrated Management System' based on WSN technology, which will establish the ubiquitous agricultural environment and improve the productivity of pig-raising farmers. The proposed system has WSN environmental sensors and CCTV at inside/outside of pig farm. These devices collect the growth-environment related information of pigs, such as luminosity, temperature, humidity and CO2 status. The system collects and monitors the environmental information and video information of pig farm. In addition to the remote-control and monitoring of the pig farm facilities, this system realizes the most optimum pig-raising environment based on the growth environmental data accumulated for a long time.
Towards a Ubiquitous User Model for Profile Sharing and Reuse
de Lourdes Martinez-Villaseñor, Maria; Gonzalez-Mendoza, Miguel; Hernandez-Gress, Neil
2012-01-01
People interact with systems and applications through several devices and are willing to share information about preferences, interests and characteristics. Social networking profiles, data from advanced sensors attached to personal gadgets, and semantic web technologies such as FOAF and microformats are valuable sources of personal information that could provide a fair understanding of the user, but profile information is scattered over different user models. Some researchers in the ubiquitous user modeling community envision the need to share user model's information from heterogeneous sources. In this paper, we address the syntactic and semantic heterogeneity of user models in order to enable user modeling interoperability. We present a dynamic user profile structure based in Simple Knowledge Organization for the Web (SKOS) to provide knowledge representation for ubiquitous user model. We propose a two-tier matching strategy for concept schemas alignment to enable user modeling interoperability. Our proposal is proved in the application scenario of sharing and reusing data in order to deal with overweight and obesity. PMID:23201995
A Mobile Multi-Agent Information System for Ubiquitous Fetal Monitoring
Su, Chuan-Jun; Chu, Ta-Wei
2014-01-01
Electronic fetal monitoring (EFM) systems integrate many previously separate clinical activities related to fetal monitoring. Promoting the use of ubiquitous fetal monitoring services with real time status assessments requires a robust information platform equipped with an automatic diagnosis engine. This paper presents the design and development of a mobile multi-agent platform-based open information systems (IMAIS) with an automated diagnosis engine to support intensive and distributed ubiquitous fetal monitoring. The automatic diagnosis engine that we developed is capable of analyzing data in both traditional paper-based and digital formats. Issues related to interoperability, scalability, and openness in heterogeneous e-health environments are addressed through the adoption of a FIPA2000 standard compliant agent development platform—the Java Agent Development Environment (JADE). Integrating the IMAIS with light-weight, portable fetal monitor devices allows for continuous long-term monitoring without interfering with a patient’s everyday activities and without restricting her mobility. The system architecture can be also applied to vast monitoring scenarios such as elder care and vital sign monitoring. PMID:24452256
An Ecological Framework for Cancer Communication: Implications for Research
Intille, Stephen S; Zabinski, Marion F
2005-01-01
The field of cancer communication has undergone a major revolution as a result of the Internet. As recently as the early 1990s, face-to-face, print, and the telephone were the dominant methods of communication between health professionals and individuals in support of the prevention and treatment of cancer. Computer-supported interactive media existed, but this usually required sophisticated computer and video platforms that limited availability. The introduction of point-and-click interfaces for the Internet dramatically improved the ability of non-expert computer users to obtain and publish information electronically on the Web. Demand for Web access has driven computer sales for the home setting and improved the availability, capability, and affordability of desktop computers. New advances in information and computing technologies will lead to similarly dramatic changes in the affordability and accessibility of computers. Computers will move from the desktop into the environment and onto the body. Computers are becoming smaller, faster, more sophisticated, more responsive, less expensive, and—essentially—ubiquitous. Computers are evolving into much more than desktop communication devices. New computers include sensing, monitoring, geospatial tracking, just-in-time knowledge presentation, and a host of other information processes. The challenge for cancer communication researchers is to acknowledge the expanded capability of the Web and to move beyond the approaches to health promotion, behavior change, and communication that emerged during an era when language- and image-based interpersonal and mass communication strategies predominated. Ecological theory has been advanced since the early 1900s to explain the highly complex relationships among individuals, society, organizations, the built and natural environments, and personal and population health and well-being. This paper provides background on ecological theory, advances an Ecological Model of Internet-Based Cancer Communication intended to broaden the vision of potential uses of the Internet for cancer communication, and provides some examples of how such a model might inform future research and development in cancer communication. PMID:15998614
Recent Advancements in Functionalized Paper-Based Electronics.
Lin, Yang; Gritsenko, Dmitry; Liu, Qian; Lu, Xiaonan; Xu, Jie
2016-08-17
Building electronic devices on ubiquitous paper substrates has recently drawn extensive attention due to its light weight, low cost, environmental friendliness, and ease of fabrication. Recently, a myriad of advancements have been made to improve the performance of paper electronics for various applications, such as basic electronic components, energy storage devices, generators, antennas, and electronic circuits. This review aims to summarize this progress and discuss different perspectives of paper electronics as well as the remaining challenges yet to be overcome in this field. Other aspects included in this review are the fundamental characteristics of paper, modification of paper with functional materials, and various methods for device fabrication.
Ubiquitous virtual private network: a solution for WSN seamless integration.
Villa, David; Moya, Francisco; Villanueva, Félix Jesús; Aceña, Óscar; López, Juan Carlos
2014-01-06
Sensor networks are becoming an essential part of ubiquitous systems and applications. However, there are no well-defined protocols or mechanisms to access the sensor network from the enterprise information system. We consider this issue as a heterogeneous network interconnection problem, and as a result, the same concepts may be applied. Specifically, we propose the use of object-oriented middlewares to provide a virtual private network in which all involved elements (sensor nodes or computer applications) will be able to communicate as if all of them were in a single and uniform network.
Mobilizing Practice: Engaging Space, Technology and Design from a Thai Metropolis
ERIC Educational Resources Information Center
Williams, Amanda Marisa
2009-01-01
The project of ubiquitous computing aims to embed computation into everyday spaces. As a practice that is heavily concerned with space and place, its stance towards mobility is sometimes conflicted--treating mobility by turns as a disruption or as an opportunity--and almost always conceiving of it as free and empowered. Conducted in industrial and…
Computing as Context: Experiences of Dis/Connection beyond the Moment of Non/Use
ERIC Educational Resources Information Center
Harmon, Mary E.
2015-01-01
What does it mean to be "constantly connected" or to work for a "24/7" company? What does it mean to "disconnect" in an era of "always on" connectivity? This dissertation examines some of the textures of American life in an historical moment marked both by the arrival of ubiquitous computing and the…
ERIC Educational Resources Information Center
Michelson, Avra; Rothenberg, Jeff
1993-01-01
The report considers the interaction of trends in information technology and trends in research practices and the policy implications for archives. The information is divided into 4 sections. The first section, an "Overview of Information Technology Trends," discusses end-user computing, which includes ubiquitous computing, end-user…
A Modified Laptop Program: Putting the Carts in the Classrooms
ERIC Educational Resources Information Center
Grant, Michael M.; Ross, Steven M.; Wan, Weiping; Potter, Allison; Wilson, Yola
2004-01-01
Four fifth grade classrooms embarked on a modified ubiquitous computing initiative in Fall 2003. Two 15-computer wireless laptop carts were shared among the four classrooms in an effort to integrate technology across the curriculum and affect change in student learning and teacher pedagogy. This initiative?in contrast to other 1:1 programs and…
ERIC Educational Resources Information Center
Klopfer, Eric; Yoon, Susan; Perry, Judy
2005-01-01
This paper reports on teachers' perceptions of the educational affordances of a handheld application called Participatory Simulations. It presents evidence from five cases representing each of the populations who work with these computational tools. Evidence across multiple data sources yield similar results to previous research evaluations of…
ERIC Educational Resources Information Center
Teston, George
2008-01-01
When asked about individual perceptions of "technology," 68% of Americans primarily equate the term to the computer. Although this perception under represents the true breadth of the field, the statistic does speak to the ubiquitous role the computer plays across many technology disciplines. Software has become the building block of all major…
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-01-01
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464
Security analysis and improvements of authentication and access control in the Internet of Things.
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-08-13
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-21
... Devices, Portable Music and Data Processing Devices, Computers, and Components Thereof; Institution of... communication devices, portable music and data processing devices, computers, and components thereof by reason... certain wireless communication devices, portable music and data processing devices, computers, and...
2007-03-01
potential of moving closer to the goal of a fully service-oriented GIG by allowing even computing - and bandwidth-constrained elements to participate...the functionality provided by core network assets with relatively unlimited bandwidth and computing resources. Finally, the nature of information is...the Department of Defense is a requirement for ubiquitous computer connectivity. An espoused vehicle for delivering that ubiquity is the Global
ERIC Educational Resources Information Center
Hwang, Gwo-Jen; Tsai, Chin-Chung; Chu, Hui-Chun; Kinshuk; Chen, Chieh-Yuan
2012-01-01
Fostering students' scientific inquiry competence has been recognised as being an important and challenging objective of science education. To strengthen the understanding of science theories or notations, researchers have suggested conducting some learning activities in the field via operating relevant devices. In a traditional infield scientific…
Learning in a u-Museum: Developing a Context-Aware Ubiquitous Learning Environment
ERIC Educational Resources Information Center
Chen, Chia-Chen; Huang, Tien-Chi
2012-01-01
Context-awareness techniques can support learners in learning without time or location constraints by using mobile devices and associated learning activities in a real learning environment. Enrichment of context-aware technologies has enabled students to learn in an environment that integrates learning resources from both the real world and the…
A Study of the Effects of Digital Learning on Learning Motivation and Learning Outcome
ERIC Educational Resources Information Center
Lin, Ming-Hung; Chen, Huang-Cheng; Liu, Kuang-Sheng
2017-01-01
In the modern society when intelligent mobile devices become popular, the Internet breaks through the restrictions on time and space and becomes a ubiquitous learning tool. Designing teaching activity for digital learning and flexibly applying technology tools are the key issues for current information technology integrated education. In this…
Effects of a Tablet-Based Mathematics Application for Pre-School Children
ERIC Educational Resources Information Center
Kosko, Karl; Ferdig, Richard
2016-01-01
Tablets such as "iPad," "Android," and "Windows" devices have become ubiquitous in both the home and school settings. Adults and kids of all ages are using these tools and the associated apps to do everything from education to entertainment. Although there has been a positive relationship in the research between…
Location Based Services for Outdoor Ecological Learning System: Design and Implementation
ERIC Educational Resources Information Center
Hsiao, Hsien-Sheng; Lin, Chih-Cheng; Feng, Ruei-Ting; Li, Kun Jing
2010-01-01
This paper aimed to demonstrate how location-based services were implemented in ubiquitous outdoor ecological learning system. In an elementary school in northern Taiwan, two fifth grade classes on an ecology project were randomly selected: The experimental group could access the ecological learning system on hand-held devices while the control…
Interdependent networks: the fragility of control
Morris, Richard G.; Barthelemy, Marc
2013-01-01
Recent work in the area of interdependent networks has focused on interactions between two systems of the same type. However, an important and ubiquitous class of systems are those involving monitoring and control, an example of interdependence between processes that are very different. In this Article, we introduce a framework for modelling ‘distributed supervisory control' in the guise of an electrical network supervised by a distributed system of control devices. The system is characterised by degrees of freedom salient to real-world systems— namely, the number of control devices, their inherent reliability, and the topology of the control network. Surprisingly, the behavior of the system depends crucially on the reliability of control devices. When devices are completely reliable, cascade sizes are percolation controlled; the number of devices being the relevant parameter. For unreliable devices, the topology of the control network is important and can dramatically reduce the resilience of the system. PMID:24067404
Can Wireless Technology Enable New Diabetes Management Tools?
Hedtke, Paul A.
2008-01-01
Mobile computing and communications technology embodied in the modern cell phone device can be employed to improve the lives of diabetes patients by giving them better tools for self-management. Several companies are working on the development of diabetes management tools that leverage the ubiquitous cell phone to bring self-management tools to the hand of the diabetes patient. Integration of blood glucose monitoring (BGM) technology with the cell phone platform adds a level of convenience for the person with diabetes, but, more importantly, allows BGM data to be automatically captured, logged, and processed in near real time in order to provide the diabetes patient with assistance in managing their blood glucose levels. Other automatic measurements can estimate physical activity, and information regarding medication events and food intake can be captured and analyzed in order to provide the diabetes patient with continual assistance in managing their therapy and behaviors in order to improve glycemic control. The path to realization of such solutions is not, however, without obstacles. PMID:19885187
Can wireless technology enable new diabetes management tools?
Hedtke, Paul A
2008-01-01
Mobile computing and communications technology embodied in the modern cell phone device can be employed to improve the lives of diabetes patients by giving them better tools for self-management. Several companies are working on the development of diabetes management tools that leverage the ubiquitous cell phone to bring self-management tools to the hand of the diabetes patient. Integration of blood glucose monitoring (BGM) technology with the cell phone platform adds a level of convenience for the person with diabetes, but, more importantly, allows BGM data to be automatically captured, logged, and processed in near real time in order to provide the diabetes patient with assistance in managing their blood glucose levels. Other automatic measurements can estimate physical activity, and information regarding medication events and food intake can be captured and analyzed in order to provide the diabetes patient with continual assistance in managing their therapy and behaviors in order to improve glycemic control. The path to realization of such solutions is not, however, without obstacles.
Ubiquitous healthcare computing with SEnsor Grid Enhancement with Data Management System (SEGEDMA).
Preve, Nikolaos
2011-12-01
Wireless Sensor Network (WSN) can be deployed to monitor the health of patients suffering from critical diseases. Also a wireless network consisting of biomedical sensors can be implanted into the patient's body and can monitor the patients' conditions. These sensor devices, apart from having an enormous capability of collecting data from their physical surroundings, are also resource constraint in nature with a limited processing and communication ability. Therefore we have to integrate them with the Grid technology in order to process and store the collected data by the sensor nodes. In this paper, we proposed the SEnsor Grid Enhancement Data Management system, called SEGEDMA ensuring the integration of different network technologies and the continuous data access to system users. The main contribution of this work is to achieve the interoperability of both technologies through a novel network architecture ensuring also the interoperability of Open Geospatial Consortium (OGC) and HL7 standards. According to the results, SEGEDMA can be applied successfully in a decentralized healthcare environment.
On the Usage of GPUs for Efficient Motion Estimation in Medical Image Sequences
Thiyagalingam, Jeyarajan; Goodman, Daniel; Schnabel, Julia A.; Trefethen, Anne; Grau, Vicente
2011-01-01
Images are ubiquitous in biomedical applications from basic research to clinical practice. With the rapid increase in resolution, dimensionality of the images and the need for real-time performance in many applications, computational requirements demand proper exploitation of multicore architectures. Towards this, GPU-specific implementations of image analysis algorithms are particularly promising. In this paper, we investigate the mapping of an enhanced motion estimation algorithm to novel GPU-specific architectures, the resulting challenges and benefits therein. Using a database of three-dimensional image sequences, we show that the mapping leads to substantial performance gains, up to a factor of 60, and can provide near-real-time experience. We also show how architectural peculiarities of these devices can be best exploited in the benefit of algorithms, most specifically for addressing the challenges related to their access patterns and different memory configurations. Finally, we evaluate the performance of the algorithm on three different GPU architectures and perform a comprehensive analysis of the results. PMID:21869880
Browsing the Real World using Organic Electronics, Si-Chips, and a Human Touch.
Berggren, Magnus; Simon, Daniel T; Nilsson, David; Dyreklev, Peter; Norberg, Petronella; Nordlinder, Staffan; Ersman, Peter Andersson; Gustafsson, Göran; Wikner, J Jacob; Hederén, Jan; Hentzell, Hans
2016-03-09
Organic electronics have been developed according to an orthodox doctrine advocating "all-printed'', "all-organic'' and "ultra-low-cost'' primarily targeting various e-paper applications. In order to harvest from the great opportunities afforded with organic electronics potentially operating as communication and sensor outposts within existing and future complex communication infrastructures, high-quality computing and communication protocols must be integrated with the organic electronics. Here, we debate and scrutinize the twinning of the signal-processing capability of traditional integrated silicon chips with organic electronics and sensors, and to use our body as a natural local network with our bare hand as the browser of the physical world. The resulting platform provides a body network, i.e., a personalized web, composed of e-label sensors, bioelectronics, and mobile devices that together make it possible to monitor and record both our ambience and health-status parameters, supported by the ubiquitous mobile network and the resources of the "cloud". © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Analytical balance-based Faraday magnetometer
NASA Astrophysics Data System (ADS)
Riminucci, Alberto; Uhlarz, Marc; De Santis, Roberto; Herrmannsdörfer, Thomas
2017-03-01
We introduce a Faraday magnetometer based on an analytical balance in which we were able to apply magnetic fields up to 0.14 T. We calibrated it with a 1 mm Ni sphere previously characterized in a superconducting quantum interference device (SQUID) magnetometer. The proposed magnetometer reached a theoretical sensitivity of 3 × 10-8 A m2. We demonstrated its operation on magnetic composite scaffolds made of poly(ɛ-caprolactone)/iron-doped hydroxyapatite. To confirm the validity of the method, we measured the same scaffold properties in a SQUID magnetometer. The agreement between the two measurements was within 5% at 0.127 T and 12% at 24 mT. With the addition, for a small cost, of a permanent magnet and computer controlled linear translators, we were thus able to assemble a Faraday magnetometer based on an analytical balance, which is a virtually ubiquitous instrument. This will make simple but effective magnetometry easily accessible to most laboratories, in particular, to life sciences ones, which are increasingly interested in magnetic materials.
A Proposal of TLS Implementation for Cross Certification Model
NASA Astrophysics Data System (ADS)
Kaji, Tadashi; Fujishiro, Takahiro; Tezuka, Satoru
Today, TLS is widely used for achieving a secure communication system. And TLS is used PKI for server authentication and/or client authentication. However, its PKI environment, which is called as “multiple trust anchors environment,” causes the problem that the verifier has to maintain huge number of CA certificates in the ubiquitous network because the increase of terminals connected to the network brings the increase of CAs. However, most of terminals in the ubiquitous network will not have enough memory to hold such huge number of CA certificates. Therefore, another PKI environment, “cross certification environment”, is useful for the ubiquitous network. But, because current TLS is designed for the multiple trust anchors model, TLS cannot work efficiently on the cross-certification model. This paper proposes a TLS implementation method to support the cross certification model efficiently. Our proposal reduces the size of exchanged messages between the TLS client and the TLS server during the handshake process. Therefore, our proposal is suitable for implementing TLS in the terminals that do not have enough computing power and memory in ubiquitous network.
Crowdsourced earthquake early warning.
Minson, Sarah E; Brooks, Benjamin A; Glennie, Craig L; Murray, Jessica R; Langbein, John O; Owen, Susan E; Heaton, Thomas H; Iannucci, Robert A; Hauser, Darren L
2015-04-01
Earthquake early warning (EEW) can reduce harm to people and infrastructure from earthquakes and tsunamis, but it has not been implemented in most high earthquake-risk regions because of prohibitive cost. Common consumer devices such as smartphones contain low-cost versions of the sensors used in EEW. Although less accurate than scientific-grade instruments, these sensors are globally ubiquitous. Through controlled tests of consumer devices, simulation of an M w (moment magnitude) 7 earthquake on California's Hayward fault, and real data from the M w 9 Tohoku-oki earthquake, we demonstrate that EEW could be achieved via crowdsourcing.
Crowdsourced earthquake early warning
Minson, Sarah E.; Brooks, Benjamin A.; Glennie, Craig L.; Murray, Jessica R.; Langbein, John O.; Owen, Susan E.; Heaton, Thomas H.; Iannucci, Robert A.; Hauser, Darren L.
2015-01-01
Earthquake early warning (EEW) can reduce harm to people and infrastructure from earthquakes and tsunamis, but it has not been implemented in most high earthquake-risk regions because of prohibitive cost. Common consumer devices such as smartphones contain low-cost versions of the sensors used in EEW. Although less accurate than scientific-grade instruments, these sensors are globally ubiquitous. Through controlled tests of consumer devices, simulation of an Mw (moment magnitude) 7 earthquake on California’s Hayward fault, and real data from the Mw 9 Tohoku-oki earthquake, we demonstrate that EEW could be achieved via crowdsourcing. PMID:26601167
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-08
... Wireless Communication Devices, Tablet Computers, Media Players, and Televisions, and Components Thereof... devices, including wireless communication devices, tablet computers, media players, and televisions, and... wireless communication devices, tablet computers, media players, and televisions, and components thereof...
Effect of Joule heating and current crowding on electromigration in mobile technology
NASA Astrophysics Data System (ADS)
Tu, K. N.; Liu, Yingxia; Li, Menglu
2017-03-01
In the present era of big data and internet of things, the use of microelectronic products in all aspects of our life is manifested by the ubiquitous presence of mobile devices as i-phones and wearable i-products. These devices are facing the need for higher power and greater functionality applications such as in i-health, yet they are limited by physical size. At the moment, software (Apps) is much ahead of hardware in mobile technology. To advance hardware, the end of Moore's law in two-dimensional integrated circuits can be extended by three-dimensional integrated circuits (3D ICs). The concept of 3D ICs has been with us for more than ten years. The challenge in 3D IC technology is dense packing by using both vertical and horizontal interconnections. Mass production of 3D IC devices is behind schedule due to cost because of low yield and uncertain reliability. Joule heating is serious in a dense structure because of heat generation and dissipation. A change of reliability paradigm has advanced from failure at a specific circuit component to failure at a system level weak-link. Currently, the electronic industry is introducing 3D IC devices in mainframe computers, where cost is not an issue, for the purpose of collecting field data of failure, especially the effect of Joule heating and current crowding on electromigration. This review will concentrate on the positive feedback between Joule heating and electromigration, resulting in an accelerated system level weak-link failure. A new driving force of electromigration, the electric potential gradient force due to current crowding, will be reviewed critically. The induced failure tends to occur in the low current density region.
A 21st Century Science, Technology, and Innovation Strategy for Americas National Security
2016-05-01
areas. Advanced Computing and Communications The exponential growth of the digital economy, driven by ubiquitous computing and communication...weapons- focused R&D, many of the capabilities being developed have significant dual-use potential. Digital connectivity, for instance, brings...scale than traditional recombinant DNA techniques, and to share these designs digitally . Nanotechnology promises the ability to engineer entirely
From Users to Choosers: Central IT and the Challenge of Consumer Choice
ERIC Educational Resources Information Center
Yanosky, Ronald
2010-01-01
Is the era of personal computing ending, or is it only just beginning? Certainly, cyberlife seems to have become more intensely personal over the last few years, partly because it has also become so much more social. The rise of the new consumer-oriented ubiquitous computing will reshape--and reduce--users' reliance on enterprise IT. Much of the…
ERIC Educational Resources Information Center
Salamanca, Juan
2012-01-01
With the advent of ubiquitous computing, interaction design has broadened its object of inquiry into how smart computational artifacts inconspicuously act in people's everyday lives. Although user-centered design approaches remains useful for exploring how people cope with interactive systems, they cannot explain how this new breed of…
From computers to ubiquitous computing by 2010: health care.
Aziz, Omer; Lo, Benny; Pansiot, Julien; Atallah, Louis; Yang, Guang-Zhong; Darzi, Ara
2008-10-28
Over the past decade, miniaturization and cost reduction in semiconductors have led to computers smaller in size than a pinhead with powerful processing abilities that are affordable enough to be disposable. Similar advances in wireless communication, sensor design and energy storage have meant that the concept of a truly pervasive 'wireless sensor network', used to monitor environments and objects within them, has become a reality. The need for a wireless sensor network designed specifically for human body monitoring has led to the development of wireless 'body sensor network' (BSN) platforms composed of tiny integrated microsensors with on-board processing and wireless data transfer capability. The ubiquitous computing abilities of BSNs offer the prospect of continuous monitoring of human health in any environment, be it home, hospital, outdoors or the workplace. This pervasive technology comes at a time when Western world health care costs have sharply risen, reflected by increasing expenditure on health care as a proportion of gross domestic product over the last 20 years. Drivers of this rise include an ageing post 'baby boom' population, higher incidence of chronic disease and the need for earlier diagnosis. This paper outlines the role of pervasive health care technologies in providing more efficient health care.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-24
... Music and Data Processing Devices, Computers, and Components Thereof; Notice of Receipt of Complaint... complaint entitled Wireless Communication Devices, Portable Music and Data Processing Devices, Computers..., portable music and data processing devices, computers, and components thereof. The complaint names as...
Big data analytics to aid developing livable communities.
DOT National Transportation Integrated Search
2015-12-31
In transportation, ubiquitous deployment of low-cost sensors combined with powerful : computer hardware and high-speed network makes big data available. USDOT defines big : data research in transportation as a number of advanced techniques applied to...
ERIC Educational Resources Information Center
Collins, Allan
2002-01-01
Features comments on the Center for Innovative Learning Technologies (CILT) conference held in 2000 and addresses the five thematic areas around which the conference was organized, namely assessment, professional development, visualization and modeling, ubiquitous computing, and equity. (Author/YDS)
Some guidelines for the ethical development of ubiquitous computing.
Greenfield, Adam
2008-10-28
At a time when both the landscape of everyday life and the choices available to us there are increasingly conditioned by ubiquitous information processing systems, it seems wise to articulate some general principles guiding their ethical design and deployment. I here enunciate five broad guidelines for the designers of such systems, including recommendations that they be devised in such a way as to default to harmlessness, be conservative of time, be conservative of face, be self-disclosing and be deniable. I conclude with some observations about the likelihood of any such principles winning usefully widespread voluntary adherence.
Ubiquitous Virtual Private Network: A Solution for WSN Seamless Integration
Villa, David; Moya, Francisco; Villanueva, Félix Jesús; Aceña, Óscar; López, Juan Carlos
2014-01-01
Sensor networks are becoming an essential part of ubiquitous systems and applications. However, there are no well-defined protocols or mechanisms to access the sensor network from the enterprise information system. We consider this issue as a heterogeneous network interconnection problem, and as a result, the same concepts may be applied. Specifically, we propose the use of object-oriented middlewares to provide a virtual private network in which all involved elements (sensor nodes or computer applications) will be able to communicate as if all of them were in a single and uniform network. PMID:24399154
Ubiquitous Games for Learning (UbiqGames): Weatherlings, a Worked Example
ERIC Educational Resources Information Center
Klopfer, E.; Sheldon, J.; Perry, J.; Chen, V. H. -H.
2012-01-01
This paper provides a rationale for a class of mobile, casual, and educational games, which we call UbiqGames. The study is motivated by the desire to understand how students use educational games in light of additional distractions on their devices, and how game design can make those games appealing, educationally useful, and practical. In…
Japanese Ubiquotous Network Project: Ubila
NASA Astrophysics Data System (ADS)
Ohashi, Masayoshi
Recently, the advent of sophisticated technologies has stimulated ambient paradigms that may include high-performance CPU, compact real-time operating systems, a variety of devices/sensors, low power and high-speed radio communications, and in particular, third generation mobile phones. In addition, due to the spread of broadband ccess networks, various ubiquitous terminals and sensors can be connected closely.
Status Quo and Prospective of WeChat in Improving Chinese English Learners' Pronunciation
ERIC Educational Resources Information Center
Wang, Kanghui
2017-01-01
With the ubiquitous usage of wireless, portable, and handheld devices gaining popularity in 21st century, the revolutionary mobile technology introduces digital new media to educational settings, which has changed the way of traditional teaching and learning. WeChat is one of the most popular social networking applications in China featured by its…
Keeping up with the Technologically Savvy Student: Student Perceptions of Audio Books
ERIC Educational Resources Information Center
Gray, H. Joey; Davis, Phillip; Liu, Xiao
2012-01-01
The current generation of college students is so adapted to the digital world that they have been labeled the multi-tasking generation (Foehr, 2006; Wallis, 2006). College students routinely use digital playback devices in their lives for entertainment and communication to the point that students being "plugged in" is a ubiquitous image.…
ERIC Educational Resources Information Center
Ho, Shu-Chun; Hsieh, Sheng-Wen; Sun, Pei-Chen; Chen, Cheng-Ming
2017-01-01
The increasing advance of mobile devices and wireless technologies has generated great interest in ubiquitous learning (u-learning) among academia, practitioners, and policy makers. However, design elements that incorporate learning styles and learning strategies into u-learning system applications in English as a Foreign Language (EFL) education…
A web-based biosignal data management system for U-health data integration.
Ro, Dongwoo; Yoo, Sooyoung; Choi, Jinwook
2008-11-06
In the ubiquitous healthcare environment, the biosignal data should be easily accessed and properly maintained. This paper describes a web-based data management system. It consists of a device interface, a data upload control, a central repository, and a web server. For the user-specific web services, a MFER Upload ActiveX Control was developed.
The World in Spatial Terms: Mapmaking and Map Reading
ERIC Educational Resources Information Center
Ekiss, Gale Olp; Trapido-Lurie, Barbara; Phillips, Judy; Hinde, Elizabeth
2007-01-01
Maps and mapping activities are essential in the primary grades. Maps are truly ubiquitous today, as evidenced by the popularity of websites such as Google Earth and Mapquest, and by devices such as Global Positioning System (GPS) units in cars, planes, and boats. Maps can give visual settings to travel stories and historical narratives and can…
NASA Astrophysics Data System (ADS)
Agrawal, Arun; Koff, David; Bak, Peter; Bender, Duane; Castelli, Jane
2015-03-01
The deployment of regional and national Electronic Health Record solutions has been a focus of many countries throughout the past decade. A major challenge for these deployments has been support for ubiquitous image viewing. More specifically, these deployments require an imaging solution that can work over the Internet, leverage any point of service device: desktop, tablet, phone; and access imaging data from any source seamlessly. Whereas standards exist to enable ubiquitous image viewing, few if any solutions exist that leverage these standards and meet the challenge. Rather, most of the currently available web based DI viewing solutions are either proprietary solutions or require special plugins. We developed a true zero foot print browser based DI viewing solution based on the Web Access DICOM Objects (WADO) and Cross-enterprise Document Sharing for Imaging (XDS-I.b) standards to a) demonstrate that a truly ubiquitous image viewer can be deployed; b) identify the gaps in the current standards and the design challenges for developing such a solution. The objective was to develop a viewer, which works on all modern browsers on both desktop and mobile devices. The implementation allows basic viewing functionalities of scroll, zoom, pan and window leveling (limited). The major gaps identified in the current DICOM WADO standards are a lack of ability to allow any kind of 3D reconstruction or MPR views. Other design challenges explored include considerations related to optimization of the solution for response time and low memory foot print.
Real-time long term measurement using integrated framework for ubiquitous smart monitoring
NASA Astrophysics Data System (ADS)
Heo, Gwanghee; Lee, Giu; Lee, Woosang; Jeon, Joonryong; Kim, Pil-Joong
2007-04-01
Ubiquitous monitoring combining internet technologies and wireless communication is one of the most promising technologies of infrastructure health monitoring against the natural of man-made hazards. In this paper, an integrated framework of the ubiquitous monitoring is developed for real-time long term measurement in internet environment. This framework develops a wireless sensor system based on Bluetooth technology and sends measured acceleration data to the host computer through TCP/IP protocol. And it is also designed to respond to the request of web user on real time basis. In order to verify this system, real time monitoring tests are carried out on a prototype self-anchored suspension bridge. Also, wireless measurement system is analyzed to estimate its sensing capacity and evaluate its performance for monitoring purpose. Based on the evaluation, this paper proposes the effective strategies for integrated framework in order to detect structural deficiencies and to design an early warning system.
Paper as a platform for sensing applications and other devices: a review.
Mahadeva, Suresha K; Walus, Konrad; Stoeber, Boris
2015-04-29
Paper is a ubiquitous material that has various applications in day to day life. A sheet of paper is produced by pressing moist wood cellulose fibers together. Paper offers unique properties: paper allows passive liquid transport, it is compatible with many chemical and biochemical moieties, it exhibits piezoelectricity, and it is biodegradable. Hence, paper is an attractive low-cost functional material for sensing devices. In recent years, researchers in the field of science and engineering have witnessed an exponential growth in the number of research contributions that focus on the development of cost-effective and scalable fabrication methods and new applications of paper-based devices. In this review article, we highlight recent advances in the development of paper-based sensing devices in the areas of electronics, energy storage, strain sensing, microfluidic devices, and biosensing, including piezoelectric paper. Additionally, this review includes current limitations of paper-based sensing devices and points out issues that have limited the commercialization of some of the paper-based sensing devices.
Computer Access. Tech Use Guide: Using Computer Technology.
ERIC Educational Resources Information Center
Council for Exceptional Children, Reston, VA. Center for Special Education Technology.
One of nine brief guides for special educators on using computer technology, this guide focuses on access including adaptations in input devices, output devices, and computer interfaces. Low technology devices include "no-technology" devices (usually modifications to existing devices), simple switches, and multiple switches. High technology input…
Medical applications for pharmacists using mobile devices.
Aungst, Timothy Dy
2013-01-01
Mobile devices (eg, smartphones, tablet computers) have become ubiquitous and subsequently there has been a growth in mobile applications (apps). Concurrently, mobile devices have been integrated into health care practice due to the availability and quality of medical apps. These mobile medical apps offer increased access to clinical references and point-of-care tools. However, there has been little identification of mobile medical apps suitable for the practice of pharmacy. To address the shortage of recommendations of mobile medical apps for pharmacists in daily practice. Mobile medical apps were identified via the iTunes and Google Play Stores via the "Medical" app categories and key word searches (eg, drug information, medical calculators). In addition, reviews provided by professional mobile medical app review websites were used to identify apps. Mobile medical apps were included if they had been updated in the previous 3 months, were available in the US, used evidence-based information or literature support, had dedicated app support, and demonstrated stability. Exclusion criteria included apps that were not available in English, had advertisement bias, used nonreferenced sources, were available only via an institution-only subscription, and were web-based portals. Twenty-seven mobile apps were identified and reviewed that involved general pharmacy practice, including apps that involved drug references, clinical references, medical calculators, laboratory references, news and continuing medical education, and productivity. Mobile medical apps have a variety of features that are beneficial to pharmacy practice. Individual clinicians should consider several characteristics of these apps to determine which are suitable to incorporate into their daily practice.
Location Based Application Availability
NASA Astrophysics Data System (ADS)
Naeem Akram, Raja; Markantonakis, Konstantinos; Mayes, Keith
Smart cards are being integrated into a diverse range of industries: ranging from banking, telecom, transport, home/office access control to health and E-passport. Traditionally, cardholders are required to carry a smart card for each application. However, recent developments in the Near Field Communication (NFC) have renewed the interest in multiple applications for different services on a single device. This paper builds onto the NFC initiative and avoids the smart card ownership issues that hinder the adoption of such devices. The proposal integrates the Global Positioning System with the NFC in mobile phones to provide a ubiquitously and flexible service access model.
Crowdsourced earthquake early warning
Minson, Sarah E.; Brooks, Benjamin A.; Glennie, Craig L.; Murray, Jessica R.; Langbein, John O.; Owen, Susan E.; Heaton, Thomas H.; Iannucci, Robert A.; Hauser, Darren L.
2015-01-01
Earthquake early warning (EEW) can reduce harm to people and infrastructure from earthquakes and tsunamis, but it has not been implemented in most high earthquake-risk regions because of prohibitive cost. Common consumer devices such as smartphones contain low-cost versions of the sensors used in EEW. Although less accurate than scientific-grade instruments, these sensors are globally ubiquitous. Through controlled tests of consumer devices, simulation of an Mw (moment magnitude) 7 earthquake on California’s Hayward fault, and real data from the Mw 9 Tohoku-oki earthquake, we demonstrate that EEW could be achieved via crowdsourcing.
Active Learning with Ubiquitous Presenter and Tablet PCs
NASA Astrophysics Data System (ADS)
Price, Edward; Simon, B.
2006-12-01
Ubiquitous Presenter (UP)* is a digital presentation system that facilitates spontaneity and interactivity in the classroom. Using the system, an instructor with a Tablet PC can spontaneously modify prepared slides. Furthermore, students with web-enabled devices can add digital 'ink' or text to the instructor's slides and submit them to the instructor during class. We have used this system to facilitate interactive engagement techniques in an introductory physics class where approximately one-third of the students had access to a Tablet PC during class. Class time was used for Interactive Lecture Demonstrations, Peer Instruction, and group problem solving. We describe the implementation of these active learning activities with UP and Tablet PCs, show examples of student contributions, and describe the impact on the classroom setting. *http://up.ucsd.edu/about/
21 CFR 868.1730 - Oxygen uptake computer.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Oxygen uptake computer. 868.1730 Section 868.1730...) MEDICAL DEVICES ANESTHESIOLOGY DEVICES Diagnostic Devices § 868.1730 Oxygen uptake computer. (a) Identification. An oxygen uptake computer is a device intended to compute the amount of oxygen consumed by a...
21 CFR 868.1730 - Oxygen uptake computer.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Oxygen uptake computer. 868.1730 Section 868.1730...) MEDICAL DEVICES ANESTHESIOLOGY DEVICES Diagnostic Devices § 868.1730 Oxygen uptake computer. (a) Identification. An oxygen uptake computer is a device intended to compute the amount of oxygen consumed by a...
21 CFR 868.1730 - Oxygen uptake computer.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 21 Food and Drugs 8 2014-04-01 2014-04-01 false Oxygen uptake computer. 868.1730 Section 868.1730...) MEDICAL DEVICES ANESTHESIOLOGY DEVICES Diagnostic Devices § 868.1730 Oxygen uptake computer. (a) Identification. An oxygen uptake computer is a device intended to compute the amount of oxygen consumed by a...
21 CFR 868.1730 - Oxygen uptake computer.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 8 2013-04-01 2013-04-01 false Oxygen uptake computer. 868.1730 Section 868.1730...) MEDICAL DEVICES ANESTHESIOLOGY DEVICES Diagnostic Devices § 868.1730 Oxygen uptake computer. (a) Identification. An oxygen uptake computer is a device intended to compute the amount of oxygen consumed by a...
21 CFR 868.1730 - Oxygen uptake computer.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 8 2012-04-01 2012-04-01 false Oxygen uptake computer. 868.1730 Section 868.1730...) MEDICAL DEVICES ANESTHESIOLOGY DEVICES Diagnostic Devices § 868.1730 Oxygen uptake computer. (a) Identification. An oxygen uptake computer is a device intended to compute the amount of oxygen consumed by a...
An Improved Medium for Growing Staphylococcus aureus Biofilm
2012-04-19
implantitis, chronic wound infections , chronic rhinosinusitis, endocarditis , and ocular infections (Archer et al., 2011). In addition, emerging evidence...causes of human bacterial infections , Staphylococcus aureus, a gram positive organism, is a ubiquitous oppor tunistic pathogen that commonly colonizes...resistant to antibiotic therapy. It has been shown that S. aureus biofilms are involved in oste omyelitis; indwelling medical device infections ; and peri
Current Trends in Ubiquitous Biosensing
2013-08-01
fundamental advances have been made in the synergistic combination of research in the fields of microfluidics and optics, coined “optofluidics” [24-26...microfabrication and clean-room techniques for the development of microfluidic devices [27]. Advances in the rapid fabrication of nano- and microfluidic ...Transduction Microfluidic Processing Sample Introduction Optofluidics Enabled Bio-Sensing A B C Figure 4: (A) Schematic diagram of optofluidic tomography
You Can Lead a Horse to Water but You Cannot Make Him Learn: Smartphone Use in Higher Education
ERIC Educational Resources Information Center
Tossell, Chad C.; Kortum, Philip; Shepard, Clayton; Rahmati, Ahmad; Zhong, Lin
2015-01-01
Smartphone technology is penetrating world markets and becoming ubiquitous in most college settings. This study takes a naturalistic approach to explore the use of these devices to support student learning. Students that had never used a smartphone were recruited to participate and reported on their expectations of the value of smartphones to…
ERIC Educational Resources Information Center
Blau, Ina; Hameiri, Mira
2017-01-01
Digital educational data management has become an integral part of school practices. Accessing school database by teachers, students, and parents from mobile devices promotes data-driven educational interactions based on real-time information. This paper analyses mobile access of educational database in a large sample of 429 schools during an…
Unmanned Aerial System Four-Dimensional Gunnery Training Device Development
2017-10-01
and zSpace hardware. Three scenarios were developed based on TC 3-04.45 Combat Aviation Gunnery minimum proficiency levels. Two scenarios depicted...TABLE 1. SCENARIO MODEL AND GRAPHIC REQUIRMENTS BASED ON UAS GE MPLS...not until decades later that what today is ubiquitous to the war on terrorism became a reality. On Friday, February 16, 2001, Air Force Captain
ERIC Educational Resources Information Center
Su, Yu-Sheng; Huang, Chester S. J.
2016-01-01
MOOCs social media has appealed to most instructors and learners like strong magnets by using ubiquitous handheld devices to share and discuss films, pictures, and messages. Through the social platform, users can share, track, and search for the information of their specific interests. Thus, they can make interactive discussions as well as social…
Raza, Muhammad Taqi; Yoo, Seung-Wha; Kim, Ki-Hyung; Joo, Seong-Soon; Jeong, Wun-Cheol
2009-01-01
Web Portals function as a single point of access to information on the World Wide Web (WWW). The web portal always contacts the portal’s gateway for the information flow that causes network traffic over the Internet. Moreover, it provides real time/dynamic access to the stored information, but not access to the real time information. This inherent functionality of web portals limits their role for resource constrained digital devices in the Ubiquitous era (U-era). This paper presents a framework for the web portal in the U-era. We have introduced the concept of Local Regions in the proposed framework, so that the local queries could be solved locally rather than having to route them over the Internet. Moreover, our framework enables one-to-one device communication for real time information flow. To provide an in-depth analysis, firstly, we provide an analytical model for query processing at the servers for our framework-oriented web portal. At the end, we have deployed a testbed, as one of the world’s largest IP based wireless sensor networks testbed, and real time measurements are observed that prove the efficacy and workability of the proposed framework. PMID:22346693
Raza, Muhammad Taqi; Yoo, Seung-Wha; Kim, Ki-Hyung; Joo, Seong-Soon; Jeong, Wun-Cheol
2009-01-01
Web Portals function as a single point of access to information on the World Wide Web (WWW). The web portal always contacts the portal's gateway for the information flow that causes network traffic over the Internet. Moreover, it provides real time/dynamic access to the stored information, but not access to the real time information. This inherent functionality of web portals limits their role for resource constrained digital devices in the Ubiquitous era (U-era). This paper presents a framework for the web portal in the U-era. We have introduced the concept of Local Regions in the proposed framework, so that the local queries could be solved locally rather than having to route them over the Internet. Moreover, our framework enables one-to-one device communication for real time information flow. To provide an in-depth analysis, firstly, we provide an analytical model for query processing at the servers for our framework-oriented web portal. At the end, we have deployed a testbed, as one of the world's largest IP based wireless sensor networks testbed, and real time measurements are observed that prove the efficacy and workability of the proposed framework.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... INTERNATIONAL TRADE COMMISSION [Inv. No. 337-TA-841] Certain Computers and Computer Peripheral... after importation of certain computers and computer peripheral devices and components thereof and... computers and computer peripheral devices and components thereof and products containing the same that...
An Event Driven Hybrid Identity Management Approach to Privacy Enhanced e-Health
Sánchez-Guerrero, Rosa; Almenárez, Florina; Díaz-Sánchez, Daniel; Marín, Andrés; Arias, Patricia; Sanvido, Fabio
2012-01-01
Credential-based authorization offers interesting advantages for ubiquitous scenarios involving limited devices such as sensors and personal mobile equipment: the verification can be done locally; it offers a more reduced computational cost than its competitors for issuing, storing, and verification; and it naturally supports rights delegation. The main drawback is the revocation of rights. Revocation requires handling potentially large revocation lists, or using protocols to check the revocation status, bringing extra communication costs not acceptable for sensors and other limited devices. Moreover, the effective revocation consent—considered as a privacy rule in sensitive scenarios—has not been fully addressed. This paper proposes an event-based mechanism empowering a new concept, the sleepyhead credentials, which allows to substitute time constraints and explicit revocation by activating and deactivating authorization rights according to events. Our approach is to integrate this concept in IdM systems in a hybrid model supporting delegation, which can be an interesting alternative for scenarios where revocation of consent and user privacy are critical. The delegation includes a SAML compliant protocol, which we have validated through a proof-of-concept implementation. This article also explains the mathematical model describing the event-based model and offers estimations of the overhead introduced by the system. The paper focus on health care scenarios, where we show the flexibility of the proposed event-based user consent revocation mechanism. PMID:22778634
An event driven hybrid identity management approach to privacy enhanced e-health.
Sánchez-Guerrero, Rosa; Almenárez, Florina; Díaz-Sánchez, Daniel; Marín, Andrés; Arias, Patricia; Sanvido, Fabio
2012-01-01
Credential-based authorization offers interesting advantages for ubiquitous scenarios involving limited devices such as sensors and personal mobile equipment: the verification can be done locally; it offers a more reduced computational cost than its competitors for issuing, storing, and verification; and it naturally supports rights delegation. The main drawback is the revocation of rights. Revocation requires handling potentially large revocation lists, or using protocols to check the revocation status, bringing extra communication costs not acceptable for sensors and other limited devices. Moreover, the effective revocation consent--considered as a privacy rule in sensitive scenarios--has not been fully addressed. This paper proposes an event-based mechanism empowering a new concept, the sleepyhead credentials, which allows to substitute time constraints and explicit revocation by activating and deactivating authorization rights according to events. Our approach is to integrate this concept in IdM systems in a hybrid model supporting delegation, which can be an interesting alternative for scenarios where revocation of consent and user privacy are critical. The delegation includes a SAML compliant protocol, which we have validated through a proof-of-concept implementation. This article also explains the mathematical model describing the event-based model and offers estimations of the overhead introduced by the system. The paper focus on health care scenarios, where we show the flexibility of the proposed event-based user consent revocation mechanism.
Biomedical devices and systems security.
Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup
2011-01-01
Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.
Network Support for Group Coordination
2000-01-01
telecommuting and ubiquitous computing [40], the advent of networked multimedia, and less expensive technology have shifted telecollaboration into...of Computer Engineering,Santa Cruz,CA,95064 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/ MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10...participants A and B, the payoff structure for choosing two actions i and j is P = Aij + Bij . If P = 0, then the interaction is called a zero -sum game, and
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-26
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Commission Decision... importation of certain wireless communication devices, portable music and data processing devices, computers...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-25
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Commission Decision... importation of certain wireless communication devices, portable music and data processing devices, computers...
A cloud-based X73 ubiquitous mobile healthcare system: design and implementation.
Ji, Zhanlin; Ganchev, Ivan; O'Droma, Máirtín; Zhang, Xin; Zhang, Xueji
2014-01-01
Based on the user-centric paradigm for next generation networks, this paper describes a ubiquitous mobile healthcare (uHealth) system based on the ISO/IEEE 11073 personal health data (PHD) standards (X73) and cloud computing techniques. A number of design issues associated with the system implementation are outlined. The system includes a middleware on the user side, providing a plug-and-play environment for heterogeneous wireless sensors and mobile terminals utilizing different communication protocols and a distributed "big data" processing subsystem in the cloud. The design and implementation of this system are envisaged as an efficient solution for the next generation of uHealth systems.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-30
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Notice of... communication devices, portable music and data processing devices, computers and components thereof by reason of...
21 CFR 870.1425 - Programmable diagnostic computer.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 8 2013-04-01 2013-04-01 false Programmable diagnostic computer. 870.1425 Section... (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1425 Programmable diagnostic computer. (a) Identification. A programmable diagnostic computer is a device that can be...
21 CFR 870.1425 - Programmable diagnostic computer.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 8 2012-04-01 2012-04-01 false Programmable diagnostic computer. 870.1425 Section... (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1425 Programmable diagnostic computer. (a) Identification. A programmable diagnostic computer is a device that can be...
21 CFR 870.1425 - Programmable diagnostic computer.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 21 Food and Drugs 8 2014-04-01 2014-04-01 false Programmable diagnostic computer. 870.1425 Section... (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1425 Programmable diagnostic computer. (a) Identification. A programmable diagnostic computer is a device that can be...
21 CFR 870.1425 - Programmable diagnostic computer.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Programmable diagnostic computer. 870.1425 Section... (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1425 Programmable diagnostic computer. (a) Identification. A programmable diagnostic computer is a device that can be...
21 CFR 870.1425 - Programmable diagnostic computer.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Programmable diagnostic computer. 870.1425 Section... (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1425 Programmable diagnostic computer. (a) Identification. A programmable diagnostic computer is a device that can be...
u-Healthcare system: state-of-the-art review and challenges.
Touati, Farid; Tabish, Rohan
2013-06-01
With the increase of an ageing population and chronic diseases, society becomes more health conscious and patients become "health consumers" looking for better health management. People's perception is shifting towards patient-centered, rather than the classical, hospital-centered health services which has been propelling the evolution of telemedicine research from the classic e-Health to m-Health and now is to ubiquitous healthcare (u-Health). It is expected that mobile & ubiquitous Telemedicine, integrated with Wireless Body Area Network (WBAN), have a great potential in fostering the provision of next-generation u-Health. Despite the recent efforts and achievements, current u-Health proposed solutions still suffer from shortcomings hampering their adoption today. This paper presents a comprehensive review of up-to-date requirements in hardware, communication, and computing for next-generation u-Health systems. It compares new technological and technical trends and discusses how they address expected u-Health requirements. A thorough survey on various worldwide recent system implementations is presented in an attempt to identify shortcomings in state-of-the art solutions. In particular, challenges in WBAN and ubiquitous computing were emphasized. The purpose of this survey is not only to help beginners with a holistic approach toward understanding u-Health systems but also present to researchers new technological trends and design challenges they have to cope with, while designing such systems.
2014-08-04
ISS040-E-088730 (4 Aug. 2014) --- In the International Space Station?s Harmony node, NASA astronauts Steve Swanson (foreground), Expedition 40 commander; and Reid Wiseman, flight engineer, perform a portable onboard computer Dynamic Onboard Ubiquitous Graphics (DOUG) software review in preparation for two upcoming U.S. spacewalks.
Statistical fingerprinting for malware detection and classification
Prowell, Stacy J.; Rathgeb, Christopher T.
2015-09-15
A system detects malware in a computing architecture with an unknown pedigree. The system includes a first computing device having a known pedigree and operating free of malware. The first computing device executes a series of instrumented functions that, when executed, provide a statistical baseline that is representative of the time it takes the software application to run on a computing device having a known pedigree. A second computing device executes a second series of instrumented functions that, when executed, provides an actual time that is representative of the time the known software application runs on the second computing device. The system detects malware when there is a difference in execution times between the first and the second computing devices.
Third-year medical students' knowledge of privacy and security issues concerning mobile devices.
Whipple, Elizabeth C; Allgood, Kacy L; Larue, Elizabeth M
2012-01-01
The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-03
...] Guidances for Industry and Food and Drug Administration Staff: Computer-Assisted Detection Devices Applied... Clinical Performance Assessment: Considerations for Computer-Assisted Detection Devices Applied to... guidance, entitled ``Computer-Assisted Detection Devices Applied to Radiology Images and Radiology Device...
NASA Astrophysics Data System (ADS)
Shoushtari, M. A.; Sadeghi-Niaraki, H.
2014-10-01
The growing trend in technological advances and Micro Electro Mechanical Systems (MEMS) has targeted for intelligent human lives. Accordingly, Ubiquitous Computing Approach was proposed by Mark Weiser. This paper proposes an ubiquitous surveying solution in Geometrics and surveying field. Ubiquitous Surveying provides cost-effective, smart and available surveying techniques while traditional surveying equipment are so expensive and have small availability specially in indoor and daily surveying jobs. In order to have a smart surveying instrument, different information technology methods and tools like Triangle method, Received Signal Strength Indicator (RSSI) method and laser sensor are used. These new ways in combine with surveying equations introduces a modern surveying equipment called Ubi-Total Station that also employed different sensors embedded in smartphone and mobile stand. RSSI-based localization and Triangle method technique are easy and well known methods to predict the position of an unknown node in indoor environments whereas additional measures are required for a sufficient accuracy. In this paper the main goal is to introduce the Ubiquitous Total Station as a development in smart and ubiquitous GIS. In order to public use of the surveying equipment, design and implementation of this instrument has been done. Conceptual model of Smartphone-based system is designed for this study and based on this model, an Android application as a first sample is developed. Finally the evaluations shows that absolute errors in X and Y calculation are 0.028 and 0.057 meter respectively. Also RMSE of 0.26 was calculated in RSSI method for distance measurement. The high price of traditional equipment and their requirement for professional surveyors has given way to intelligent surveying. In the suggested system, smartphones can be used as tools for positioning and coordinating geometric information of objects.
Electronic and optoelectronic materials and devices inspired by nature
NASA Astrophysics Data System (ADS)
Meredith, P.; Bettinger, C. J.; Irimia-Vladu, M.; Mostert, A. B.; Schwenn, P. E.
2013-03-01
Inorganic semiconductors permeate virtually every sphere of modern human existence. Micro-fabricated memory elements, processors, sensors, circuit elements, lasers, displays, detectors, etc are ubiquitous. However, the dawn of the 21st century has brought with it immense new challenges, and indeed opportunities—some of which require a paradigm shift in the way we think about resource use and disposal, which in turn directly impacts our ongoing relationship with inorganic semiconductors such as silicon and gallium arsenide. Furthermore, advances in fields such as nano-medicine and bioelectronics, and the impending revolution of the ‘ubiquitous sensor network’, all require new functional materials which are bio-compatible, cheap, have minimal embedded manufacturing energy plus extremely low power consumption, and are mechanically robust and flexible for integration with tissues, building structures, fabrics and all manner of hosts. In this short review article we summarize current progress in creating materials with such properties. We focus primarily on organic and bio-organic electronic and optoelectronic systems derived from or inspired by nature, and outline the complex charge transport and photo-physics which control their behaviour. We also introduce the concept of electrical devices based upon ion or proton flow (‘ionics and protonics’) and focus particularly on their role as a signal interface with biological systems. Finally, we highlight recent advances in creating working devices, some of which have bio-inspired architectures, and summarize the current issues, challenges and potential solutions. This is a rich new playground for the modern materials physicist.
People and computers--some recent highlights.
Shackel, B
2000-12-01
This paper aims to review selectively a fair proportion of the literature on human-computer interaction (HCI) over the three years since Shackel (J. Am. Soc. Inform. Sci. 48 (11) (1997) 970-986). After a brief note of history I discuss traditional input, output and workplace aspects, the web and 'E-topics', web-related aspects, virtual reality, safety-critical systems, and the need to move from HCI to human-system integration (HSI). Finally I suggest, and consider briefly, some future possibilities and issues including web consequences, embedded ubiquitous computing, and 'back to systems ergonomics?'.
Metal-organic molecular device for non-volatile memory storage
DOE Office of Scientific and Technical Information (OSTI.GOV)
Radha, B., E-mail: radha.boya@manchester.ac.uk, E-mail: kulkarni@jncasr.ac.in; Sagade, Abhay A.; Kulkarni, G. U., E-mail: radha.boya@manchester.ac.uk, E-mail: kulkarni@jncasr.ac.in
Non-volatile memory devices have been of immense research interest for their use in active memory storage in powered off-state of electronic chips. In literature, various molecules and metal compounds have been investigated in this regard. Molecular memory devices are particularly attractive as they offer the ease of storing multiple memory states in a unique way and also represent ubiquitous choice for miniaturized devices. However, molecules are fragile and thus the device breakdown at nominal voltages during repeated cycles hinders their practical applicability. Here, in this report, a synergetic combination of an organic molecule and an inorganic metal, i.e., a metal-organicmore » complex, namely, palladium hexadecylthiolate is investigated for memory device characteristics. Palladium hexadecylthiolate following partial thermolysis is converted to a molecular nanocomposite of Pd(II), Pd(0), and long chain hydrocarbons, which is shown to exhibit non-volatile memory characteristics with exceptional stability and retention. The devices are all solution-processed and the memory action stems from filament formation across the pre-formed cracks in the nanocomposite film.« less
Workflows and Provenance: Toward Information Science Solutions for the Natural Sciences.
Gryk, Michael R; Ludäscher, Bertram
2017-01-01
The era of big data and ubiquitous computation has brought with it concerns about ensuring reproducibility in this new research environment. It is easy to assume computational methods self-document by their very nature of being exact, deterministic processes. However, similar to laboratory experiments, ensuring reproducibility in the computational realm requires the documentation of both the protocols used (workflows) as well as a detailed description of the computational environment: algorithms, implementations, software environments as well as the data ingested and execution logs of the computation. These two aspects of computational reproducibility (workflows and execution details) are discussed in the context of biomolecular Nuclear Magnetic Resonance spectroscopy (bioNMR) as well as the PRIMAD model for computational reproducibility.
Privacy-Related Context Information for Ubiquitous Health
Nykänen, Pirkko; Ruotsalainen, Pekka
2014-01-01
Background Ubiquitous health has been defined as a dynamic network of interconnected systems. A system is composed of one or more information systems, their stakeholders, and the environment. These systems offer health services to individuals and thus implement ubiquitous computing. Privacy is the key challenge for ubiquitous health because of autonomous processing, rich contextual metadata, lack of predefined trust among participants, and the business objectives. Additionally, regulations and policies of stakeholders may be unknown to the individual. Context-sensitive privacy policies are needed to regulate information processing. Objective Our goal was to analyze privacy-related context information and to define the corresponding components and their properties that support privacy management in ubiquitous health. These properties should describe the privacy issues of information processing. With components and their properties, individuals can define context-aware privacy policies and set their privacy preferences that can change in different information-processing situations. Methods Scenarios and user stories are used to analyze typical activities in ubiquitous health to identify main actors, goals, tasks, and stakeholders. Context arises from an activity and, therefore, we can determine different situations, services, and systems to identify properties for privacy-related context information in information-processing situations. Results Privacy-related context information components are situation, environment, individual, information technology system, service, and stakeholder. Combining our analyses and previously identified characteristics of ubiquitous health, more detailed properties for the components are defined. Properties define explicitly what context information for different components is needed to create context-aware privacy policies that can control, limit, and constrain information processing. With properties, we can define, for example, how data can be processed or how components are regulated or in what kind of environment data can be processed. Conclusions This study added to the vision of ubiquitous health by analyzing information processing from the viewpoint of an individual’s privacy. We learned that health and wellness-related activities may happen in several environments and situations with multiple stakeholders, services, and systems. We have provided new knowledge regarding privacy-related context information and corresponding components by analyzing typical activities in ubiquitous health. With the identified components and their properties, individuals can define their personal preferences on information processing based on situational information, and privacy services can capture privacy-related context of the information-processing situation. PMID:25100084
Privacy-related context information for ubiquitous health.
Seppälä, Antto; Nykänen, Pirkko; Ruotsalainen, Pekka
2014-03-11
Ubiquitous health has been defined as a dynamic network of interconnected systems. A system is composed of one or more information systems, their stakeholders, and the environment. These systems offer health services to individuals and thus implement ubiquitous computing. Privacy is the key challenge for ubiquitous health because of autonomous processing, rich contextual metadata, lack of predefined trust among participants, and the business objectives. Additionally, regulations and policies of stakeholders may be unknown to the individual. Context-sensitive privacy policies are needed to regulate information processing. Our goal was to analyze privacy-related context information and to define the corresponding components and their properties that support privacy management in ubiquitous health. These properties should describe the privacy issues of information processing. With components and their properties, individuals can define context-aware privacy policies and set their privacy preferences that can change in different information-processing situations. Scenarios and user stories are used to analyze typical activities in ubiquitous health to identify main actors, goals, tasks, and stakeholders. Context arises from an activity and, therefore, we can determine different situations, services, and systems to identify properties for privacy-related context information in information-processing situations. Privacy-related context information components are situation, environment, individual, information technology system, service, and stakeholder. Combining our analyses and previously identified characteristics of ubiquitous health, more detailed properties for the components are defined. Properties define explicitly what context information for different components is needed to create context-aware privacy policies that can control, limit, and constrain information processing. With properties, we can define, for example, how data can be processed or how components are regulated or in what kind of environment data can be processed. This study added to the vision of ubiquitous health by analyzing information processing from the viewpoint of an individual's privacy. We learned that health and wellness-related activities may happen in several environments and situations with multiple stakeholders, services, and systems. We have provided new knowledge regarding privacy-related context information and corresponding components by analyzing typical activities in ubiquitous health. With the identified components and their properties, individuals can define their personal preferences on information processing based on situational information, and privacy services can capture privacy-related context of the information-processing situation.
2017-01-01
Although Arabic numerals (like ‘2016’ and ‘3.14’) are ubiquitous, we show that in interactive computer applications they are often misleading and surprisingly unreliable. We introduce interactive numerals as a new concept and show, like Roman numerals and Arabic numerals, interactive numerals introduce another way of using and thinking about numbers. Properly understanding interactive numerals is essential for all computer applications that involve numerical data entered by users, including finance, medicine, aviation and science. PMID:28484609
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-24
... Communications and Computer Devices and Components Thereof; Notice of Investigation AGENCY: U.S. International... States after importation of certain mobile communications and computer devices and components thereof by... importation of certain mobile communications or computer devices or components thereof that infringe one or...
ERIC Educational Resources Information Center
Shih, Ru-Chu
2017-01-01
In recent years, the rapid advancement of information technology has had a great impact on our daily life and changed the world in which we operate; in particular, mobile devices have become more portable and powerful than ever. As a result, mobile-assisted language learning (MALL) and ubiquitous learning have been widely adopted in a variety of…
Toward ubiquitous healthcare services with a novel efficient cloud platform.
He, Chenguang; Fan, Xiaomao; Li, Ye
2013-01-01
Ubiquitous healthcare services are becoming more and more popular, especially under the urgent demand of the global aging issue. Cloud computing owns the pervasive and on-demand service-oriented natures, which can fit the characteristics of healthcare services very well. However, the abilities in dealing with multimodal, heterogeneous, and nonstationary physiological signals to provide persistent personalized services, meanwhile keeping high concurrent online analysis for public, are challenges to the general cloud. In this paper, we proposed a private cloud platform architecture which includes six layers according to the specific requirements. This platform utilizes message queue as a cloud engine, and each layer thereby achieves relative independence by this loosely coupled means of communications with publish/subscribe mechanism. Furthermore, a plug-in algorithm framework is also presented, and massive semistructure or unstructured medical data are accessed adaptively by this cloud architecture. As the testing results showing, this proposed cloud platform, with robust, stable, and efficient features, can satisfy high concurrent requests from ubiquitous healthcare services.
NASA Astrophysics Data System (ADS)
Graham, Michelle; Gray, David
As wireless networks become increasingly ubiquitous, the demand for a method of locating a device has increased dramatically. Location Based Services are now commonplace but there are few methods of verifying or guaranteeing a location provided by a user without some specialised hardware, especially in larger scale networks. We propose a system for the verification of location claims, using proof gathered from neighbouring devices. In this paper we introduce a protocol to protect this proof gathering process, protecting the privacy of all involved parties and securing it from intruders and malicious claiming devices. We present the protocol in stages, extending the security of this protocol to allow for flexibility within its application. The Secure Location Verification Proof Gathering Protocol (SLVPGP) has been designed to function within the area of Vehicular Networks, although its application could be extended to any device with wireless & cryptographic capabilities.
New paradigms in telemedicine: ambient intelligence, wearable, pervasive and personalized.
Rubel, Paul; Fayn, Jocelyne; Simon-Chautemps, Lucas; Atoui, Hussein; Ohlsson, Mattias; Telisson, David; Adami, Stefano; Arod, Sébastien; Forlini, Marie Claire; Malossi, Cesare; Placide, Joël; Ziliani, Gian Luca; Assanelli, Deodato; Chevalier, Philippe
2004-01-01
After decades of development of information systems dedicated to health professionals, there is an increasing demand for personalized and non-hospital based care. An especially critical domain is cardiology: almost two third of cardiac deaths occur out of hospital, and victims do not survive long enough to benefit from in-hospital treatments. We need to reduce the time before treatment. But symptoms are often interpreted wrongly. The only immediate diagnostic tool to assess the possibility of a cardiac event is the electrocardiogram (ECG). Event and transtelephonic ECG recorders are used to improve decision making but require setting up new infrastructures. The European EPI-MEDICS project has developed an intelligent Personal ECG Monitor (PEM) for the early detection of cardiac events. The PEM embeds advanced decision making techniques, generates different alarm levels and forwards alarm messages to the relevant care providers by means of new generation wireless communication. It is cost saving, involving care provider only if necessary and requiring no specific infrastructure. This solution is a typical example of pervasive computing and ambient intelligence that demonstrates how personalized, wearable, ubiquitous devices could improve healthcare.
An investigation into non-invasive physical activity recognition using smartphones.
Kelly, Daniel; Caulfield, Brian
2012-01-01
Technology utilized to automatically monitor Activities of Daily Living (ADL) could be a key component in identifying deviations from normal functional profiles and providing feedback on interventions aimed at improving health. However, if activity recognition systems are to be implemented in real world scenarios such as health and wellness monitoring, the activity sensing modality must unobtrusively fit the human environment rather than forcing humans to adhere to sensor specific conditions. Modern smart phones represent a ubiquitous computing device which has already undergone mainstream adoption. In this paper, we investigate the feasibility of using a modern smartphone, with limited placement constraints, as the sensing modality for an activity recognition system. A dataset of 4 subjects performing 7 activities, using varying sensor placement conditions, is utilized to investigate this. Initial experiments show that a decision tree classifier performs activity classification with precision and recall scores of 0.75 and 0.73 respectively. More importantly, as part of this initial experiment, 3 main problems, and subsequently 3 solutions, relating to unconstrained sensor placement were identified. Using our proposed solutions, classification precision and recall scores were improved by +13% and +14.6% respectively.
Pignolo, L; Riganello, F; Dolce, G; Sannita, W G
2013-04-01
Ambient Intelligence (AmI) provides extended but unobtrusive sensing and computing devices and ubiquitous networking for human/environment interaction. It is a new paradigm in information technology compliant with the international Integrating Healthcare Enterprise board (IHE) and eHealth HL7 technological standards in the functional integration of biomedical domotics and informatics in hospital and home care. AmI allows real-time automatic recording of biological/medical information and environmental data. It is extensively applicable to patient monitoring, medicine and neuroscience research, which require large biomedical data sets; for example, in the study of spontaneous or condition-dependent variability or chronobiology. In this respect, AML is equivalent to a traditional laboratory for data collection and processing, with minimal dedicated equipment, staff, and costs; it benefits from the integration of artificial intelligence technology with traditional/innovative sensors to monitor clinical or functional parameters. A prototype AmI platform (MIMERICA*) has been implemented and is operated in a semi-intensive unit for the vegetative and minimally conscious states, to investigate the spontaneous or environment-related fluctuations of physiological parameters in these conditions.
SenseMyHeart: A cloud service and API for wearable heart monitors.
Pinto Silva, P M; Silva Cunha, J P
2015-01-01
In the era of ubiquitous computing, the growing adoption of wearable systems and body sensor networks is trailing the path for new research and software for cardiovascular intensity, energy expenditure and stress and fatigue detection through cardiovascular monitoring. Several systems have received clinical-certification and provide huge amounts of reliable heart-related data in a continuous basis. PhysioNet provides equally reliable open-source software tools for ECG processing and analysis that can be combined with these devices. However, this software remains difficult to use in a mobile environment and for researchers unfamiliar with Linux-based systems. In the present paper we present an approach that aims at tackling these limitations by developing a cloud service that provides an API for a PhysioNet-based pipeline for ECG processing and Heart Rate Variability measurement. We describe the proposed solution, along with its advantages and tradeoffs. We also present some client tools (windows and Android) and several projects where the developed cloud service has been used successfully as a standard for Heart Rate and Heart Rate Variability studies in different scenarios.
Design and Implementation of Ubiquitous Health System U-Health Using Smart-Watches Sensors
NASA Astrophysics Data System (ADS)
Razavi Termeh, V.; Sadeghi Niaraki, A.
2015-12-01
Today as diseases grow rapidly, the responsibilities of the health clinics in giving services to patients increase and patients have to be more monitored and controlled. Remote systems of monitoring patients result in reducing cost, ease of movement, and also persistent control of patients by their doctors, so that patient can be monitored without need to go to the clinic. Recent advances in the field of ubiquitous sciences as well as using smartphones have resulted in increasingly use of this devices in remote monitoring of patients. The aim of this paper is to design and implement a ubiquitous health system using smartphones and sensors of smart-watches. This is accomplished through the information sent to the smartphone from the sensors of the watch, e.g. heart beat measurement sensor and ultraviolet ray. Then, this information is analyzed in the smartphone and some information based on the position of the patient and the path of him/her using GIS analyses as well as the information about the health level of the patient is sent to the doctor via SMS or phone call. Unnatural heart beats can be resulted in diseases such as Heart Failure and Arterial Fibrillation. With the approach adopted in this study, the patient or the doctor could be aware of these diseases at any time. The proposed approach is a low cost, without need to complex and resilient equipment, system in ubiquitous health that does not limit the movement of the patient.
Current crowding issues on nanoscale planar organic transistors for spintronics applications.
Verduci, Tindara; Chaumy, Guillaume; Dayen, Jean-Francois; Leclerc, Nicolas; Devaux, Eloïse; Stoeckel, Marc-Antoine; Orgiu, Emanuele; Samorì, Paolo; Doudin, Bernard
2018-06-12
The predominance of interface resistance makes current crowding ubiquitous in short channel organic electronics devices but its impact on spin transport has never been considered. We investigate electrochemically-doped nanoscale PBTTT short channel devices and observe the smallest reported values of crowding lengths, found for sub-100 nm electrodes separation. These observed values are nevertheless exceeding the spin diffusion lengths reported in the literature. We discuss here how current crowding can be taken into account in the framework of the Fert-Jaffrès model of spin current propagation in heterostructures, and predict that the anticipated resulting values of magnetoresistance can be significantly reduced. Current crowding therefore impacts spin transport applications and interpretation of the results on spin valve devices. © 2018 IOP Publishing Ltd.
Towards autonomous lab-on-a-chip devices for cell phone biosensing.
Comina, Germán; Suska, Anke; Filippini, Daniel
2016-03-15
Modern cell phones are a ubiquitous resource with a residual capacity to accommodate chemical sensing and biosensing capabilities. From the different approaches explored to capitalize on such resource, the use of autonomous disposable lab-on-a-chip (LOC) devices-conceived as only accessories to complement cell phones-underscores the possibility to entirely retain cell phones' ubiquity for distributed biosensing. The technology and principles exploited for autonomous LOC devices are here selected and reviewed focusing on their potential to serve cell phone readout configurations. Together with this requirement, the central aspects of cell phones' resources that determine their potential for analytical detection are examined. The conversion of these LOC concepts into universal architectures that are readable on unaccessorized phones is discussed within this context. Copyright © 2015 Elsevier B.V. All rights reserved.
A fluidics-based impact sensor
Takahashi, Daigo; Hara, Keisuke; Okano, Taiji
2018-01-01
Microelectromechanical systems (MEMS)-based high-performance accelerometers are ubiquitously used in various electronic devices. However, there is an existing need to detect physical impacts using low-cost devices with no electronic circuits or a battery. We designed and fabricated an impact sensor prototype using a commercial stereolithography apparatus that only consists of a plastic housing and working fluids. The sensor device responds to the instantaneous acceleration (impact) by deformation and pinch off of a water droplet that is suspended in oil in a sensor cavity. We tested the various geometrical and physical parameters of the impact sensor to identify their relations to threshold acceleration values. We show that the state diagram that is plotted against the dimensionless Archimedes and Bond numbers adequately describes the response of the proposed sensor. PMID:29634750
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-14
... Communications and Computer Devices and Components Thereof; Notice of Commission Determination Not To Review an... in its entirety Inv. No. 337-TA-704, Certain Mobile Communications and Computer Devices and... importation of certain mobile communications and computer devices and components thereof by reason of...
Accelerometer-based on-body sensor localization for health and medical monitoring applications
Vahdatpour, Alireza; Amini, Navid; Xu, Wenyao; Sarrafzadeh, Majid
2011-01-01
In this paper, we present a technique to recognize the position of sensors on the human body. Automatic on-body device localization ensures correctness and accuracy of measurements in health and medical monitoring systems. In addition, it provides opportunities to improve the performance and usability of ubiquitous devices. Our technique uses accelerometers to capture motion data to estimate the location of the device on the user’s body, using mixed supervised and unsupervised time series analysis methods. We have evaluated our technique with extensive experiments on 25 subjects. On average, our technique achieves 89% accuracy in estimating the location of devices on the body. In order to study the feasibility of classification of left limbs from right limbs (e.g., left arm vs. right arm), we performed analysis, based of which no meaningful classification was observed. Personalized ultraviolet monitoring and wireless transmission power control comprise two immediate applications of our on-body device localization approach. Such applications, along with their corresponding feasibility studies, are discussed. PMID:22347840
Multi-Sensor Fusion for Enhanced Contextual Awareness of Everyday Activities with Ubiquitous Devices
Guiry, John J.; van de Ven, Pepijn; Nelson, John
2014-01-01
In this paper, the authors investigate the role that smart devices, including smartphones and smartwatches, can play in identifying activities of daily living. A feasibility study involving N = 10 participants was carried out to evaluate the devices' ability to differentiate between nine everyday activities. The activities examined include walking, running, cycling, standing, sitting, elevator ascents, elevator descents, stair ascents and stair descents. The authors also evaluated the ability of these devices to differentiate indoors from outdoors, with the aim of enhancing contextual awareness. Data from this study was used to train and test five well known machine learning algorithms: C4.5, CART, Naïve Bayes, Multi-Layer Perceptrons and finally Support Vector Machines. Both single and multi-sensor approaches were examined to better understand the role each sensor in the device can play in unobtrusive activity recognition. The authors found overall results to be promising, with some models correctly classifying up to 100% of all instances. PMID:24662406
Guiry, John J; van de Ven, Pepijn; Nelson, John
2014-03-21
In this paper, the authors investigate the role that smart devices, including smartphones and smartwatches, can play in identifying activities of daily living. A feasibility study involving N = 10 participants was carried out to evaluate the devices' ability to differentiate between nine everyday activities. The activities examined include walking, running, cycling, standing, sitting, elevator ascents, elevator descents, stair ascents and stair descents. The authors also evaluated the ability of these devices to differentiate indoors from outdoors, with the aim of enhancing contextual awareness. Data from this study was used to train and test five well known machine learning algorithms: C4.5, CART, Naïve Bayes, Multi-Layer Perceptrons and finally Support Vector Machines. Both single and multi-sensor approaches were examined to better understand the role each sensor in the device can play in unobtrusive activity recognition. The authors found overall results to be promising, with some models correctly classifying up to 100% of all instances.
Usability of a Low-Cost Head Tracking Computer Access Method following Stroke.
Mah, Jasmine; Jutai, Jeffrey W; Finestone, Hillel; Mckee, Hilary; Carter, Melanie
2015-01-01
Assistive technology devices for computer access can facilitate social reintegration and promote independence for people who have had a stroke. This work describes the exploration of the usefulness and acceptability of a new computer access device called the Nouse™ (Nose-as-mouse). The device uses standard webcam and video recognition algorithms to map the movement of the user's nose to a computer cursor, thereby allowing hands-free computer operation. Ten participants receiving in- or outpatient stroke rehabilitation completed a series of standardized and everyday computer tasks using the Nouse™ and then completed a device usability questionnaire. Task completion rates were high (90%) for computer activities only in the absence of time constraints. Most of the participants were satisfied with ease of use (70%) and liked using the Nouse™ (60%), indicating they could resume most of their usual computer activities apart from word-processing using the device. The findings suggest that hands-free computer access devices like the Nouse™ may be an option for people who experience upper motor impairment caused by stroke and are highly motivated to resume personal computing. More research is necessary to further evaluate the effectiveness of this technology, especially in relation to other computer access assistive technology devices.
NASA Astrophysics Data System (ADS)
Evans, J. D.; Hao, W.; Chettri, S. R.
2014-12-01
Disaster risk management has grown to rely on earth observations, multi-source data analysis, numerical modeling, and interagency information sharing. The practice and outcomes of disaster risk management will likely undergo further change as several emerging earth science technologies come of age: mobile devices; location-based services; ubiquitous sensors; drones; small satellites; satellite direct readout; Big Data analytics; cloud computing; Web services for predictive modeling, semantic reconciliation, and collaboration; and many others. Integrating these new technologies well requires developing and adapting them to meet current needs; but also rethinking current practice to draw on new capabilities to reach additional objectives. This requires a holistic view of the disaster risk management enterprise and of the analytical or operational capabilities afforded by these technologies. One helpful tool for this assessment, the GEOSS Architecture for the Use of Remote Sensing Products in Disaster Management and Risk Assessment (Evans & Moe, 2013), considers all phases of the disaster risk management lifecycle for a comprehensive set of natural hazard types, and outlines common clusters of activities and their use of information and computation resources. We are using these architectural views, together with insights from current practice, to highlight effective, interrelated roles for emerging earth science technologies in disaster risk management. These roles may be helpful in creating roadmaps for research and development investment at national and international levels.
Efficient security mechanisms for mHealth applications using wireless body sensor networks.
Sahoo, Prasan Kumar
2012-01-01
Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.
SAR exposure from UHF RFID reader in adult, child, pregnant woman, and fetus anatomical models.
Fiocchi, Serena; Markakis, Ioannis A; Ravazzani, Paolo; Samaras, Theodoros
2013-09-01
The spread of radio frequency identification (RFID) devices in ubiquitous applications without their simultaneous exposure assessment could give rise to public concerns about their potential adverse health effects. Among the various RFID system categories, the ultra high frequency (UHF) RFID systems have recently started to be widely used in many applications. This study addresses a computational exposure assessment of the electromagnetic radiation generated by a realistic UHF RFID reader, quantifying the exposure levels in different exposure scenarios and subjects (two adults, four children, and two anatomical models of women 7 and 9 months pregnant). The results of the computations are presented in terms of the whole-body and peak spatial specific absorption rate (SAR) averaged over 10 g of tissue to allow comparison with the basic restrictions of the exposure guidelines. The SAR levels in the adults and children were below 0.02 and 0.8 W/kg in whole-body SAR and maximum peak SAR levels, respectively, for all tested positions of the antenna. On the contrary, exposure of pregnant women and fetuses resulted in maximum peak SAR(10 g) values close to the values suggested by the guidelines (2 W/kg) in some of the exposure scenarios with the antenna positioned in front of the abdomen and with a 100% duty cycle and 1 W radiated power. Copyright © 2013 Wiley Periodicals, Inc.
Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks
Sahoo, Prasan Kumar
2012-01-01
Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734
Power throttling of collections of computing elements
Bellofatto, Ralph E [Ridgefield, CT; Coteus, Paul W [Yorktown Heights, NY; Crumley, Paul G [Yorktown Heights, NY; Gara, Alan G [Mount Kidsco, NY; Giampapa, Mark E [Irvington, NY; Gooding,; Thomas, M [Rochester, MN; Haring, Rudolf A [Cortlandt Manor, NY; Megerian, Mark G [Rochester, MN; Ohmacht, Martin [Yorktown Heights, NY; Reed, Don D [Mantorville, MN; Swetz, Richard A [Mahopac, NY; Takken, Todd [Brewster, NY
2011-08-16
An apparatus and method for controlling power usage in a computer includes a plurality of computers communicating with a local control device, and a power source supplying power to the local control device and the computer. A plurality of sensors communicate with the computer for ascertaining power usage of the computer, and a system control device communicates with the computer for controlling power usage of the computer.
Experimental quantum computing to solve systems of linear equations.
Cai, X-D; Weedbrook, C; Su, Z-E; Chen, M-C; Gu, Mile; Zhu, M-J; Li, Li; Liu, Nai-Le; Lu, Chao-Yang; Pan, Jian-Wei
2013-06-07
Solving linear systems of equations is ubiquitous in all areas of science and engineering. With rapidly growing data sets, such a task can be intractable for classical computers, as the best known classical algorithms require a time proportional to the number of variables N. A recently proposed quantum algorithm shows that quantum computers could solve linear systems in a time scale of order log(N), giving an exponential speedup over classical computers. Here we realize the simplest instance of this algorithm, solving 2×2 linear equations for various input vectors on a quantum computer. We use four quantum bits and four controlled logic gates to implement every subroutine required, demonstrating the working principle of this algorithm.
Latent Computational Complexity of Symmetry-Protected Topological Order with Fractional Symmetry.
Miller, Jacob; Miyake, Akimasa
2018-04-27
An emerging insight is that ground states of symmetry-protected topological orders (SPTOs) possess latent computational complexity in terms of their many-body entanglement. By introducing a fractional symmetry of SPTO, which requires the invariance under 3-colorable symmetries of a lattice, we prove that every renormalization fixed-point state of 2D (Z_{2})^{m} SPTO with fractional symmetry can be utilized for universal quantum computation using only Pauli measurements, as long as it belongs to a nontrivial 2D SPTO phase. Our infinite family of fixed-point states may serve as a base model to demonstrate the idea of a "quantum computational phase" of matter, whose states share universal computational complexity ubiquitously.
Cassidy and Parmitano in U.S. Laboratory
2013-06-25
ISS036-E-012131 (25 June 2013) --- NASA astronaut Chris Cassidy (left) and European Space Agency astronaut Luca Parmitano, both Expedition 36 flight engineers, perform a Portable Onboard Computers (POC) Dynamic Onboard Ubiquitous Graphics (DOUG) software review in preparation for spacewalks scheduled for July 9 and July 16.
Cassidy and Parmitano in U.S. Laboratory
2013-06-25
ISS036-E-012130 (25 June 2013) --- NASA astronaut Chris Cassidy (left) and European Space Agency astronaut Luca Parmitano, both Expedition 36 flight engineers, perform a Portable Onboard Computers (POC) Dynamic Onboard Ubiquitous Graphics (DOUG) software review in preparation for spacewalks scheduled for July 9 and July 16.
Construction of a Digital Learning Environment Based on Cloud Computing
ERIC Educational Resources Information Center
Ding, Jihong; Xiong, Caiping; Liu, Huazhong
2015-01-01
Constructing the digital learning environment for ubiquitous learning and asynchronous distributed learning has opened up immense amounts of concrete research. However, current digital learning environments do not fully fulfill the expectations on supporting interactive group learning, shared understanding and social construction of knowledge.…
Wireless Networks: New Meaning to Ubiquitous Computing.
ERIC Educational Resources Information Center
Drew, Wilfred, Jr.
2003-01-01
Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…
Ubiquitous health in practice: the interreality paradigm.
Gaggioli, Andrea; Raspelli, Simona; Grassi, Alessandra; Pallavicini, Federica; Cipresso, Pietro; Wiederhold, Brenda K; Riva, Giuseppe
2011-01-01
In this paper we introduce a new ubiquitous computing paradigm for behavioral health care: "Interreality". Interreality integrates assessment and treatment within a hybrid environment, that creates a bridge between the physical and virtual worlds. Our claim is that bridging virtual experiences (fully controlled by the therapist, used to learn coping skills and emotional regulation) with real experiences (allowing both the identification of any critical stressors and the assessment of what has been learned) using advanced technologies (virtual worlds, advanced sensors and PDA/mobile phones) may improve existing psychological treatment. To illustrate the proposed concept, a clinical scenario is also presented and discussed: Daniela, a 40 years old teacher, with a mother affected by Alzheimer's disease.
A Cloud-Based X73 Ubiquitous Mobile Healthcare System: Design and Implementation
Ji, Zhanlin; O'Droma, Máirtín; Zhang, Xin; Zhang, Xueji
2014-01-01
Based on the user-centric paradigm for next generation networks, this paper describes a ubiquitous mobile healthcare (uHealth) system based on the ISO/IEEE 11073 personal health data (PHD) standards (X73) and cloud computing techniques. A number of design issues associated with the system implementation are outlined. The system includes a middleware on the user side, providing a plug-and-play environment for heterogeneous wireless sensors and mobile terminals utilizing different communication protocols and a distributed “big data” processing subsystem in the cloud. The design and implementation of this system are envisaged as an efficient solution for the next generation of uHealth systems. PMID:24737958
Novel Material Integration for Reliable and Energy-Efficient NEM Relay Technology
NASA Astrophysics Data System (ADS)
Chen, I.-Ru
Energy-efficient switching devices have become ever more important with the emergence of ubiquitous computing. NEM relays are promising to complement CMOS transistors as circuit building blocks for future ultra-low-power information processing, and as such have recently attracted significant attention from the semiconductor industry and researchers. Relay technology potentially can overcome the energy efficiency limit for conventional CMOS technology due to several key characteristics, including zero OFF-state leakage, abrupt switching behavior, and potentially very low active energy consumption. However, two key issues must be addressed for relay technology to reach its full potential: surface oxide formation at the contacting surfaces leading to increased ON-state resistance after switching, and high switching voltages due to strain gradient present within the relay structure. This dissertation advances NEM relay technology by investigating solutions to both of these pressing issues. Ruthenium, whose native oxide is conductive, is proposed as the contacting material to improve relay ON-state resistance stability. Ruthenium-contact relays are fabricated after overcoming several process integration challenges, and show superior ON-state resistance stability in electrical measurements and extended device lifetime. The relay structural film is optimized via stress matching among all layers within the structure, to provide lower strain gradient (below 10E-3/microm -1) and hence lower switching voltage. These advancements in relay technology, along with the integration of a metallic interconnect layer, enable complex relay-based circuit demonstration. In addition to the experimental efforts, this dissertation theoretically analyzes the energy efficiency limit of a NEM switch, which is generally believed to be limited by the surface adhesion energy. New compact (<1 microm2 footprint), low-voltage (<0.1 V) switch designs are proposed to overcome this limit. The results pave a pathway to scaled energy-efficient electronic device technology.
1989-09-01
technologies during the days of the Industrial Revolution . [8:229) Those words while almost five years old still hold true as computer-based...Within the seeds of this revolution in technology lies potential for change as potent and ubiquitous as that brought about by changes in manufacturing...with the largest increases coming from the microcomputer industry . A set of companies recently studied revealed growth rates from 30 to 100 percent
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-10
..., Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... importing wireless communication devices, portable music and data processing devices, and tablet computers... certain electronic devices, including wireless communication devices, portable music and data processing...
Small Form Factor Information Storage Devices for Mobile Applications in Korea
NASA Astrophysics Data System (ADS)
Park, Young-Pil; Park, No-Cheol; Kim, Chul-Jin
Recently, the ubiquitous environment in which anybody can reach a lot of information data without any limitations on the place and time has become an important social issue. There are two basic requirements in the field of information storage devices which have to be satisfied; the first is the demand for the improvement of memory capacity to manage the increased data capacity in personal and official purposes. The second is the demand for new development of information storage devices small enough to be applied to mobile multimedia digital electronics, including digital camera, PDA and mobile phones. To summarize, for the sake of mobile applications, it is necessary to develop information storage devices which have simultaneously a large capacity and a small size. Korea possesses the necessary infrastructure for developing such small sized information storage devices. It has a good digital market, major digital companies, and various research institutes. Nowadays, many companies and research institutes including university cooperate together in the research on small sized information storage devices. Thus, it is expected that small form factor optical disk drives will be commercialized in the very near future in Korea.
Chen, Chih-Yuan; Chang, Chia-Lin; Chang, Chih-Wei; Lai, Shin-Chi; Chien, Tsung-Fu; Huang, Hong-Yi; Chiou, Jin-Chern; Luo, Ching-Hsing
2013-03-04
This work describes a bio-potential acquisition system for portable ubiquitous healthcare applications using flexible polydimethylsiloxane dry electrodes (FPDEs) and a low-power recording circuit. This novel FPDE used Au as the skin contact layer, which was made using a CO2 laser and replica method technology. The FPDE was revised from a commercial bio-potential electrode with a conductive snap using dry electrodes rather than wet electrodes that proposed reliable and robust attachment for the purpose of measurement, and attaching velcro made it wearable on the forearm for bio-potential applications. Furthermore, this study proposes a recording device to store bio-potential signal data and provides portability and low-power consumption for the proposed acquisition system. To acquire differential bio-potentials, such as electrocardiogram (ECG) signals, the proposed recording device includes a low-power front-end acquisition chip fabricated using a complementary metal-oxide-semiconductor (CMOS) process, a commercial microcontroller (MSP430F149), and a secure digital (SD) card for portable healthcare applications. The proposed system can obtain ECG signals efficiently and are comfortable to the skin. The power consumption of the system is about 85 mW for continuous working over a 3 day period with two AA batteries. It can also be used as a compact Holter ECG system.
High-performance computing for airborne applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quinn, Heather M; Manuzzato, Andrea; Fairbanks, Tom
2010-06-28
Recently, there has been attempts to move common satellite tasks to unmanned aerial vehicles (UAVs). UAVs are significantly cheaper to buy than satellites and easier to deploy on an as-needed basis. The more benign radiation environment also allows for an aggressive adoption of state-of-the-art commercial computational devices, which increases the amount of data that can be collected. There are a number of commercial computing devices currently available that are well-suited to high-performance computing. These devices range from specialized computational devices, such as field-programmable gate arrays (FPGAs) and digital signal processors (DSPs), to traditional computing platforms, such as microprocessors. Even thoughmore » the radiation environment is relatively benign, these devices could be susceptible to single-event effects. In this paper, we will present radiation data for high-performance computing devices in a accelerated neutron environment. These devices include a multi-core digital signal processor, two field-programmable gate arrays, and a microprocessor. From these results, we found that all of these devices are suitable for many airplane environments without reliability problems.« less
ERIC Educational Resources Information Center
Butin, Dan W.
2013-01-01
Engaged learning--the type that happens outside textbooks and beyond the four walls of the classroom--moves beyond right and wrong answers to grappling with the uncertainties and contradictions of a complex world. iPhones back up to the "cloud." GoogleDocs is all about "cloud computing." Facebook is as ubiquitous as the sky.…
Use of Technology in the Household: An Exploratory Study
ERIC Educational Resources Information Center
Jackson, Barcus C.
2010-01-01
Since the 1980s, personal computer ownership has become ubiquitous, and people are increasingly using household technologies for a wide variety of purposes. Extensive research has resulted in useful models to explain workplace technology acceptance and household technology adoption. Studies have also found that the determinants underlying…
Three Essays on Digital Evolution
ERIC Educational Resources Information Center
Zhang, Zhewei
2016-01-01
Digital products are rapidly shaping our world into a ubiquitous computing world. Because of its unique characteristics, digital artifacts are generative and highly evolving through the recombination of existing elements as well as by the invention of new elements. In this thesis, I first propose an evolutionary view to examine how digital…
Supporting Classroom Activities with the BSUL System
ERIC Educational Resources Information Center
Ogata, Hiroaki; Saito, Nobuji A.; Paredes J., Rosa G.; San Martin, Gerardo Ayala; Yano, Yoneo
2008-01-01
This paper presents the integration of ubiquitous computing systems into classroom settings, in order to provide basic support for classrooms and field activities. We have developed web application components using Java technology and configured a classroom with wireless network access and a web camera for our purposes. In this classroom, the…
Formative Assessment Design for PDA Integrated Ecology Observation
ERIC Educational Resources Information Center
Hung, Pi-Hsia; Lin, Yu-Fen; Hwang, Gwo-Jen
2010-01-01
Ubiquitous computing and mobile technologies provide a new perspective for designing innovative outdoor learning experiences. The purpose of this study is to propose a formative assessment design for integrating PDAs into ecology observations. Three learning activities were conducted in this study. An action research approach was applied to…
ERIC Educational Resources Information Center
Shea, Lorel
2010-01-01
Today's parents and their children use electronic gadgets and gizmos at such a prodigious rate that they are changing the way people live. Cell phones are ubiquitous. Kids constantly text, email, instant message, and send photos from their phones as well as their computers. The Internet, without a doubt, has a tremendous impact on modern family…
Communication Vulnerability in the Digital Age: A Missed Concern in Constructivism
ERIC Educational Resources Information Center
Katada, Fusa
2016-01-01
The current wave of globalization aided by ubiquitous computing necessarily involves interaction and integration among people and human institutions worldwide. This has led to a worldwide awareness that professionals in academia need to have effective communication skills. Such communication-driven academic discourse puts much demand on language…
ERIC Educational Resources Information Center
Thomas, Valerie Brown
2010-01-01
Ubiquitous technology and agile organizational structures have enabled a strategic response to increasingly competitive, complex, and unpredictable challenges faced by many organizations. Using cyberinfrastructure, which is primarily the network of information, computers, communication technologies, and people, traditional organizations have…
The Trouble with Thinking like Arena: Learning to Use Simulation Software
ERIC Educational Resources Information Center
Rodgers, Diane M.; Moraga, Reinaldo J.
2011-01-01
Simulation software used for modeling has become as ubiquitous as computers themselves. Despite growing reliance on simulation in educational and workplace settings, users encounter frustration in using simulation software programs. The authors conducted a study with 26 engineering students and interviewed them about their experience learning the…
Enabling Logistics With Portable and Wireless Technology Study. Volume 1
2004-08-06
Project”, Ubiquitous Computing Group Microsoft Research, 2001. 102 Enabling Logistics with Portable and Wireless Technology Study ...Enabling Logistics with Portable and Wireless Technology Study Final Report FINAL REPORT...Volume I) Enabling Logistics with Portable and Wireless Technology Study AUTHORS School of Industrial Engineering Dr. Soundar Kumara
ERIC Educational Resources Information Center
Chang, Chi-Cheng; Warden, Clyde A.; Liang, Chaoyun; Chou, Pao-Nan
2018-01-01
This study examines differences in English listening comprehension, cognitive load, and learning behaviour between outdoor ubiquitous learning and indoor computer-assisted learning. An experimental design, employing a pretest-posttest control group is employed. Randomly assigned foreign language university majors joined either the experimental…
Augmenting Traditional Books with Context-Aware Learning Supports from Online Learning Communities
ERIC Educational Resources Information Center
Chen, Gwo-Dong; Chao, Po-Yao
2008-01-01
Recent advances in ubiquitous computing technologies have brought reality augmentation of traditional objects to context-aware and social supports. Although a significant proportion of students prefer poring over traditional paper textbooks over electronic books, few studies have enhanced reading practice of traditional books with ubiquitous…
Inexpensive Data Acquisition with a Sound Card
ERIC Educational Resources Information Center
Hassan, Umer; Pervaiz, Saad; Anwar, Muhammad Sabieh
2011-01-01
Signal generators, oscilloscopes, and data acquisition (DAQ) systems are standard components of the modern experimental physics laboratory. The sound card, a built-in component in the ubiquitous personal computer, can be utilized for all three of these tasks and offers an attractive option for labs in developing countries such as…
Camera! Action! Collaborate with Digital Moviemaking
ERIC Educational Resources Information Center
Swan, Kathleen Owings; Hofer, Mark; Levstik, Linda S.
2007-01-01
Broadly defined, digital moviemaking integrates a variety of media (images, sound, text, video, narration) to communicate with an audience. There is near-ubiquitous access to the necessary software (MovieMaker and iMovie are bundled free with their respective operating systems) and hardware (computers with Internet access, digital cameras, etc.).…
Mobile healthcare information management utilizing Cloud Computing and Android OS.
Doukas, Charalampos; Pliakas, Thomas; Maglogiannis, Ilias
2010-01-01
Cloud Computing provides functionality for managing information data in a distributed, ubiquitous and pervasive manner supporting several platforms, systems and applications. This work presents the implementation of a mobile system that enables electronic healthcare data storage, update and retrieval using Cloud Computing. The mobile application is developed using Google's Android operating system and provides management of patient health records and medical images (supporting DICOM format and JPEG2000 coding). The developed system has been evaluated using the Amazon's S3 cloud service. This article summarizes the implementation details and presents initial results of the system in practice.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-04
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-794] Certain Electronic Devices, Including Wireless Commmunication Devices, Portable Music and Data Processing Devices, and Tablet Computers... communication devices, portable music and data processing devices, and tablet computers, imported by Apple Inc...
Sensor sentinel computing device
Damico, Joseph P.
2016-08-02
Technologies pertaining to authenticating data output by sensors in an industrial environment are described herein. A sensor sentinel computing device receives time-series data from a sensor by way of a wireline connection. The sensor sentinel computing device generates a validation signal that is a function of the time-series signal. The sensor sentinel computing device then transmits the validation signal to a programmable logic controller in the industrial environment.
Quasistatic Cavity Resonance for Ubiquitous Wireless Power Transfer.
Chabalko, Matthew J; Shahmohammadi, Mohsen; Sample, Alanson P
2017-01-01
Wireless power delivery has the potential to seamlessly power our electrical devices as easily as data is transmitted through the air. However, existing solutions are limited to near contact distances and do not provide the geometric freedom to enable automatic and un-aided charging. We introduce quasistatic cavity resonance (QSCR), which can enable purpose-built structures, such as cabinets, rooms, and warehouses, to generate quasistatic magnetic fields that safely deliver kilowatts of power to mobile receivers contained nearly anywhere within. A theoretical model of a quasistatic cavity resonator is derived, and field distributions along with power transfer efficiency are validated against measured results. An experimental demonstration shows that a 54 m3 QSCR room can deliver power to small coil receivers in nearly any position with 40% to 95% efficiency. Finally, a detailed safety analysis shows that up to 1900 watts can be transmitted to a coil receiver enabling safe and ubiquitous wireless power.
Quasistatic Cavity Resonance for Ubiquitous Wireless Power Transfer
Shahmohammadi, Mohsen; Sample, Alanson P.
2017-01-01
Wireless power delivery has the potential to seamlessly power our electrical devices as easily as data is transmitted through the air. However, existing solutions are limited to near contact distances and do not provide the geometric freedom to enable automatic and un-aided charging. We introduce quasistatic cavity resonance (QSCR), which can enable purpose-built structures, such as cabinets, rooms, and warehouses, to generate quasistatic magnetic fields that safely deliver kilowatts of power to mobile receivers contained nearly anywhere within. A theoretical model of a quasistatic cavity resonator is derived, and field distributions along with power transfer efficiency are validated against measured results. An experimental demonstration shows that a 54 m3 QSCR room can deliver power to small coil receivers in nearly any position with 40% to 95% efficiency. Finally, a detailed safety analysis shows that up to 1900 watts can be transmitted to a coil receiver enabling safe and ubiquitous wireless power. PMID:28199321
Simple video format for mobile applications
NASA Astrophysics Data System (ADS)
Smith, John R.; Miao, Zhourong; Li, Chung-Sheng
2000-04-01
With the advent of pervasive computing, there is a growing demand for enabling multimedia applications on mobile devices. Large numbers of pervasive computing devices, such as personal digital assistants (PDAs), hand-held computer (HHC), smart phones, portable audio players, automotive computing devices, and wearable computers are gaining access to online information sources. However, the pervasive computing devices are often constrained along a number of dimensions, such as processing power, local storage, display size and depth, connectivity, and communication bandwidth, which makes it difficult to access rich image and video content. In this paper, we report on our initial efforts in designing a simple scalable video format with low-decoding and transcoding complexity for pervasive computing. The goal is to enable image and video access for mobile applications such as electronic catalog shopping, video conferencing, remote surveillance and video mail using pervasive computing devices.
A Comprehensive Review of Existing Risk Assessment Models in Cloud Computing
NASA Astrophysics Data System (ADS)
Amini, Ahmad; Jamil, Norziana
2018-05-01
Cloud computing is a popular paradigm in information technology and computing as it offers numerous advantages in terms of economical saving and minimal management effort. Although elasticity and flexibility brings tremendous benefits, it still raises many information security issues due to its unique characteristic that allows ubiquitous computing. Therefore, the vulnerabilities and threats in cloud computing have to be identified and proper risk assessment mechanism has to be in place for better cloud computing management. Various quantitative and qualitative risk assessment models have been proposed but up to our knowledge, none of them is suitable for cloud computing environment. This paper, we compare and analyse the strengths and weaknesses of existing risk assessment models. We then propose a new risk assessment model that sufficiently address all the characteristics of cloud computing, which was not appeared in the existing models.
Modelling Framework and Assistive Device for Peripheral Intravenous Injections
NASA Astrophysics Data System (ADS)
Kam, Kin F.; Robinson, Martin P.; Gilbert, Mathew A.; Pelah, Adar
2016-02-01
Intravenous access for blood sampling or drug administration that requires peripheral venepuncture is perhaps the most common invasive procedure practiced in hospitals, clinics and general practice surgeries.We describe an idealised mathematical framework for modelling the dynamics of the peripheral venepuncture process. Basic assumptions of the model are confirmed through motion analysis of needle trajectories during venepuncture, taken from video recordings of a skilled practitioner injecting into a practice kit. The framework is also applied to the design and construction of a proposed device for accurate needle guidance during venepuncture administration, assessed as consistent and repeatable in application and does not lead to over puncture. The study provides insights into the ubiquitous peripheral venepuncture process and may contribute to applications in training and in the design of new devices, including for use in robotic automation.
Trust information-based privacy architecture for ubiquitous health.
Ruotsalainen, Pekka Sakari; Blobel, Bernd; Seppälä, Antto; Nykänen, Pirkko
2013-10-08
Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system analysis. The architecture mimics the way humans use trust information in decision making, and enables the DS to design system-specific privacy policies using computational trust information that is based on systems' measured features. The trust attributes that were developed describe the level systems for support awareness and transparency, and how they follow general and domain-specific regulations and laws. The monitoring component of the architecture offers dynamic feedback concerning how the system enforces the polices of DS. The privacy management architecture developed in this study enables the DS to dynamically manage information privacy in ubiquitous health and to define individual policies for all systems considering their trust value and corresponding attributes. The DS can also set policies for secondary use and reuse of health information. The architecture offers protection against privacy threats existing in ubiquitous environments. Although the architecture is targeted to ubiquitous health, it can easily be modified to other ubiquitous applications.
Trust Information-Based Privacy Architecture for Ubiquitous Health
2013-01-01
Background Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. Objective The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. Methods A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system analysis. Results The architecture mimics the way humans use trust information in decision making, and enables the DS to design system-specific privacy policies using computational trust information that is based on systems’ measured features. The trust attributes that were developed describe the level systems for support awareness and transparency, and how they follow general and domain-specific regulations and laws. The monitoring component of the architecture offers dynamic feedback concerning how the system enforces the polices of DS. Conclusions The privacy management architecture developed in this study enables the DS to dynamically manage information privacy in ubiquitous health and to define individual policies for all systems considering their trust value and corresponding attributes. The DS can also set policies for secondary use and reuse of health information. The architecture offers protection against privacy threats existing in ubiquitous environments. Although the architecture is targeted to ubiquitous health, it can easily be modified to other ubiquitous applications. PMID:25099213
Lai, Chin-Feng; Chen, Min; Pan, Jeng-Shyang; Youn, Chan-Hyun; Chao, Han-Chieh
2014-03-01
As cloud computing and wireless body sensor network technologies become gradually developed, ubiquitous healthcare services prevent accidents instantly and effectively, as well as provides relevant information to reduce related processing time and cost. This study proposes a co-processing intermediary framework integrated cloud and wireless body sensor networks, which is mainly applied to fall detection and 3-D motion reconstruction. In this study, the main focuses includes distributed computing and resource allocation of processing sensing data over the computing architecture, network conditions and performance evaluation. Through this framework, the transmissions and computing time of sensing data are reduced to enhance overall performance for the services of fall events detection and 3-D motion reconstruction.
Interfacing External Quantum Devices to a Universal Quantum Computer
Lagana, Antonio A.; Lohe, Max A.; von Smekal, Lorenz
2011-01-01
We present a scheme to use external quantum devices using the universal quantum computer previously constructed. We thereby show how the universal quantum computer can utilize networked quantum information resources to carry out local computations. Such information may come from specialized quantum devices or even from remote universal quantum computers. We show how to accomplish this by devising universal quantum computer programs that implement well known oracle based quantum algorithms, namely the Deutsch, Deutsch-Jozsa, and the Grover algorithms using external black-box quantum oracle devices. In the process, we demonstrate a method to map existing quantum algorithms onto the universal quantum computer. PMID:22216276
Interfacing external quantum devices to a universal quantum computer.
Lagana, Antonio A; Lohe, Max A; von Smekal, Lorenz
2011-01-01
We present a scheme to use external quantum devices using the universal quantum computer previously constructed. We thereby show how the universal quantum computer can utilize networked quantum information resources to carry out local computations. Such information may come from specialized quantum devices or even from remote universal quantum computers. We show how to accomplish this by devising universal quantum computer programs that implement well known oracle based quantum algorithms, namely the Deutsch, Deutsch-Jozsa, and the Grover algorithms using external black-box quantum oracle devices. In the process, we demonstrate a method to map existing quantum algorithms onto the universal quantum computer. © 2011 Lagana et al.
Remote Wiping and Secure Deletion on Mobile Devices: A Review.
Leom, Ming Di; Choo, Kim-Kwang Raymond; Hunt, Ray
2016-11-01
Mobile devices have become ubiquitous in almost every sector of both private and commercial endeavors. As a result of such widespread use in everyday life, many users knowingly and unknowingly save significant amounts of personal and/or commercial data on these mobile devices. Thus, loss of mobile devices through accident or theft can expose users-and their businesses-to significant personal and corporate cost. To mitigate this data leakage issue, remote wiping features have been introduced to modern mobile devices. Given the destructive nature of such a feature, however, it may be subject to criminal exploitation (e.g., a criminal exploiting one or more vulnerabilities to issue a remote wiping command to the victim's device). To obtain a better understanding of remote wiping, we survey the literature, focusing on existing approaches to secure flash storage deletion and provide a critical analysis and comparison of a variety of published research in this area. In support of our analysis, we further provide prototype experimental results for three Android devices, thus providing both a theoretical and applied focus to this article as well as providing directions for further research. © 2016 American Academy of Forensic Sciences.
IAServ: an intelligent home care web services platform in a cloud for aging-in-place.
Su, Chuan-Jun; Chiang, Chang-Yu
2013-11-12
As the elderly population has been rapidly expanding and the core tax-paying population has been shrinking, the need for adequate elderly health and housing services continues to grow while the resources to provide such services are becoming increasingly scarce. Thus, increasing the efficiency of the delivery of healthcare services through the use of modern technology is a pressing issue. The seamless integration of such enabling technologies as ontology, intelligent agents, web services, and cloud computing is transforming healthcare from hospital-based treatments to home-based self-care and preventive care. A ubiquitous healthcare platform based on this technological integration, which synergizes service providers with patients' needs to be developed to provide personalized healthcare services at the right time, in the right place, and the right manner. This paper presents the development and overall architecture of IAServ (the Intelligent Aging-in-place Home care Web Services Platform) to provide personalized healthcare service ubiquitously in a cloud computing setting to support the most desirable and cost-efficient method of care for the aged-aging in place. The IAServ is expected to offer intelligent, pervasive, accurate and contextually-aware personal care services. Architecturally the implemented IAServ leverages web services and cloud computing to provide economic, scalable, and robust healthcare services over the Internet.
IAServ: An Intelligent Home Care Web Services Platform in a Cloud for Aging-in-Place
Su, Chuan-Jun; Chiang, Chang-Yu
2013-01-01
As the elderly population has been rapidly expanding and the core tax-paying population has been shrinking, the need for adequate elderly health and housing services continues to grow while the resources to provide such services are becoming increasingly scarce. Thus, increasing the efficiency of the delivery of healthcare services through the use of modern technology is a pressing issue. The seamless integration of such enabling technologies as ontology, intelligent agents, web services, and cloud computing is transforming healthcare from hospital-based treatments to home-based self-care and preventive care. A ubiquitous healthcare platform based on this technological integration, which synergizes service providers with patients’ needs to be developed to provide personalized healthcare services at the right time, in the right place, and the right manner. This paper presents the development and overall architecture of IAServ (the Intelligent Aging-in-place Home care Web Services Platform) to provide personalized healthcare service ubiquitously in a cloud computing setting to support the most desirable and cost-efficient method of care for the aged-aging in place. The IAServ is expected to offer intelligent, pervasive, accurate and contextually-aware personal care services. Architecturally the implemented IAServ leverages web services and cloud computing to provide economic, scalable, and robust healthcare services over the Internet. PMID:24225647
Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs.
Huang, Changqin; Ma, Ming; Liu, Xiao; Liu, Anfeng; Zuo, Zhengbang
2017-06-17
Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12-1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15-1.26 times the storage utilization efficiency compared with other schemes.
Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs
Huang, Changqin; Ma, Ming; Liu, Xiao; Liu, Anfeng; Zuo, Zhengbang
2017-01-01
Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12–1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15–1.26 times the storage utilization efficiency compared with other schemes. PMID:28629135
High-reliability computing for the smarter planet
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quinn, Heather M; Graham, Paul; Manuzzato, Andrea
2010-01-01
The geometric rate of improvement of transistor size and integrated circuit performance, known as Moore's Law, has been an engine of growth for our economy, enabling new products and services, creating new value and wealth, increasing safety, and removing menial tasks from our daily lives. Affordable, highly integrated components have enabled both life-saving technologies and rich entertainment applications. Anti-lock brakes, insulin monitors, and GPS-enabled emergency response systems save lives. Cell phones, internet appliances, virtual worlds, realistic video games, and mp3 players enrich our lives and connect us together. Over the past 40 years of silicon scaling, the increasing capabilities ofmore » inexpensive computation have transformed our society through automation and ubiquitous communications. In this paper, we will present the concept of the smarter planet, how reliability failures affect current systems, and methods that can be used to increase the reliable adoption of new automation in the future. We will illustrate these issues using a number of different electronic devices in a couple of different scenarios. Recently IBM has been presenting the idea of a 'smarter planet.' In smarter planet documents, IBM discusses increased computer automation of roadways, banking, healthcare, and infrastructure, as automation could create more efficient systems. A necessary component of the smarter planet concept is to ensure that these new systems have very high reliability. Even extremely rare reliability problems can easily escalate to problematic scenarios when implemented at very large scales. For life-critical systems, such as automobiles, infrastructure, medical implantables, and avionic systems, unmitigated failures could be dangerous. As more automation moves into these types of critical systems, reliability failures will need to be managed. As computer automation continues to increase in our society, the need for greater radiation reliability is necessary. Already critical infrastructure is failing too frequently. In this paper, we will introduce the Cross-Layer Reliability concept for designing more reliable computer systems.« less
Bruno Garza, J L; Young, J G
2015-01-01
Extended use of conventional computer input devices is associated with negative musculoskeletal outcomes. While many alternative designs have been proposed, it is unclear whether these devices reduce biomechanical loading and musculoskeletal outcomes. To review studies describing and evaluating the biomechanical loading and musculoskeletal outcomes associated with conventional and alternative input devices. Included studies evaluated biomechanical loading and/or musculoskeletal outcomes of users' distal or proximal upper extremity regions associated with the operation of alternative input devices (pointing devices, mice, other devices) that could be used in a desktop personal computing environment during typical office work. Some alternative pointing device designs (e.g. rollerbar) were consistently associated with decreased biomechanical loading while other designs had inconsistent results across studies. Most alternative keyboards evaluated in the literature reduce biomechanical loading and musculoskeletal outcomes. Studies of other input devices (e.g. touchscreen and gestural controls) were rare, however, those reported to date indicate that these devices are currently unsuitable as replacements for traditional devices. Alternative input devices that reduce biomechanical loading may make better choices for preventing or alleviating musculoskeletal outcomes during computer use, however, it is unclear whether many existing designs are effective.
Building Efficient Wireless Infrastructures for Pervasive Computing Environments
ERIC Educational Resources Information Center
Sheng, Bo
2010-01-01
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…
Architecture of a framework for providing information services for public transport.
García, Carmelo R; Pérez, Ricardo; Lorenzo, Alvaro; Quesada-Arencibia, Alexis; Alayón, Francisco; Padrón, Gabino
2012-01-01
This paper presents OnRoute, a framework for developing and running ubiquitous software that provides information services to passengers of public transportation, including payment systems and on-route guidance services. To achieve a high level of interoperability, accessibility and context awareness, OnRoute uses the ubiquitous computing paradigm. To guarantee the quality of the software produced, the reliable software principles used in critical contexts, such as automotive systems, are also considered by the framework. The main components of its architecture (run-time, system services, software components and development discipline) and how they are deployed in the transportation network (stations and vehicles) are described in this paper. Finally, to illustrate the use of OnRoute, the development of a guidance service for travellers is explained.
Towards Scalable Graph Computation on Mobile Devices.
Chen, Yiqi; Lin, Zhiyuan; Pienta, Robert; Kahng, Minsuk; Chau, Duen Horng
2014-10-01
Mobile devices have become increasingly central to our everyday activities, due to their portability, multi-touch capabilities, and ever-improving computational power. Such attractive features have spurred research interest in leveraging mobile devices for computation. We explore a novel approach that aims to use a single mobile device to perform scalable graph computation on large graphs that do not fit in the device's limited main memory, opening up the possibility of performing on-device analysis of large datasets, without relying on the cloud. Based on the familiar memory mapping capability provided by today's mobile operating systems, our approach to scale up computation is powerful and intentionally kept simple to maximize its applicability across the iOS and Android platforms. Our experiments demonstrate that an iPad mini can perform fast computation on large real graphs with as many as 272 million edges (Google+ social graph), at a speed that is only a few times slower than a 13″ Macbook Pro. Through creating a real world iOS app with this technique, we demonstrate the strong potential application for scalable graph computation on a single mobile device using our approach.
Towards Scalable Graph Computation on Mobile Devices
Chen, Yiqi; Lin, Zhiyuan; Pienta, Robert; Kahng, Minsuk; Chau, Duen Horng
2015-01-01
Mobile devices have become increasingly central to our everyday activities, due to their portability, multi-touch capabilities, and ever-improving computational power. Such attractive features have spurred research interest in leveraging mobile devices for computation. We explore a novel approach that aims to use a single mobile device to perform scalable graph computation on large graphs that do not fit in the device's limited main memory, opening up the possibility of performing on-device analysis of large datasets, without relying on the cloud. Based on the familiar memory mapping capability provided by today's mobile operating systems, our approach to scale up computation is powerful and intentionally kept simple to maximize its applicability across the iOS and Android platforms. Our experiments demonstrate that an iPad mini can perform fast computation on large real graphs with as many as 272 million edges (Google+ social graph), at a speed that is only a few times slower than a 13″ Macbook Pro. Through creating a real world iOS app with this technique, we demonstrate the strong potential application for scalable graph computation on a single mobile device using our approach. PMID:25859564
Bång, Magnus; Larsson, Anders; Eriksson, Henrik
2003-01-01
In this paper, we present a new approach to clinical workplace computerization that departs from the window-based user interface paradigm. NOSTOS is an experimental computer-augmented work environment designed to support data capture and teamwork in an emergency room. NOSTOS combines multiple technologies, such as digital pens, walk-up displays, headsets, a smart desk, and sensors to enhance an existing paper-based practice with computer power. The physical interfaces allow clinicians to retain mobile paper-based collaborative routines and still benefit from computer technology. The requirements for the system were elicited from situated workplace studies. We discuss the advantages and disadvantages of augmenting a paper-based clinical work environment.
Materials requirements for optical processing and computing devices
NASA Technical Reports Server (NTRS)
Tanguay, A. R., Jr.
1985-01-01
Devices for optical processing and computing systems are discussed, with emphasis on the materials requirements imposed by functional constraints. Generalized optical processing and computing systems are described in order to identify principal categories of requisite components for complete system implementation. Three principal device categories are selected for analysis in some detail: spatial light modulators, volume holographic optical elements, and bistable optical devices. The implications for optical processing and computing systems of the materials requirements identified for these device categories are described, and directions for future research are proposed.
Hwang, Jeonghwan; Yoe, Hyun
2010-01-01
Many hog farmers are now suffering from high pig mortality rates due to various wasting diseases and increased breeding costs, etc. It is therefore necessary for hog farms to implement systematic and scientific pig production technology to increase productivity and produce high quality pork in order to solve these problems. In this study, we describe such a technology by suggesting a ubiquitous hog farm system which applies WSN (Wireless Sensor Network) technology to the pig industry. We suggest that a WSN and CCTV (Closed-circuit television) should be installed on hog farms to collect environmental and image information which shall then help producers not only in monitoring the hog farm via the Web from outside the farm, but also facilitate the control of hog farm facilities in remote locations. In addition, facilities can be automatically controlled based on breeding environment parameters which are already set up and a SMS notice service to notify of deviations shall provide users with convenience. Hog farmers may increase production and improve pork quality through this ubiquitous hog farm system and prepare a database with information collected from environmental factors and the hog farm control devices, which is expected to provide information needed to design and implement suitable control strategies for hog farm operation.
Hwang, Jeonghwan; Yoe, Hyun
2010-01-01
Many hog farmers are now suffering from high pig mortality rates due to various wasting diseases and increased breeding costs, etc. It is therefore necessary for hog farms to implement systematic and scientific pig production technology to increase productivity and produce high quality pork in order to solve these problems. In this study, we describe such a technology by suggesting a ubiquitous hog farm system which applies WSN (Wireless Sensor Network) technology to the pig industry. We suggest that a WSN and CCTV (Closed-circuit television) should be installed on hog farms to collect environmental and image information which shall then help producers not only in monitoring the hog farm via the Web from outside the farm, but also facilitate the control of hog farm facilities in remote locations. In addition, facilities can be automatically controlled based on breeding environment parameters which are already set up and a SMS notice service to notify of deviations shall provide users with convenience. Hog farmers may increase production and improve pork quality through this ubiquitous hog farm system and prepare a database with information collected from environmental factors and the hog farm control devices, which is expected to provide information needed to design and implement suitable control strategies for hog farm operation. PMID:22163497
A Review of Models and Frameworks for Designing Mobile Learning Experiences and Environments
ERIC Educational Resources Information Center
Hsu, Yu-Chang; Ching, Yu-Hui
2015-01-01
Mobile learning has become increasingly popular in the past decade due to the unprecedented technological affordances achieved through the advancement of mobile computing, which makes ubiquitous and situated learning possible. At the same time, there have been research and implementation projects whose efforts centered on developing mobile…
Educational Technology on Demand: It's about Time!
ERIC Educational Resources Information Center
Weir, Bob; Mickool, Rick; Hitch, Leslie
2006-01-01
Today's incoming freshmen, born in 1988, have never known a time when the Internet and personal computers were not ubiquitous. They expect "what I want, when I need it, wherever I happen to be, on whatever workstation I have available." Many industries already meet this demand--entertainment (legal or pirated), cable TV, digital video recorders,…
A Case Study in CAD Design Automation
ERIC Educational Resources Information Center
Lowe, Andrew G.; Hartman, Nathan W.
2011-01-01
Computer-aided design (CAD) software and other product life-cycle management (PLM) tools have become ubiquitous in industry during the past 20 years. Over this time they have continuously evolved, becoming programs with enormous capabilities, but the companies that use them have not evolved their design practices at the same rate. Due to the…
Risky Business or Sharing the Load?--Social Flow in Collaborative Mobile Learning
ERIC Educational Resources Information Center
Ryu, Hokyoung; Parsons, David
2012-01-01
Mobile learning has been built upon the premise that we can transform traditional classroom or computer-based learning activities into a more ubiquitous and connected form of learning. Tentative outcomes from this assertion have been witnessed in many collaborative learning activities, but few analytic observations on what triggers this…
ERIC Educational Resources Information Center
Caceffo, Ricardo; Azevedo, Rodolfo
2014-01-01
The constructivist theory indicates that knowledge is not something finished and complete. However, the individuals must construct it through the interaction with the physical and social environment. The Active Learning is a methodology designed to support the constructivism through the involvement of students in their learning process, allowing…
Tablet Computer Literacy Levels of the Physical Education and Sports Department Students
ERIC Educational Resources Information Center
Hergüner, Gülten
2016-01-01
Education systems are being affected in parallel by newly emerging hardware and new developments occurring in technology daily. Tablet usage especially is becoming ubiquitous in the teaching-learning processes in recent years. Therefore, using the tablets effectively, managing them and having a high level of tablet literacy play an important role…
ERIC Educational Resources Information Center
Sevilla-Pavón, Ana
2015-01-01
The internationalisation of the Portuguese language has become a priority for academic institutions of different Portuguese-speaking countries which are trying to adapt to the current context of globalisation and ubiquitous communications through digital media. In order to achieve it, several challenges should be faced, namely providing…
Macro or Micro: Teaching Fifth-Grade Economics Using Handheld Computers
ERIC Educational Resources Information Center
van't Hooft, Mark; Kelly, Jan
2004-01-01
Imagine a classroom where students beam their assignments to the teacher instead of handing them in. Imagine a classroom where technology is ubiquitous yet nearly invisible. Imagine a classroom where all students simultaneously work together using technology. This is the reality for students in the fifth grade classroom of Jan Kelly, an elementary…
Integration of Wireless Technologies in Smart University Campus Environment: Framework Architecture
ERIC Educational Resources Information Center
Khamayseh, Yaser; Mardini, Wail; Aljawarneh, Shadi; Yassein, Muneer Bani
2015-01-01
In this paper, the authors are particularly interested in enhancing the education process by integrating new tools to the teaching environments. This enhancement is part of an emerging concept, called smart campus. Smart University Campus will come up with a new ubiquitous computing and communication field and change people's lives radically by…
Ubiquitous Presenter: A Tablet PC-Based System to Support Instructors and Students
ERIC Educational Resources Information Center
Price, Edward; Simon, Beth
2009-01-01
Digital lecturing systems (computer and projector, often with PowerPoint) offer physics instructors the ability to incorporate graphics and the power to share and reuse materials. But these systems do a poor job of supporting interaction in the classroom. For instance, with digital presentation systems, instructors have limited ability to…
ERIC Educational Resources Information Center
Balestrini, Mara; Hernandez-Leo, Davinia; Nieves, Raul; Blat, Josep
2014-01-01
Under the umbrella of ubiquitous technologies, many computational artifacts have been designed to enhance the learning experience in physical settings such as classrooms or playgrounds, but few of them focus on aiding orchestration. This paper presents a systematic evaluation of the signal orchestration system (SOS) used by students for a jigsaw…
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.
Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne
2017-05-01
Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things
Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne
2017-01-01
Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons. PMID:28468313
Chi, Chia-Fen; Tseng, Li-Kai; Jang, Yuh
2012-07-01
Many disabled individuals lack extensive knowledge about assistive technology, which could help them use computers. In 1997, Denis Anson developed a decision tree of 49 evaluative questions designed to evaluate the functional capabilities of the disabled user and choose an appropriate combination of assistive devices, from a selection of 26, that enable the individual to use a computer. In general, occupational therapists guide the disabled users through this process. They often have to go over repetitive questions in order to find an appropriate device. A disabled user may require an alphanumeric entry device, a pointing device, an output device, a performance enhancement device, or some combination of these. Therefore, the current research eliminates redundant questions and divides Anson's decision tree into multiple independent subtrees to meet the actual demand of computer users with disabilities. The modified decision tree was tested by six disabled users to prove it can determine a complete set of assistive devices with a smaller number of evaluative questions. The means to insert new categories of computer-related assistive devices was included to ensure the decision tree can be expanded and updated. The current decision tree can help the disabled users and assistive technology practitioners to find appropriate computer-related assistive devices that meet with clients' individual needs in an efficient manner.
Klonoff, David C
2017-07-01
The Internet of Things (IoT) is generating an immense volume of data. With cloud computing, medical sensor and actuator data can be stored and analyzed remotely by distributed servers. The results can then be delivered via the Internet. The number of devices in IoT includes such wireless diabetes devices as blood glucose monitors, continuous glucose monitors, insulin pens, insulin pumps, and closed-loop systems. The cloud model for data storage and analysis is increasingly unable to process the data avalanche, and processing is being pushed out to the edge of the network closer to where the data-generating devices are. Fog computing and edge computing are two architectures for data handling that can offload data from the cloud, process it nearby the patient, and transmit information machine-to-machine or machine-to-human in milliseconds or seconds. Sensor data can be processed near the sensing and actuating devices with fog computing (with local nodes) and with edge computing (within the sensing devices). Compared to cloud computing, fog computing and edge computing offer five advantages: (1) greater data transmission speed, (2) less dependence on limited bandwidths, (3) greater privacy and security, (4) greater control over data generated in foreign countries where laws may limit use or permit unwanted governmental access, and (5) lower costs because more sensor-derived data are used locally and less data are transmitted remotely. Connected diabetes devices almost all use fog computing or edge computing because diabetes patients require a very rapid response to sensor input and cannot tolerate delays for cloud computing.
Teaching and Learning with Mobile Computing Devices: Case Study in K-12 Classrooms
ERIC Educational Resources Information Center
Grant, Michael M.; Tamim, Suha; Brown, Dorian B.; Sweeney, Joseph P.; Ferguson, Fatima K.; Jones, Lakavious B.
2015-01-01
While ownership of mobile computing devices, such as cellphones, smartphones, and tablet computers, has been rapid, the adoption of these devices in K-12 classrooms has been measured. Some schools and individual teachers have integrated mobile devices to support teaching and learning. The purpose of this qualitative research was to describe the…
On Emulation of Flueric Devices in Excitable Chemical Medium
Adamatzky, Andrew
2016-01-01
Flueric devices are fluidic devices without moving parts. Fluidic devices use fluid as a medium for information transfer and computation. A Belousov-Zhabotinsky (BZ) medium is a thin-layer spatially extended excitable chemical medium which exhibits travelling excitation wave-fronts. The excitation wave-fronts transfer information. Flueric devices compute via jets interaction. BZ devices compute via excitation wave-fronts interaction. In numerical model of BZ medium we show that functions of key flueric devices are implemented in the excitable chemical system: signal generator, and, xor, not and nor Boolean gates, delay elements, diodes and sensors. Flueric devices have been widely used in industry since late 1960s and are still employed in automotive and aircraft technologies. Implementation of analog of the flueric devices in the excitable chemical systems opens doors to further applications of excitation wave-based unconventional computing in soft robotics, embedded organic electronics and living technologies. PMID:27997561
On Emulation of Flueric Devices in Excitable Chemical Medium.
Adamatzky, Andrew
2016-01-01
Flueric devices are fluidic devices without moving parts. Fluidic devices use fluid as a medium for information transfer and computation. A Belousov-Zhabotinsky (BZ) medium is a thin-layer spatially extended excitable chemical medium which exhibits travelling excitation wave-fronts. The excitation wave-fronts transfer information. Flueric devices compute via jets interaction. BZ devices compute via excitation wave-fronts interaction. In numerical model of BZ medium we show that functions of key flueric devices are implemented in the excitable chemical system: signal generator, and, xor, not and nor Boolean gates, delay elements, diodes and sensors. Flueric devices have been widely used in industry since late 1960s and are still employed in automotive and aircraft technologies. Implementation of analog of the flueric devices in the excitable chemical systems opens doors to further applications of excitation wave-based unconventional computing in soft robotics, embedded organic electronics and living technologies.
Computational and experimental studies of LEBUs at high device Reynolds numbers
NASA Technical Reports Server (NTRS)
Bertelrud, Arild; Watson, R. D.
1988-01-01
The present paper summarizes computational and experimental studies for large-eddy breakup devices (LEBUs). LEBU optimization (using a computational approach considering compressibility, Reynolds number, and the unsteadiness of the flow) and experiments with LEBUs at high Reynolds numbers in flight are discussed. The measurements include streamwise as well as spanwise distributions of local skin friction. The unsteady flows around the LEBU devices and far downstream are characterized by strain-gage measurements on the devices and hot-wire readings downstream. Computations are made with available time-averaged and quasi-stationary techniques to find suitable device profiles with minimum drag.
NASA Technical Reports Server (NTRS)
Hall, William A. (Inventor)
1993-01-01
A bus programmable slave module card for use in a computer control system is disclosed which comprises a master computer and one or more slave computer modules interfacing by means of a bus. Each slave module includes its own microprocessor, memory, and control program for acting as a single loop controller. The slave card includes a plurality of memory means (S1, S2...) corresponding to a like plurality of memory devices (C1, C2...) in the master computer, for each slave memory means its own communication lines connectable through the bus with memory communication lines of an associated memory device in the master computer, and a one-way electronic door which is switchable to either a closed condition or a one-way open condition. With the door closed, communication lines between master computer memory (C1, C2...) and slave memory (S1, S2...) are blocked. In the one-way open condition invention, the memory communication lines or each slave memory means (S1, S2...) connect with the memory communication lines of its associated memory device (C1, C2...) in the master computer, and the memory devices (C1, C2...) of the master computer and slave card are electrically parallel such that information seen by the master's memory is also seen by the slave's memory. The slave card is also connectable to a switch for electronically removing the slave microprocessor from the system. With the master computer and the slave card in programming mode relationship, and the slave microprocessor electronically removed from the system, loading a program in the memory devices (C1, C2...) of the master accomplishes a parallel loading into the memory devices (S1, S2...) of the slave.
UBioLab: a web-LABoratory for Ubiquitous in-silico experiments.
Bartocci, E; Di Berardini, M R; Merelli, E; Vito, L
2012-03-01
The huge and dynamic amount of bioinformatic resources (e.g., data and tools) available nowadays in Internet represents a big challenge for biologists -for what concerns their management and visualization- and for bioinformaticians -for what concerns the possibility of rapidly creating and executing in-silico experiments involving resources and activities spread over the WWW hyperspace. Any framework aiming at integrating such resources as in a physical laboratory has imperatively to tackle -and possibly to handle in a transparent and uniform way- aspects concerning physical distribution, semantic heterogeneity, co-existence of different computational paradigms and, as a consequence, of different invocation interfaces (i.e., OGSA for Grid nodes, SOAP for Web Services, Java RMI for Java objects, etc.). The framework UBioLab has been just designed and developed as a prototype following the above objective. Several architectural features -as those ones of being fully Web-based and of combining domain ontologies, Semantic Web and workflow techniques- give evidence of an effort in such a direction. The integration of a semantic knowledge management system for distributed (bioinformatic) resources, a semantic-driven graphic environment for defining and monitoring ubiquitous workflows and an intelligent agent-based technology for their distributed execution allows UBioLab to be a semantic guide for bioinformaticians and biologists providing (i) a flexible environment for visualizing, organizing and inferring any (semantics and computational) "type" of domain knowledge (e.g., resources and activities, expressed in a declarative form), (ii) a powerful engine for defining and storing semantic-driven ubiquitous in-silico experiments on the domain hyperspace, as well as (iii) a transparent, automatic and distributed environment for correct experiment executions.
Angelcare mobile system: homecare patient monitoring using bluetooth and GPRS.
Ribeiro, Anna G D; Maitelli, Andre L; Valentim, Ricardo A M; Brandao, Glaucio B; Guerreiro, Ana M G
2010-01-01
The quick progress in technology has brought new paradigms to the computing area, bringing with them many benefits to society. The paradigm of ubiquitous computing brings innovations applying computing in people's daily life without being noticed. For this, it has used the combination of several existing technologies like wireless communications and sensors. Several of the benefits have reached the medical area, bringing new methods of surgery, appointments and examinations. This work presents telemedicine software that adds the idea of ubiquity to the medical area, innovating the relation between doctor and patient. It also brings security and confidence to a patient being monitored in homecare.
Patterns of mobile device use by caregivers and children during meals in fast food restaurants.
Radesky, Jenny S; Kistin, Caroline J; Zuckerman, Barry; Nitzberg, Katie; Gross, Jamie; Kaplan-Sanoff, Margot; Augustyn, Marilyn; Silverstein, Michael
2014-04-01
Mobile devices are a ubiquitous part of American life, yet how families use this technology has not been studied. We aimed to describe naturalistic patterns of mobile device use by caregivers and children to generate hypotheses about its effects on caregiver-child interaction. Using nonparticipant observational methods, we observed 55 caregivers eating with 1 or more young children in fast food restaurants in a single metropolitan area. Observers wrote detailed field notes, continuously describing all aspects of mobile device use and child and caregiver behavior during the meal. Field notes were then subjected to qualitative analysis using grounded theory methods to identify common themes of device use. Forty caregivers used devices during their meal. The dominant theme salient to mobile device use and caregiver-child interaction was the degree of absorption in devices caregivers exhibited. Absorption was conceptualized as the extent to which primary engagement was with the device, rather than the child, and was determined by frequency, duration, and modality of device use; child response to caregiver use, which ranged from entertaining themselves to escalating bids for attention, and how caregivers managed this behavior; and separate versus shared use of devices. Highly absorbed caregivers often responded harshly to child misbehavior. We documented a range of patterns of mobile device use, characterized by varying degrees of absorption. These themes may be used as a foundation for coding schemes in quantitative studies exploring device use and child outcomes.
Manycore Performance-Portability: Kokkos Multidimensional Array Library
Edwards, H. Carter; Sunderland, Daniel; Porter, Vicki; ...
2012-01-01
Large, complex scientific and engineering application code have a significant investment in computational kernels to implement their mathematical models. Porting these computational kernels to the collection of modern manycore accelerator devices is a major challenge in that these devices have diverse programming models, application programming interfaces (APIs), and performance requirements. The Kokkos Array programming model provides library-based approach to implement computational kernels that are performance-portable to CPU-multicore and GPGPU accelerator devices. This programming model is based upon three fundamental concepts: (1) manycore compute devices each with its own memory space, (2) data parallel kernels and (3) multidimensional arrays. Kernel executionmore » performance is, especially for NVIDIA® devices, extremely dependent on data access patterns. Optimal data access pattern can be different for different manycore devices – potentially leading to different implementations of computational kernels specialized for different devices. The Kokkos Array programming model supports performance-portable kernels by (1) separating data access patterns from computational kernels through a multidimensional array API and (2) introduce device-specific data access mappings when a kernel is compiled. An implementation of Kokkos Array is available through Trilinos [Trilinos website, http://trilinos.sandia.gov/, August 2011].« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-04
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-769] Certain Handheld Electronic Computing Devices, Related Software, and Components Thereof; Termination of the Investigation Based on... electronic computing devices, related software, and components thereof by reason of infringement of certain...
Charge pumping with finger capacitance for body sensor energy harvesting.
Zhou, Alyssa Y; Maharbiz, Michel M
2017-07-01
Sensors are becoming ubiquitous and increasingly integrated with and on the human body; powering such "body network" devices remains an outstanding problem. In this paper, we demonstrate a touch interrogation powered energy harvesting system. This system transforms the kinetic energy of a human finger to electric energy, with each tap producing approximately 1 nJ of energy at a storage capacitor. As is well known for touch display devices, the proximity of a finger can alter the effective value of small capacitances; we demonstrate that these capacitance changes can drive a current which is rectified to charge a capacitor. As a demonstration, an untethered circuit charged this way can deliver enough instantaneous power to light a red LED every ~ 10 seconds. This technology illustrates the ability to communicate with and operate low-power sensors with motions already used for interfacing to devices.
Prado-Velasco, Manuel; del Rio-Cidoncha, Maria Gloria; Ortiz-Marin, Rafael
2008-01-01
Despite the intense research in the last decade with the aim of developing a reliable solution for fall detection in the elderly and other risk populations, it can be asserted that the diffusion of fall detectors in the geriatric practice is near null. This scenario is similar to the very scarce use of telemedicine in healthcare. The present work begins analyzing why fall detectors have not achieved to permeate the industry. That road is used to know the drawbacks of current devices and systems, besides to allow studying several important concepts underlying the principles of fall detection. A novel smart detection system based on that survey is finally briefly presented. The design of this device is founded on the experience and results obtained by an earlier device that was designed in the framework of the thesis of one of the authors.
Energy efficient hybrid computing systems using spin devices
NASA Astrophysics Data System (ADS)
Sharad, Mrigank
Emerging spin-devices like magnetic tunnel junctions (MTJ's), spin-valves and domain wall magnets (DWM) have opened new avenues for spin-based logic design. This work explored potential computing applications which can exploit such devices for higher energy-efficiency and performance. The proposed applications involve hybrid design schemes, where charge-based devices supplement the spin-devices, to gain large benefits at the system level. As an example, lateral spin valves (LSV) involve switching of nanomagnets using spin-polarized current injection through a metallic channel such as Cu. Such spin-torque based devices possess several interesting properties that can be exploited for ultra-low power computation. Analog characteristic of spin current facilitate non-Boolean computation like majority evaluation that can be used to model a neuron. The magneto-metallic neurons can operate at ultra-low terminal voltage of ˜20mV, thereby resulting in small computation power. Moreover, since nano-magnets inherently act as memory elements, these devices can facilitate integration of logic and memory in interesting ways. The spin based neurons can be integrated with CMOS and other emerging devices leading to different classes of neuromorphic/non-Von-Neumann architectures. The spin-based designs involve `mixed-mode' processing and hence can provide very compact and ultra-low energy solutions for complex computation blocks, both digital as well as analog. Such low-power, hybrid designs can be suitable for various data processing applications like cognitive computing, associative memory, and currentmode on-chip global interconnects. Simulation results for these applications based on device-circuit co-simulation framework predict more than ˜100x improvement in computation energy as compared to state of the art CMOS design, for optimal spin-device parameters.
Detection of essential hypertension with physiological signals from wearable devices.
Ghosh, Arindam; Torres, Juan Manuel Mayor; Danieli, Morena; Riccardi, Giuseppe
2015-08-01
Early detection of essential hypertension can support the prevention of cardiovascular disease, a leading cause of death. The traditional method of identification of hypertension involves periodic blood pressure measurement using brachial cuff-based measurement devices. While these devices are non-invasive, they require manual setup for each measurement and they are not suitable for continuous monitoring. Research has shown that physiological signals such as Heart Rate Variability, which is a measure of the cardiac autonomic activity, is correlated with blood pressure. Wearable devices capable of measuring physiological signals such as Heart Rate, Galvanic Skin Response, Skin Temperature have recently become ubiquitous. However, these signals are not accurate and are prone to noise due to different artifacts. In this paper a) we present a data collection protocol for continuous non-invasive monitoring of physiological signals from wearable devices; b) we implement signal processing techniques for signal estimation; c) we explore how the continuous monitoring of these physiological signals can be used to identify hypertensive patients; d) We conduct a pilot study with a group of normotensive and hypertensive patients to test our techniques. We show that physiological signals extracted from wearable devices can distinguish between these two groups with high accuracy.
Nguyen, Minh X; Krishnan, Aparna; Le, Giang M; Nguyen, Quynh T; Bhadra, Nia M; Nguyen, Sang M; Miller, William C; Go, Vivian F
2018-04-01
In an era where mobile phones and computers are ubiquitous, technology-based interventions to reduce HIV and other sexually transmitted infections (STIs) have great potential to reach high-risk groups, including men who have sex with men (MSM). This study aimed to examine technology usage to find sexual health information online among MSM in Hanoi, Vietnam. A cross-sectional study of 205 MSM in Hanoi was conducted from February to May 2016. Overall, 50.7% of participants reported having used a smartphone, computer, or tablet to find HIV/STI testing locations in the past year, and 75.1% reported having used such devices to find other HIV/STI information online. Unemployment (adjusted prevalence ratio [aPR]: 1.13, 95%CI: 1.00-1.28) and having been tested for HIV (aPR: 1.27, 95%CI: 1.07-1.51) were significantly associated with using technology to find online sexual health information. MSM who had ever exchanged sex for money or drugs (aPR: 0.80; 95%CI: 0.68-0.94) were less likely to use technology to find sexual health information online. Technology is a promising platform for HIV/STI prevention programs among MSM, with the potential to reach different subgroups. Further efforts to develop technology-based interventions tailored to the needs of the MSM communities in Hanoi and to encourage MSM who were not currently seeking sexual health information and testing services online to do so are necessary.
Wearable Sensors Integrated with Internet of Things for Advancing eHealth Care.
Bayo-Monton, Jose-Luis; Martinez-Millana, Antonio; Han, Weisi; Fernandez-Llatas, Carlos; Sun, Yan; Traver, Vicente
2018-06-06
Health and sociological indicators alert that life expectancy is increasing, hence so are the years that patients have to live with chronic diseases and co-morbidities. With the advancement in ICT, new tools and paradigms are been explored to provide effective and efficient health care. Telemedicine and health sensors stand as indispensable tools for promoting patient engagement, self-management of diseases and assist doctors to remotely follow up patients. In this paper, we evaluate a rapid prototyping solution for information merging based on five health sensors and two low-cost ubiquitous computing components: Arduino and Raspberry Pi. Our study, which is entirely described with the purpose of reproducibility, aimed to evaluate the extent to which portable technologies are capable of integrating wearable sensors by comparing two deployment scenarios: Raspberry Pi 3 and Personal Computer. The integration is implemented using a choreography engine to transmit data from sensors to a display unit using web services and a simple communication protocol with two modes of data retrieval. Performance of the two set-ups is compared by means of the latency in the wearable data transmission and data loss. PC has a delay of 0.051 ± 0.0035 s (max = 0.2504 s), whereas the Raspberry Pi yields a delay of 0.0175 ± 0.149 s (max = 0.294 s) for N = 300. Our analysis confirms that portable devices ( p < < 0 . 01 ) are suitable to support the transmission and analysis of biometric signals into scalable telemedicine systems.
Investment and repayment in a trust game after ventromedial prefrontal damage.
Moretto, Giovanna; Sellitto, Manuela; di Pellegrino, Giuseppe
2013-01-01
Although trust and reciprocity are ubiquitous in social exchange, their neurobiological substrate remains largely unknown. Here, we investigated the effect of damage to the ventromedial prefrontal cortex (vmPFC)-a brain region critical for valuing social information-on individuals' decisions in a trust game and in a risk game. In the trust game, one player, the investor, is endowed with a sum of money, which she can keep or invest. The amount she decides to invest is tripled and sent to the other player, the trustee, who then decides what fraction to return to the investor. In separate runs, ten patients with focal bilateral damage to the vmPFC and control participants made decision while playing in the role of either investor or trustee with different anonymous counterparts in each run. A risk game was also included in which the investor faced exactly the same decisions as in the trust game, but a random device (i.e., a computer), not another player, determined the final payoffs. Results showed that vmPFC patients' investments were not modulated by the type of opponent player (e.g., human vs. computer) present in the environment. Thus, vmPFC patients showed comparable risk-taking preferences both in social (trust game) and nonsocial (risk game) contexts. In stark contrast, control participants were less willing to take risk and invest when they believed that they were interacting with people than a computer. Furthermore, when acted as trustee, vmPFC patients made lower back transfers toward investors, thereby showing less reciprocity behavior. Taken together, these results indicate that social valuation and emotion subserved by vmPFC have a critical role in trusting and reciprocity decisions. The present findings support the hypothesis that vmPFC damage may impair affective systems specifically designed for mediating social transaction with other individuals.
Emergency navigation without an infrastructure.
Gelenbe, Erol; Bi, Huibo
2014-08-18
Emergency navigation systems for buildings and other built environments, such as sport arenas or shopping centres, typically rely on simple sensor networks to detect emergencies and, then, provide automatic signs to direct the evacuees. The major drawbacks of such static wireless sensor network (WSN)-based emergency navigation systems are the very limited computing capacity, which makes adaptivity very difficult, and the restricted battery power, due to the low cost of sensor nodes for unattended operation. If static wireless sensor networks and cloud-computing can be integrated, then intensive computations that are needed to determine optimal evacuation routes in the presence of time-varying hazards can be offloaded to the cloud, but the disadvantages of limited battery life-time at the client side, as well as the high likelihood of system malfunction during an emergency still remain. By making use of the powerful sensing ability of smart phones, which are increasingly ubiquitous, this paper presents a cloud-enabled indoor emergency navigation framework to direct evacuees in a coordinated fashion and to improve the reliability and resilience for both communication and localization. By combining social potential fields (SPF) and a cognitive packet network (CPN)-based algorithm, evacuees are guided to exits in dynamic loose clusters. Rather than relying on a conventional telecommunications infrastructure, we suggest an ad hoc cognitive packet network (AHCPN)-based protocol to adaptively search optimal communication routes between portable devices and the network egress nodes that provide access to cloud servers, in a manner that spares the remaining battery power of smart phones and minimizes the time latency. Experimental results through detailed simulations indicate that smart human motion and smart network management can increase the survival rate of evacuees and reduce the number of drained smart phones in an evacuation process.
Emergency Navigation without an Infrastructure
Gelenbe, Erol; Bi, Huibo
2014-01-01
Emergency navigation systems for buildings and other built environments, such as sport arenas or shopping centres, typically rely on simple sensor networks to detect emergencies and, then, provide automatic signs to direct the evacuees. The major drawbacks of such static wireless sensor network (WSN)-based emergency navigation systems are the very limited computing capacity, which makes adaptivity very difficult, and the restricted battery power, due to the low cost of sensor nodes for unattended operation. If static wireless sensor networks and cloud-computing can be integrated, then intensive computations that are needed to determine optimal evacuation routes in the presence of time-varying hazards can be offloaded to the cloud, but the disadvantages of limited battery life-time at the client side, as well as the high likelihood of system malfunction during an emergency still remain. By making use of the powerful sensing ability of smart phones, which are increasingly ubiquitous, this paper presents a cloud-enabled indoor emergency navigation framework to direct evacuees in a coordinated fashion and to improve the reliability and resilience for both communication and localization. By combining social potential fields (SPF) and a cognitive packet network (CPN)-based algorithm, evacuees are guided to exits in dynamic loose clusters. Rather than relying on a conventional telecommunications infrastructure, we suggest an ad hoc cognitive packet network (AHCPN)-based protocol to adaptively search optimal communication routes between portable devices and the network egress nodes that provide access to cloud servers, in a manner that spares the remaining battery power of smart phones and minimizes the time latency. Experimental results through detailed simulations indicate that smart human motion and smart network management can increase the survival rate of evacuees and reduce the number of drained smart phones in an evacuation process. PMID:25196014
NASA Astrophysics Data System (ADS)
Shakur, Asif; Sinatra, Taylor
2013-12-01
The gyroscope in a smartphone was employed in a physics laboratory setting to verify the conservation of angular momentum and the nonconservation of rotational kinetic energy. As is well-known, smartphones are ubiquitous on college campuses. These devices have a panoply of built-in sensors. This creates a unique opportunity for a new paradigm in the physics laboratory. Many traditional physics experiments can now be performed very conveniently in a pedagogically enlightening environment while simultaneously reducing the laboratory budget substantially by using student-owned smartphones.
Chen, Chih-Yuan; Chang, Chia-Lin; Chang, Chih-Wei; Lai, Shin-Chi; Chien, Tsung-Fu; Huang, Hong-Yi; Chiou, Jin-Chern; Luo, Ching-Hsing
2013-01-01
This work describes a bio-potential acquisition system for portable ubiquitous healthcare applications using flexible polydimethylsiloxane dry electrodes (FPDEs) and a low-power recording circuit. This novel FPDE used Au as the skin contact layer, which was made using a CO2 laser and replica method technology. The FPDE was revised from a commercial bio-potential electrode with a conductive snap using dry electrodes rather than wet electrodes that proposed reliable and robust attachment for the purpose of measurement, and attaching velcro made it wearable on the forearm for bio-potential applications. Furthermore, this study proposes a recording device to store bio-potential signal data and provides portability and low-power consumption for the proposed acquisition system. To acquire differential bio-potentials, such as electrocardiogram (ECG) signals, the proposed recording device includes a low-power front-end acquisition chip fabricated using a complementary metal-oxide-semiconductor (CMOS) process, a commercial microcontroller (MSP430F149), and a secure digital (SD) card for portable healthcare applications. The proposed system can obtain ECG signals efficiently and are comfortable to the skin. The power consumption of the system is about 85 mW for continuous working over a 3 day period with two AA batteries. It can also be used as a compact Holter ECG system. PMID:23459390
Turn on the lights: leveraging visible light for communications and positioning
NASA Astrophysics Data System (ADS)
Hranilovic, Steve
2015-01-01
The need for ubiquitous broadband connectivity is continually growing, however, radio spectrum is increasingly scarce and limited by interference. In addition, the energy efficiency of many radio transmitters is low and most input energy is converted to heat. A widely overlooked resource for positioning and broadband access is optical wireless communication reusing existing illumination installations. As many of the 14 billion incandescent bulbs in use worldwide are converted to energy efficient LED lighting, a unique opportunity exists to augment them with visible light communications (VLC) and visible light positioning (VLP). VLC- and VLP- enabled LED lighting is not only energy efficient but enables a host of new use cases such as location-aware ubiquitous high-speed wireless communication links. This talk presents the recent work of the Free-space Optical Communication Algorithms Laboratory (FOCAL) at McMaster University in Hamilton, Canada in developing novel signaling and indoor localization techniques using illumination devices. Developments in the signaling design for VLC systems will be presented along with several prototype VLC communication systems. Novel approaches to the integration of VLC networks with power line communications (PLC) are discussed. The role of visible light communications and ranging for automotive safety will also be highlighted. Several approaches to indoor positioning using illumination devices and simple smartphone-based receivers will be presented. Finally, a vision for VLC and VLP technologies will be presented along with our ongoing research directions.
Energy-efficient privacy protection for smart home environments using behavioral semantics.
Park, Homin; Basaran, Can; Park, Taejoon; Son, Sang Hyuk
2014-09-02
Research on smart environments saturated with ubiquitous computing devices is rapidly advancing while raising serious privacy issues. According to recent studies, privacy concerns significantly hinder widespread adoption of smart home technologies. Previous work has shown that it is possible to infer the activities of daily living within environments equipped with wireless sensors by monitoring radio fingerprints and traffic patterns. Since data encryption cannot prevent privacy invasions exploiting transmission pattern analysis and statistical inference, various methods based on fake data generation for concealing traffic patterns have been studied. In this paper, we describe an energy-efficient, light-weight, low-latency algorithm for creating dummy activities that are semantically similar to the observed phenomena. By using these cloaking activities, the amount of fake data transmissions can be flexibly controlled to support a trade-off between energy efficiency and privacy protection. According to the experiments using real data collected from a smart home environment, our proposed method can extend the lifetime of the network by more than 2× compared to the previous methods in the literature. Furthermore, the activity cloaking method supports low latency transmission of real data while also significantly reducing the accuracy of the wireless snooping attacks.
Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics
Park, Homin; Basaran, Can; Park, Taejoon; Son, Sang Hyuk
2014-01-01
Research on smart environments saturated with ubiquitous computing devices is rapidly advancing while raising serious privacy issues. According to recent studies, privacy concerns significantly hinder widespread adoption of smart home technologies. Previous work has shown that it is possible to infer the activities of daily living within environments equipped with wireless sensors by monitoring radio fingerprints and traffic patterns. Since data encryption cannot prevent privacy invasions exploiting transmission pattern analysis and statistical inference, various methods based on fake data generation for concealing traffic patterns have been studied. In this paper, we describe an energy-efficient, light-weight, low-latency algorithm for creating dummy activities that are semantically similar to the observed phenomena. By using these cloaking activities, the amount of fake data transmissions can be flexibly controlled to support a trade-off between energy efficiency and privacy protection. According to the experiments using real data collected from a smart home environment, our proposed method can extend the lifetime of the network by more than 2× compared to the previous methods in the literature. Furthermore, the activity cloaking method supports low latency transmission of real data while also significantly reducing the accuracy of the wireless snooping attacks. PMID:25184489
Modeling and measuring non-Newtonian shear flows of soft interfaces
NASA Astrophysics Data System (ADS)
Lopez, Juan; Raghunandan, Aditya; Underhill, Patrick; Hirsa, Amir
2017-11-01
Soft interfaces of polymers, particles, and proteins between fluid phases are ubiquitous in industrial and natural processes. The flow response of such systems to deformation is often not linear, as one would expect for Newtonian interfaces. The resistance to (pure shear) flow of interfaces is generally characterized by a single intrinsic material property, the surface shear viscosity. Predicted shear responses of Newtonian interfaces have achieved consensus across a wide range of flow conditions and measurement devices, when the nonlinear hydrodynamic coupling to the bulk phase is correctly accounted for. However, predicting the flows of sheared non-Newtonian interfaces remains a challenge. Here, we introduce a computational model that incorporates a non-Newtonian constitutive equation for the sheared interface and properly accounts for the coupled interfacial and bulk phase flows. We compare predictions to experiments performed with a model phospholipid system, DPPC - the main constituent of mammalian lung surfactant. Densely packed films of DPPC are directly sheared in a knife-edge surface viscometer. Yield-stress and shear thinning behaviors are shown to be accurately captured across hydrodynamic regimes straddling the Stokes flow limit to inertia dominated flows. Supported by NASA Grant NNX13AQ22G.
Dividing at an Early Age: The Hidden Digital Divide in Ohio Elementary Schools
ERIC Educational Resources Information Center
Wood, Lawrence; Howley, Aimee
2012-01-01
Computers are now a ubiquitous part of US elementary school education. With policy reports suggesting that inequities in information and communication technology (ICT) access across US schools are a thing of the past, investigating how such resources and their use may nonetheless continue to vary becomes all that much more important. Through a…