共查询到20条相似文献,搜索用时 15 毫秒
1.
主要就普适计算下无边界网络系统的可生存性问题进行分析,然后介绍了可生存系统设计的两种设计方法,并对两种设计方法进行对比分析. 相似文献
2.
When we as developers and designers create a system that requires user interaction-whether it is computer software, a kitchen appliance, or a door knob-we often fall victim to a common mistake: we use ourselves as the model for our system's potential users. Even developing for an "average user" is a pitfall that results in numerous users whose needs are overlooked. The average user might account for the largest spike under a bell curve, but nonaverage users account for a much larger percentage of the general population. Additionally, the number of people possessing all of the average attributes being considered in a design is very small. So, the designers' goal should be to broaden the section of the bell curve that their system targets. This concept is called universal design, and it's especially important in wearable computing because using a system while mobile and while in different environments can have a major effect on its usability. 相似文献
3.
根据目前国际上普适计算研究的现状和发展趋势--国际上对普适计算的研究主要集中在人机接口和上下文感知计算等领域,国内对普适计算的研究主要集中在多模态的智能空间领域.提出了一个普适计算安全体系结构的参考模型,并简要讨论了该参考模型的3个关键研究内容--安全系统层、安全计算层和安全协同层.最后列举了一个模型实例. 相似文献
4.
针对普适环境下移动IP协议的局限性,将集智能性、移动性,安全性等诸多特性于一身的移动代理引入普适计算,详细地阐述了实现过程并进行性能分析与仿真实验.结果表明,普适移动设备在引入移动代理后,能够快速平滑地实现切换,从而大大减少了切换延迟和传输过程中的状态信息量,降低了移动设备在切换期间的丢包率,有效地改善了网络的性能. 相似文献
5.
Using pervasive computing to deliver elder care 总被引:8,自引:0,他引:8
《Pervasive Computing, IEEE》2002,1(1):10-13
The Elite Care Information Technology Group has deployed a system with many elements of pervasive computing, including portable and wearable devices and wireless networking, to create intelligent and responsive work and living spaces for the elderly in a residential setting. Elite Care based the setting's layout on an apartment complex rather than a hospital with its hallways and rooms. By using a social care model that has the staff making house calls rather than doctors making rounds, the residents continue to live as normally as they can. In this scheme, pervasive sensors and staff assist residents in maintaining their independence, offering assistance as necessary and using the pervasive sensors to monitor vital signs and health indicators. Elite Care has harnessed the technology in direct and important ways to construct a more humane and human world for its residents and staff. 相似文献
6.
We propose an ultra-lightweight, compact, and low power block cipher BORON. BORON is a substitution and permutation based network, which operates on a 64-bit plain text and supports a key length of 128/80 bits. BORON has a compact structure which requires 1939 gate equivalents (GEs) for a 128-bit key and 1626 GEs for an 80-bit key. The BORON cipher includes shift operators, round permutation layers, and XOR operations. Its unique design helps generate a large number of active S-boxes in fewer rounds, which thwarts the linear and differential attacks on the cipher. BORON shows good performance on both hardware and software platforms. BORON consumes less power as compared to the lightweight cipher LED and it has a higher throughput as compared to other existing SP network ciphers. We also present the security analysis of BORON and its performance as an ultra-lightweight compact cipher. BORON is a well-suited cipher design for applications where both a small footprint area and low power dissipation play a crucial role. 相似文献
7.
可穿戴计算技术是一种将计算机穿戴在人体上进行各种应用的国际性前沿计算机技术,是智能环境的一个主要研究课题。可穿戴计算技术并非是简单地把计算机微小化后直接穿戴在人们身上,它需要解决很多关键性的技术才能真正发展起来,以满足人们的应用需求。其中最重要的四项技术为人机交互技术、嵌入式控制系统技术、无线连接技术和高效能源技术。若将可穿戴计算技术应用于智能服装,可为人们提供一个舒适的智能环境。因此,可以用Android智能手机作为上位机,AVR单片机作为微控制器,采用蓝牙无线通信方式,大容量锂离子电池作为能源,为运动受限的病人设计一款智能保暖服装,为他们提供一个舒适的生活环境。 相似文献
8.
A common focus shared by researchers in mobile, ubiquitous and wearable computing is the attempt to break away from the traditional desktop computing paradigm. Computational services need to become as mobile as their users. Whether that service mobility is achieved by equipping the user with computational power or by instrumenting the environment, all services need to be extended to take advantage of the constantly changing context in which they are accessed. This paper will report on work carried out by the Future Computing Environments Group at Georgia Tech to provide infrastructure for context-aware computing. We will describe some of the fundamental issues involved in contextaware computing, solutions we have generated to provide a flexible infrastructure and several applications that take advantage of context awareness to allow freedom from traditional desktop computing. 相似文献
9.
10.
In a nutshell, the course is basically about emerging, visible and invisible computing systems and devices. Pervasive computing has many names, including ubiquitous computing, and its key element is the omnipresence of information devices. These devices can be embedded into cars, airplanes, ships, bikes, posters, signboards, walls, and even clothes. The course therefore focuses on independent information devices, including wearable computers, mobile phones, screen phones, and PDAs, and the services made available by them. It includes the study of computer and network architectures for pervasive computing, mobile computing, human-computer interaction using speech and vision, pervasive software systems, and experimental pervasive computing systems. 相似文献
11.
12.
《Journal of Systems Architecture》2014,60(8):668-670
Applications and services for pervasive computing have been dramatically grown and have contributed extensively to our daily experiences in recent years. Smart systems, devices, and spaces are proactive for ubiquitous and pervasive computing. Smart information technology (IT) is also an outcome of the state of the art and novel mobile and ubiquitous computing technologies that include highly capable handheld device, pervasive and personal device, etc. This special issue will be a trigger for further related research and technology improvements in pervasive and ubiquitous computing using smart devices and services. This special issue called for original papers describing the latest developments, trends, and solutions of smart devices and spaces for pervasive computing including real-time operating systems (OS), tiny OS and middleware supports, mobile system performance, trustworthy Internet and communications, agents and mobile and pervasive services, among others. In particular, this special issue focuses on a remote control and media-sharing system, flash storage-based smart system, heterogeneous mobile OS, and prediction and auto-execution system for pervasive computing. 相似文献
13.
Diane P. Michelfelder 《AI & Society》2010,25(1):61-70
Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices which can become linked in a pervasive computing environment: PDAs, GPS sensors, RFID chips/readers, publicly-located video surveillance cameras, Internet-enabled mobile phones, and the like, each raise threats to individual privacy. Without discounting the value of this approach, this paper aims to propose an alternative; and, as a result of recasting the threat to individual privacy from pervasive computing, to identify other, and deeper, moral goods that pervasive computing puts at risk that otherwise might remain concealed. In particular, I argue that pervasive computing threatens to compromise what I call existential autonomy: the right to decide for ourselves at least some of the existential conditions under which we form and develop our ways of life, including our relations to information technology. From this perspective, some moral goods at stake in protecting privacy in an environment of pervasive computing emerge that have less to do with furthering human well-being through the promotion of self-identity and subjectivity, than with stimulating curiosity, receptivity to difference, and, most broadly, openness to the world. 相似文献
14.
The Journal of Supercomputing - 相似文献
15.
This article examines how emerging pervasive computing and affective computing technologies might enhance the adoption of
ICT in e-Learning which takes place in the home and wider city environment. In support of this vision we describe two cutting
edge ICT environments which combine to form a holistic connected future learning environment. The first is the iSpace, a specialized
digital-home test-bed that represents the kind of high-tech, context aware home-based learning environment we envisage future
learners using, the second a sophisticated pervasive e-Learning platform that typifies the educational delivery platform our
research is targeting. After describing these environments we then present our research that explores how emotion evolves
during the learning process and how to leverage emotion feedback to provide adaptive e-Learning system. The motivation driving
this work is our desire to improve the performance of the educational experience by developing learning systems that recognize
and respond appropriately to emotions exhibited by learners. Finally we report on the results about the emotion recognition
from physiological signals which achieved a best-case accuracy rate of 86.5% for four types of learning emotion. To the best
of our knowledge, this is the first report on emotion detection by data collected from close-to-real-world learning sessions.
We also report some finding about emotion evolution during learning, which are still not enough to validate Kort’s learning
spiral model.
相似文献
Ruimin ShenEmail: |
16.
17.
rfid has already found its way into a variety of large scale applications and arguably it is already one of the most successful technologies in the history of computing. Beyond doubt, rfid is an effective automatic identification technology for a variety of objects including natural, manufactured and handmade artifacts; humans and other species; locations; and increasingly media content and mobile services. In this survey we consider developments towards establishing rfid as the cost-effective technical solution for the development of open, shared, universal pervasive computing infrastructures and look ahead to its future. In particular, we discuss the ingredients of current large scale applications; the role of network services to provide complete systems; privacy and security implications; and how rfid is helping prototype emerging pervasive computing applications. We conclude by identifying common trends in the new applications of rfid and ask questions related to sustainable universal deployment of this technology. 相似文献
18.
19.
Sizing and grading are widely used to create products to fit selected populations. Currently, the sizing and grading rules are derived from anthropometric measures; however past researches have indicated that it is not very accurate. This study proposes a new technique to use principal component analysis (PCA) on 3D surface points for sizing and grading wearable products. The accuracy of the proposed method is illustrated by developing a sizing and grading rule for the feet. After developing a model using the feet data of 60 participants and validating using the feet data of 10 different participants, results showed that sizing and grading using PCA is more accurate than traditional techniques. Compared with traditional foot sizing, PCA based sizing and grading showed an improvement of about 25% in accuracy. In addition, results also indicated that the grading rule derived from PCA loading was better than the proportional grading. This research provides a new direction to consider when developing the sizing and grading rules. It can be extended to calculate the number of sizes and the size increment for various wearable products. 相似文献