首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
主要就普适计算下无边界网络系统的可生存性问题进行分析,然后介绍了可生存系统设计的两种设计方法,并对两种设计方法进行对比分析.  相似文献   

2.
When we as developers and designers create a system that requires user interaction-whether it is computer software, a kitchen appliance, or a door knob-we often fall victim to a common mistake: we use ourselves as the model for our system's potential users. Even developing for an "average user" is a pitfall that results in numerous users whose needs are overlooked. The average user might account for the largest spike under a bell curve, but nonaverage users account for a much larger percentage of the general population. Additionally, the number of people possessing all of the average attributes being considered in a design is very small. So, the designers' goal should be to broaden the section of the bell curve that their system targets. This concept is called universal design, and it's especially important in wearable computing because using a system while mobile and while in different environments can have a major effect on its usability.  相似文献   

3.
马彬  陈龙 《计算机工程与设计》2007,28(3):542-544,561
根据目前国际上普适计算研究的现状和发展趋势--国际上对普适计算的研究主要集中在人机接口和上下文感知计算等领域,国内对普适计算的研究主要集中在多模态的智能空间领域.提出了一个普适计算安全体系结构的参考模型,并简要讨论了该参考模型的3个关键研究内容--安全系统层、安全计算层和安全协同层.最后列举了一个模型实例.  相似文献   

4.
针对普适环境下移动IP协议的局限性,将集智能性、移动性,安全性等诸多特性于一身的移动代理引入普适计算,详细地阐述了实现过程并进行性能分析与仿真实验.结果表明,普适移动设备在引入移动代理后,能够快速平滑地实现切换,从而大大减少了切换延迟和传输过程中的状态信息量,降低了移动设备在切换期间的丢包率,有效地改善了网络的性能.  相似文献   

5.
Using pervasive computing to deliver elder care   总被引:8,自引:0,他引:8  
The Elite Care Information Technology Group has deployed a system with many elements of pervasive computing, including portable and wearable devices and wireless networking, to create intelligent and responsive work and living spaces for the elderly in a residential setting. Elite Care based the setting's layout on an apartment complex rather than a hospital with its hallways and rooms. By using a social care model that has the staff making house calls rather than doctors making rounds, the residents continue to live as normally as they can. In this scheme, pervasive sensors and staff assist residents in maintaining their independence, offering assistance as necessary and using the pervasive sensors to monitor vital signs and health indicators. Elite Care has harnessed the technology in direct and important ways to construct a more humane and human world for its residents and staff.  相似文献   

6.
We propose an ultra-lightweight, compact, and low power block cipher BORON. BORON is a substitution and permutation based network, which operates on a 64-bit plain text and supports a key length of 128/80 bits. BORON has a compact structure which requires 1939 gate equivalents (GEs) for a 128-bit key and 1626 GEs for an 80-bit key. The BORON cipher includes shift operators, round permutation layers, and XOR operations. Its unique design helps generate a large number of active S-boxes in fewer rounds, which thwarts the linear and differential attacks on the cipher. BORON shows good performance on both hardware and software platforms. BORON consumes less power as compared to the lightweight cipher LED and it has a higher throughput as compared to other existing SP network ciphers. We also present the security analysis of BORON and its performance as an ultra-lightweight compact cipher. BORON is a well-suited cipher design for applications where both a small footprint area and low power dissipation play a crucial role.  相似文献   

7.
可穿戴计算技术是一种将计算机穿戴在人体上进行各种应用的国际性前沿计算机技术,是智能环境的一个主要研究课题。可穿戴计算技术并非是简单地把计算机微小化后直接穿戴在人们身上,它需要解决很多关键性的技术才能真正发展起来,以满足人们的应用需求。其中最重要的四项技术为人机交互技术、嵌入式控制系统技术、无线连接技术和高效能源技术。若将可穿戴计算技术应用于智能服装,可为人们提供一个舒适的智能环境。因此,可以用Android智能手机作为上位机,AVR单片机作为微控制器,采用蓝牙无线通信方式,大容量锂离子电池作为能源,为运动受限的病人设计一款智能保暖服装,为他们提供一个舒适的生活环境。  相似文献   

8.
A common focus shared by researchers in mobile, ubiquitous and wearable computing is the attempt to break away from the traditional desktop computing paradigm. Computational services need to become as mobile as their users. Whether that service mobility is achieved by equipping the user with computational power or by instrumenting the environment, all services need to be extended to take advantage of the constantly changing context in which they are accessed. This paper will report on work carried out by the Future Computing Environments Group at Georgia Tech to provide infrastructure for context-aware computing. We will describe some of the fundamental issues involved in contextaware computing, solutions we have generated to provide a flexible infrastructure and several applications that take advantage of context awareness to allow freedom from traditional desktop computing.  相似文献   

9.
10.
In a nutshell, the course is basically about emerging, visible and invisible computing systems and devices. Pervasive computing has many names, including ubiquitous computing, and its key element is the omnipresence of information devices. These devices can be embedded into cars, airplanes, ships, bikes, posters, signboards, walls, and even clothes. The course therefore focuses on independent information devices, including wearable computers, mobile phones, screen phones, and PDAs, and the services made available by them. It includes the study of computer and network architectures for pervasive computing, mobile computing, human-computer interaction using speech and vision, pervasive software systems, and experimental pervasive computing systems.  相似文献   

11.
12.
Applications and services for pervasive computing have been dramatically grown and have contributed extensively to our daily experiences in recent years. Smart systems, devices, and spaces are proactive for ubiquitous and pervasive computing. Smart information technology (IT) is also an outcome of the state of the art and novel mobile and ubiquitous computing technologies that include highly capable handheld device, pervasive and personal device, etc. This special issue will be a trigger for further related research and technology improvements in pervasive and ubiquitous computing using smart devices and services. This special issue called for original papers describing the latest developments, trends, and solutions of smart devices and spaces for pervasive computing including real-time operating systems (OS), tiny OS and middleware supports, mobile system performance, trustworthy Internet and communications, agents and mobile and pervasive services, among others. In particular, this special issue focuses on a remote control and media-sharing system, flash storage-based smart system, heterogeneous mobile OS, and prediction and auto-execution system for pervasive computing.  相似文献   

13.
Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices which can become linked in a pervasive computing environment: PDAs, GPS sensors, RFID chips/readers, publicly-located video surveillance cameras, Internet-enabled mobile phones, and the like, each raise threats to individual privacy. Without discounting the value of this approach, this paper aims to propose an alternative; and, as a result of recasting the threat to individual privacy from pervasive computing, to identify other, and deeper, moral goods that pervasive computing puts at risk that otherwise might remain concealed. In particular, I argue that pervasive computing threatens to compromise what I call existential autonomy: the right to decide for ourselves at least some of the existential conditions under which we form and develop our ways of life, including our relations to information technology. From this perspective, some moral goods at stake in protecting privacy in an environment of pervasive computing emerge that have less to do with furthering human well-being through the promotion of self-identity and subjectivity, than with stimulating curiosity, receptivity to difference, and, most broadly, openness to the world.  相似文献   

14.
15.
Affective e-Learning in residential and pervasive computing environments   总被引:1,自引:1,他引:1  
This article examines how emerging pervasive computing and affective computing technologies might enhance the adoption of ICT in e-Learning which takes place in the home and wider city environment. In support of this vision we describe two cutting edge ICT environments which combine to form a holistic connected future learning environment. The first is the iSpace, a specialized digital-home test-bed that represents the kind of high-tech, context aware home-based learning environment we envisage future learners using, the second a sophisticated pervasive e-Learning platform that typifies the educational delivery platform our research is targeting. After describing these environments we then present our research that explores how emotion evolves during the learning process and how to leverage emotion feedback to provide adaptive e-Learning system. The motivation driving this work is our desire to improve the performance of the educational experience by developing learning systems that recognize and respond appropriately to emotions exhibited by learners. Finally we report on the results about the emotion recognition from physiological signals which achieved a best-case accuracy rate of 86.5% for four types of learning emotion. To the best of our knowledge, this is the first report on emotion detection by data collected from close-to-real-world learning sessions. We also report some finding about emotion evolution during learning, which are still not enough to validate Kort’s learning spiral model.
Ruimin ShenEmail:
  相似文献   

16.
普适计算中的无缝迁移策略   总被引:4,自引:0,他引:4       下载免费PDF全文
针对分布式计算环境已有的一些迁移机制,都无法满足普适计算模式下任务迁移时对无缝性的要求,研究了任务的形式化描述,Agent的分类以及任务的迁移粒度问题.基于MobileAgent的任务无缝迁移策略,解决了迁移过程中的迁移算法、迁移时延、迁移失效等问题.其特点在于基于合理的迁移粒度和更小的迁移时延,通过MobileAgent的移动保证迁移的无缝性.多个应用场景中的测试实践表明了该策略的有效性.  相似文献   

17.
rfid has already found its way into a variety of large scale applications and arguably it is already one of the most successful technologies in the history of computing. Beyond doubt, rfid is an effective automatic identification technology for a variety of objects including natural, manufactured and handmade artifacts; humans and other species; locations; and increasingly media content and mobile services. In this survey we consider developments towards establishing rfid as the cost-effective technical solution for the development of open, shared, universal pervasive computing infrastructures and look ahead to its future. In particular, we discuss the ingredients of current large scale applications; the role of network services to provide complete systems; privacy and security implications; and how rfid is helping prototype emerging pervasive computing applications. We conclude by identifying common trends in the new applications of rfid and ask questions related to sustainable universal deployment of this technology.  相似文献   

18.
基于概率和可信度方法的普适计算信任模型   总被引:1,自引:0,他引:1  
孙凌  辛艳  罗长远 《计算机应用》2010,30(9):2379-2382
根据普适计算环境下信任的特点以及现有信任模型存在的不足,提出一种基于概率和可信度方法的信任模型。模型综合考虑影响信任的主观和客观因素,通过主观信任、直接信任和推荐信任得到总体信任。计算推荐信任时引入基于可信度的匹配度算法对多个推荐实体进行取舍,在计算前就把不符合推荐条件的实体排除,再结合对推荐链路的更新,能够更有效地避免恶意推荐的影响,计算出来的信任值可靠度更高。  相似文献   

19.
Sizing and grading are widely used to create products to fit selected populations. Currently, the sizing and grading rules are derived from anthropometric measures; however past researches have indicated that it is not very accurate. This study proposes a new technique to use principal component analysis (PCA) on 3D surface points for sizing and grading wearable products. The accuracy of the proposed method is illustrated by developing a sizing and grading rule for the feet. After developing a model using the feet data of 60 participants and validating using the feet data of 10 different participants, results showed that sizing and grading using PCA is more accurate than traditional techniques. Compared with traditional foot sizing, PCA based sizing and grading showed an improvement of about 25% in accuracy. In addition, results also indicated that the grading rule derived from PCA loading was better than the proportional grading. This research provides a new direction to consider when developing the sizing and grading rules. It can be extended to calculate the number of sizes and the size increment for various wearable products.  相似文献   

20.
普适计算环境因其所具有的动态性、资源约束性和上下文感知性使其服务的组合面临特有的问题和挑战。服务匹配和选择、服务协调和管理、错误检测和修复是解决普适计算服务组合的三个关键技术。比较了普适计算服务匹配和选择的方法,重点分析了服务协调和管理的手段,给出了错误检测和修复的方法,最后提出解决普适计算服务组合的建议。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号