Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC...Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.展开更多
In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other ...In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other in advance,they should mutually authenticate each other.The service provider prefers to authenticate the user based on his identity while the user tends to stay anonymous.Privacy and security are two important but seemingly contradictory objectives.As a result,a user prefers not to expose any sensitive information to the service provider such as his physical location,ID and so on when being authenticated.In this paper,a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed.Not only can a user's anonymous authentication be achieved,but also the public key cryptography operations can be reduced by adopting this scheme.Different access control policies for different services are enabled by using biometric encryption technique.The correctness of the proposed authentication and key establishment protocol is formally verified based on SVO logic.展开更多
Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications ...Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes,IoV has not been completely explored by business organizations.In order to tackle this problem,we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition,the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulation results show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach.展开更多
Gait recognition has been of great importance for disease diagnosis,rehabilitation assessment,as well as personal identification.Conventional gait analysis generally has to rely heavily on complex,expensive data acqui...Gait recognition has been of great importance for disease diagnosis,rehabilitation assessment,as well as personal identification.Conventional gait analysis generally has to rely heavily on complex,expensive data acquisition and computing apparatus.To significantly simplify the evaluation process the mobile phone,which is one of the most indispensable electronic media in human daily life,was adopted as a pervasive tool for gait study,by using its digital imaging recording and analysis function.The basic procedure to record and quantify the video of human gait was illustrated and demonstrated through conceptual experiments.Potential applications were discussed.Some fundamental and practical issues raised in such flexible technology were pointed out.This method is expected to be widely used in future human analysis.展开更多
Modern research emphasizes Pervasive Computing change faces, learning cultures, structures, communications, intellectual properties, information securities, data presentations and web dis-plays to make attraction for ...Modern research emphasizes Pervasive Computing change faces, learning cultures, structures, communications, intellectual properties, information securities, data presentations and web dis-plays to make attraction for human interaction. Pervasive systems have a broad range of applica-tions but it is relatively challenging for pervasive applications to meet emergence into existing physical environment and newly built structure requirements. Due to their interaction to gather information and change the environment via activating devices independently is highlighted. Se-curity of the pervasive devices and applications which control our activities has primary importance and will be destroyed, if the pervasive system operations are not secure. There is a need to improve the security measures for data to travel rapidly, unbroken, unchanged and invisible by deceptive recipients. Pervasive Computing allows users to get information and services access anytime and anywhere but need to discuss issues and solutions to deliver secure information with privacy and trust. Possible solutions for these challenges of Pervasive Computing interaction between human are emphasized. A collection of papers and articles have been collected in order to investigate the previous study of Pervasive Computing interaction and its challenges. Is it possible for us to understand what the scientific world will be close to generate new avenues? Expectations of future bring new openings for user interaction with systems, data, information and the environments in which they live, work and play.展开更多
Wireless body area networks (WBANs) use RF communication for interconnection of tiny sensor nodes located in, on, or in close prox- imity to the human body. A WBAN enables physiological signals, physical activity, a...Wireless body area networks (WBANs) use RF communication for interconnection of tiny sensor nodes located in, on, or in close prox- imity to the human body. A WBAN enables physiological signals, physical activity, and body position to be continuously monitored.展开更多
This paper describes PERCEPOLIS, an educational platform that leverages technological advances, in particular in pervasive computing, to facilitate personalized learning in higher education, while supporting a network...This paper describes PERCEPOLIS, an educational platform that leverages technological advances, in particular in pervasive computing, to facilitate personalized learning in higher education, while supporting a networked curricular model. Fundamental to PERCEPOLIS is the modular approach to course development. Blended instruction, where students are responsible for perusing certain learning objects outside of class, used in conjunction with the cyberinfrastructure will allow the focus of face-to-face meetings to shift from lecture to active learning, interactive problem-solving, and reflective instructional tasks. The novelty of PERCEPOLIS lies in its ability to leverage pervasive and ubiquitous computing and communication through the use of intelligent software agents that use a student’s academic profile and interests, as well as supplemental information such as his or her learning style, to customize course content. Assessments that gauge the student’s mastery of concepts are used to allow self-paced progression through the course. Furthermore, the cyberinfrastructure facilitates the collection of data on student performance and learning at a resolution that far exceeds what is currently available. We believe that such an infrastructure will accelerate the acquisition of knowledge and skills critical to professional engineering practice, while facilitating the study of how this acquisition comes about, yielding insights that may lead to significant changes in pedagogy.展开更多
Aims: This study was designed to verify the proportion of Japanese adults with pervasive developmental disorder (PDD) who met the diagnostic criteria (other than E) for attention-deficit/hyperactivity disorder (ADHD) ...Aims: This study was designed to verify the proportion of Japanese adults with pervasive developmental disorder (PDD) who met the diagnostic criteria (other than E) for attention-deficit/hyperactivity disorder (ADHD) in the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision (DSM-IV-TR). Furthermore, we examined to what extent adults with PDD think that they exhibit ADHD symptoms. Methods: We developed an original Japanese self-report questionnaire to determine the presence or absence of 18 symptoms from the diagnostic criteria for ADHD in the DSM-IV-TR. We administered the questionnaire to 64 adults with high-functioning PDD (45 men and 19 women) and 21 adults with ADHD (10 men and 11 women), aged 18 to 59 years, with a full-scale intelligence quotient ≥75. Target patients were evaluated for ADHD by their psychiatrists. Results: Twenty-nine (45.3%) adults with PDD also had ADHD. The percentage of these adults who had over six perceived inattention symptoms from the DSM-IV-TR was 96.6%. The percentage of these adults who had over six perceived hyperactivity-impulsivity symptoms was 65.5%. Thirty-five (55.6%) adults with PDD responded that they were aware of having ADHD symptoms at the level of the relevant diagnostic criteria. Conclusions: The present study is the first to examine the frequency of objective and perceived ADHD symptoms in adults with PDD in Japan. Our results show that both objective and perceived ADHD symptoms frequently appear in a large number of adults with PDD. This suggests that it is necessary to attend to concomitant ADHD symptoms in the medical care of adults with PDD.展开更多
With the technological advances and market development, telecommunications networks and the Internet are converging into one universal network; meanwhile, the services provided by these two kinds of networks are integ...With the technological advances and market development, telecommunications networks and the Internet are converging into one universal network; meanwhile, the services provided by these two kinds of networks are integrating. Pervasive services will meet demands and expectations from all aspects. The topic has become a favorite for research in Beyond Third Generation (B3G), Next Generation Network (NGN) and Next Generation Internet (NGI) fields. The concept of the pervasive services comes from pervasive computation and B3G. Their features include pervasiveness, mobility, transparency, QoS-guarantee, customization, adaptiveness, push, security, easiness, variety and time-to-market. 3GPP, OMA and the B3G research program of the European Union (EU) have conducted a lot of research work about the different features of pervasive services. The current hot topics in the pervasive services research include context awareness and service enabling.展开更多
The original infrastructure of the Internet can no longer meet personalized and diversified demands of current increasing network subscribers. It has exposed many defects and shortcomings. For examples, the mechanism ...The original infrastructure of the Internet can no longer meet personalized and diversified demands of current increasing network subscribers. It has exposed many defects and shortcomings. For examples, the mechanism of using ports to distinguish services is inflexible and dangerous with the emergence of various services; the current Internet architecture does not make use of the close relationship between network resources and services, but simultaneously maintains two processing systems for the resources and services respectively, wasting both subscribers’ time and network resources; the Internet class of services granularity is not fine enough, failing to meet personalized and diversified user demands. In order to solve these problems, this paper discusses the mechanisms and key technologies for pervasive services in the new-generation Internet. The paper focuses on the definition, classification and identifier design of personalized and diversified user services. The service identifier design fulfills the unified identifier and processing of various network services, discovers the close relationship between services and resources, and can offer personalized and diversified services according to users’ demands.展开更多
Recent developments of the wireless sensor network will revolutionize the way of remote monitoring in dif-ferent domains such as smart home and smart care, particularly remote cardiac care. Thus, it is challenging to ...Recent developments of the wireless sensor network will revolutionize the way of remote monitoring in dif-ferent domains such as smart home and smart care, particularly remote cardiac care. Thus, it is challenging to propose an energy efficient technique for automatic ECG diagnosis (AED) to be embedded into the wireless sensor. Due to the high resource requirements, classical AED methods are unsuitable for pervasive cardiac care (PCC) applications. This paper proposes an embedded real-time AED algorithm dedicated to PCC sys-tems. This AED algorithm consists of a QRS detector and a rhythm classifier. The QRS detector adopts the linear time-domain statistical and syntactic analysis method and the geometric feature extraction modeling technique. The rhythm classifier employs the self-learning expert system and the confidence interval method. Currently, this AED algorithm has been implemented and evaluated on the PCC system for 30 patients in the Gabriel Monpied hospital (CHRU of Clermont-Ferrand, France) and the MIT-BIH cardiac arrhythmias da-tabase. The overall results show that this energy efficient algorithm provides the same performance as the classical ones.展开更多
Nowadays, application systems in pervasive computing have to be self-adaptive, which means adapting themselves to dynamic environments. Our aim is to enable systematic development of self-adaptive compo-nent-based app...Nowadays, application systems in pervasive computing have to be self-adaptive, which means adapting themselves to dynamic environments. Our aim is to enable systematic development of self-adaptive compo-nent-based applications. The paper first introduces a novel policy based framework for self-adaptive scheme in pervasive computing. Then the proposed policy ontology and policy language are well expressive and eas-ily extensible to support the design of policy which is based on the Separation of Concerns principle. Fur-thermore, the context-driven event channel decouples the communication between the suppliers and con-sumers for asynchronous communication. The proposed framework can provide both a domain-independent and a flexible self-adaptation solution.展开更多
New challenges including how to share information on heterogeneous devices appear in data-intensive pervasive computing environments. Data integration is a practical approach to these applications. Dealing with incons...New challenges including how to share information on heterogeneous devices appear in data-intensive pervasive computing environments. Data integration is a practical approach to these applications. Dealing with inconsistencies is one of the important problems in data integration. In this paper we motivate the problem of data inconsistency solution for data integration in pervasive environments. We define data qualit~ criteria and expense quality criteria for data sources to solve data inconsistency. In our solution, firstly, data sources needing high expense to obtain data from them are discarded by using expense quality criteria and utility function. Since it is difficult to obtain the actual quality of data sources in pervasive computing environment, we introduce fuzzy multi-attribute group decision making approach to selecting the appropriate data sources. The experimental results show that our solution has ideal effectiveness.展开更多
Mobile devices are resource-limited, and task migration has become an important and attractive feature of mobile clouds. To validate task migration, we propose a novel approach to the simulation of task migration in a...Mobile devices are resource-limited, and task migration has become an important and attractive feature of mobile clouds. To validate task migration, we propose a novel approach to the simulation of task migration in a pervasive cloud environment. Our approach is based on Colored Petri Net(CPN). In this research, we expanded the semantics of a CPN and created two task migration models with different task migration policies: one that took account of context information and one that did not. We evaluated the two models using CPN-based simulation and analyzed their task migration accessibility, integrity during the migration process, reliability, and the stability of the pervasive cloud system after task migration. The energy consumption and costs of the two models were also investigated. Our results suggest that CPN with context sensing task migration can minimize energy consumption while preserving good overall performance.展开更多
Reality over Web (ROW) is a novel concept, where a window on the web corresponds to a window onto a real space. Once the correspondence is established, users should be able to interact or manipulate the objects or p...Reality over Web (ROW) is a novel concept, where a window on the web corresponds to a window onto a real space. Once the correspondence is established, users should be able to interact or manipulate the objects or people in the real space through the web window. In this paper, we introduce the RoW concept and highlight the principles that govern its design and implementation. A system architecture for realizing the RoW concept is described along with a proof-of-concept prototype that implements portions of the RoW concept. One essential part of an RoW implementation is accurate Iocationing of objects and people in a video frame. The Iocationing problem becomes particularly challenging because we want to reuse existing infrastructure as much as possible. We developed a high-frequency sound-based Iocationing scheme and implemented it on the prototype. The results from initial experiments performed on the Iocationing scheme are reported here.展开更多
Background:The only drug approved for pervasive developmental disorders(PDD)in Japan is pimozide.Several psychotropic drugs are also prescribed for offlabel use in Japan,but details regarding their prescription and us...Background:The only drug approved for pervasive developmental disorders(PDD)in Japan is pimozide.Several psychotropic drugs are also prescribed for offlabel use in Japan,but details regarding their prescription and use are largely unknown.The purpose of this study was to clarify the use of drug treatment in Japanese children with PDD.Methods:Data were extracted from claims data from the Japan Medical Data Center for children younger than 18 years of age who were newly diagnosed with PDD(International Classification of Diseases version 10 codes:F84)from 2005 to 2010(total of 3276 patients as of 2010).The prescription rates were presented as the percentage of PDD patients who were prescribed each drug.Results:Prior to 2010,the prescription rates for atypical antipsychotics,other antipsychotics,psychostimulants,all other central nervous system drugs,anticovnvulsants,non-barbiturates,and Parkinson’s disease/syndrome drugs significantly increased among the Anatomical Therapeutic Chemical classifications defined as the“nervous system”(trend P≤0.02).The prescription rate for risperidone consistently increased,reaching 6.9%in 2010(trend P<0.0001),the highest rate of the surveyed drugs among the antipsychotics.The prescription rate for aripiprazole also increased(trend P<0.0001),reaching 1.9%in 2010.The prescription rate for pimozide showed no annual changes,with a low rate of 0.4%in 2010.Conclusion:Compared with pimozide,the prescription rates for risperidone,aripiprazole and other psychotropic drugs have increased.Because safety data for these drugs in Japanese children are sparse,there is a need for future safety evaluations of these drugs in Japanese children.展开更多
Background:Pervasive developmental disorders(PDDs)can be very difficult to diagnose in children and to communicate such a diagnosis to their parents.Families of children with PDD learn of their child's diagnosis l...Background:Pervasive developmental disorders(PDDs)can be very difficult to diagnose in children and to communicate such a diagnosis to their parents.Families of children with PDD learn of their child's diagnosis long after the first symptoms are noted in the child's behavior.Methods:An area-based survey was conducted to assess all social and health care providers taking care of patients with PDDs in the Veneto Region(North-East Italy).Results:Only 28%of health care providers arrived at a definite diagnosis when the child was in his/her first year of age,51%when the child was 2-3 years old and 21%from age of 4 years and up.On average,the latency between the time of the diagnosis and its communication to the family was 6.9 months.However,a number of families did not ever have a diagnosis communicated to them.Sometimes,68%of the providers did not communicate a PDDs diagnosis to patient's families,and 4%of them quite commonly.Conclusion:The well-known delay in making a diagnosis of PDDs has two distinct components:one relating to the difficulty of confirming a diagnosis of PDDs,the other,hitherto unrecognized,relating to the family being notified.展开更多
Security has recently become a major concern in distributed geo-infrastructures for spatial data provision.Thus,a lightweight approach for securing distributed low-power environments such as geo-sensor networks is nee...Security has recently become a major concern in distributed geo-infrastructures for spatial data provision.Thus,a lightweight approach for securing distributed low-power environments such as geo-sensor networks is needed.The first part of this article presents a survey of current security mechanisms for authentication and authorisation.Based on this survey,a lightweight and scalable token-based security infrastructure was developed,which is tailored for use in distributed geo-web service infrastructures.The developed security framework comprises dedicated components for authentication,rule-based authorisation and optimised storage and administration of access rules.For validation purposes,a prototypical implementation of the approach has been created.展开更多
基金Supported by the National Natural Science Foun-dation of China (60573030 ,60303026 ,60473020) the Institutefor Infocomm Research 21 Heng Mui Keng Terrace ,Singapore .
文摘Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.
基金Supported by the National Natural Science Foundation of China (No.60703101)
文摘In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other in advance,they should mutually authenticate each other.The service provider prefers to authenticate the user based on his identity while the user tends to stay anonymous.Privacy and security are two important but seemingly contradictory objectives.As a result,a user prefers not to expose any sensitive information to the service provider such as his physical location,ID and so on when being authenticated.In this paper,a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed.Not only can a user's anonymous authentication be achieved,but also the public key cryptography operations can be reduced by adopting this scheme.Different access control policies for different services are enabled by using biometric encryption technique.The correctness of the proposed authentication and key establishment protocol is formally verified based on SVO logic.
基金funded by the Abu Dhabi University,Faculty Research Incentive Grant(19300483–Adel Khelifi),United Arab Emirates.Link to Sponsor website:https://www.adu.ac.ae/research/research-at-adu/overview.
文摘Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes,IoV has not been completely explored by business organizations.In order to tackle this problem,we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition,the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulation results show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach.
基金This work was partially supported by the Funding of the National Lab for Information Science and Technology at Tsinghua University and Tsinghua-Yue-Yuen Medical Sciences Fund.
文摘Gait recognition has been of great importance for disease diagnosis,rehabilitation assessment,as well as personal identification.Conventional gait analysis generally has to rely heavily on complex,expensive data acquisition and computing apparatus.To significantly simplify the evaluation process the mobile phone,which is one of the most indispensable electronic media in human daily life,was adopted as a pervasive tool for gait study,by using its digital imaging recording and analysis function.The basic procedure to record and quantify the video of human gait was illustrated and demonstrated through conceptual experiments.Potential applications were discussed.Some fundamental and practical issues raised in such flexible technology were pointed out.This method is expected to be widely used in future human analysis.
文摘Modern research emphasizes Pervasive Computing change faces, learning cultures, structures, communications, intellectual properties, information securities, data presentations and web dis-plays to make attraction for human interaction. Pervasive systems have a broad range of applica-tions but it is relatively challenging for pervasive applications to meet emergence into existing physical environment and newly built structure requirements. Due to their interaction to gather information and change the environment via activating devices independently is highlighted. Se-curity of the pervasive devices and applications which control our activities has primary importance and will be destroyed, if the pervasive system operations are not secure. There is a need to improve the security measures for data to travel rapidly, unbroken, unchanged and invisible by deceptive recipients. Pervasive Computing allows users to get information and services access anytime and anywhere but need to discuss issues and solutions to deliver secure information with privacy and trust. Possible solutions for these challenges of Pervasive Computing interaction between human are emphasized. A collection of papers and articles have been collected in order to investigate the previous study of Pervasive Computing interaction and its challenges. Is it possible for us to understand what the scientific world will be close to generate new avenues? Expectations of future bring new openings for user interaction with systems, data, information and the environments in which they live, work and play.
文摘Wireless body area networks (WBANs) use RF communication for interconnection of tiny sensor nodes located in, on, or in close prox- imity to the human body. A WBAN enables physiological signals, physical activity, and body position to be continuously monitored.
文摘This paper describes PERCEPOLIS, an educational platform that leverages technological advances, in particular in pervasive computing, to facilitate personalized learning in higher education, while supporting a networked curricular model. Fundamental to PERCEPOLIS is the modular approach to course development. Blended instruction, where students are responsible for perusing certain learning objects outside of class, used in conjunction with the cyberinfrastructure will allow the focus of face-to-face meetings to shift from lecture to active learning, interactive problem-solving, and reflective instructional tasks. The novelty of PERCEPOLIS lies in its ability to leverage pervasive and ubiquitous computing and communication through the use of intelligent software agents that use a student’s academic profile and interests, as well as supplemental information such as his or her learning style, to customize course content. Assessments that gauge the student’s mastery of concepts are used to allow self-paced progression through the course. Furthermore, the cyberinfrastructure facilitates the collection of data on student performance and learning at a resolution that far exceeds what is currently available. We believe that such an infrastructure will accelerate the acquisition of knowledge and skills critical to professional engineering practice, while facilitating the study of how this acquisition comes about, yielding insights that may lead to significant changes in pedagogy.
文摘Aims: This study was designed to verify the proportion of Japanese adults with pervasive developmental disorder (PDD) who met the diagnostic criteria (other than E) for attention-deficit/hyperactivity disorder (ADHD) in the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision (DSM-IV-TR). Furthermore, we examined to what extent adults with PDD think that they exhibit ADHD symptoms. Methods: We developed an original Japanese self-report questionnaire to determine the presence or absence of 18 symptoms from the diagnostic criteria for ADHD in the DSM-IV-TR. We administered the questionnaire to 64 adults with high-functioning PDD (45 men and 19 women) and 21 adults with ADHD (10 men and 11 women), aged 18 to 59 years, with a full-scale intelligence quotient ≥75. Target patients were evaluated for ADHD by their psychiatrists. Results: Twenty-nine (45.3%) adults with PDD also had ADHD. The percentage of these adults who had over six perceived inattention symptoms from the DSM-IV-TR was 96.6%. The percentage of these adults who had over six perceived hyperactivity-impulsivity symptoms was 65.5%. Thirty-five (55.6%) adults with PDD responded that they were aware of having ADHD symptoms at the level of the relevant diagnostic criteria. Conclusions: The present study is the first to examine the frequency of objective and perceived ADHD symptoms in adults with PDD in Japan. Our results show that both objective and perceived ADHD symptoms frequently appear in a large number of adults with PDD. This suggests that it is necessary to attend to concomitant ADHD symptoms in the medical care of adults with PDD.
基金the National BasicResearch Program of China ("973" Program)under Grant 2007CB3071002007CB307103,the National Science Fund for DistinguishedYoung Scholars under Grant 60525110Program for New Century Excellent Talents inUniversity under Grant NCET- 04- 0111
文摘With the technological advances and market development, telecommunications networks and the Internet are converging into one universal network; meanwhile, the services provided by these two kinds of networks are integrating. Pervasive services will meet demands and expectations from all aspects. The topic has become a favorite for research in Beyond Third Generation (B3G), Next Generation Network (NGN) and Next Generation Internet (NGI) fields. The concept of the pervasive services comes from pervasive computation and B3G. Their features include pervasiveness, mobility, transparency, QoS-guarantee, customization, adaptiveness, push, security, easiness, variety and time-to-market. 3GPP, OMA and the B3G research program of the European Union (EU) have conducted a lot of research work about the different features of pervasive services. The current hot topics in the pervasive services research include context awareness and service enabling.
基金the National BasicResearch Program of China ("973" Program)under Grants 2007CB307100 and 2007CB307106the Cultivation Finances of Ministry ofEducation for Higher Education Institutes’MajorPrograms in Science and Technology InnovationEngineering under Gant 706005.
文摘The original infrastructure of the Internet can no longer meet personalized and diversified demands of current increasing network subscribers. It has exposed many defects and shortcomings. For examples, the mechanism of using ports to distinguish services is inflexible and dangerous with the emergence of various services; the current Internet architecture does not make use of the close relationship between network resources and services, but simultaneously maintains two processing systems for the resources and services respectively, wasting both subscribers’ time and network resources; the Internet class of services granularity is not fine enough, failing to meet personalized and diversified user demands. In order to solve these problems, this paper discusses the mechanisms and key technologies for pervasive services in the new-generation Internet. The paper focuses on the definition, classification and identifier design of personalized and diversified user services. The service identifier design fulfills the unified identifier and processing of various network services, discovers the close relationship between services and resources, and can offer personalized and diversified services according to users’ demands.
文摘Recent developments of the wireless sensor network will revolutionize the way of remote monitoring in dif-ferent domains such as smart home and smart care, particularly remote cardiac care. Thus, it is challenging to propose an energy efficient technique for automatic ECG diagnosis (AED) to be embedded into the wireless sensor. Due to the high resource requirements, classical AED methods are unsuitable for pervasive cardiac care (PCC) applications. This paper proposes an embedded real-time AED algorithm dedicated to PCC sys-tems. This AED algorithm consists of a QRS detector and a rhythm classifier. The QRS detector adopts the linear time-domain statistical and syntactic analysis method and the geometric feature extraction modeling technique. The rhythm classifier employs the self-learning expert system and the confidence interval method. Currently, this AED algorithm has been implemented and evaluated on the PCC system for 30 patients in the Gabriel Monpied hospital (CHRU of Clermont-Ferrand, France) and the MIT-BIH cardiac arrhythmias da-tabase. The overall results show that this energy efficient algorithm provides the same performance as the classical ones.
文摘Nowadays, application systems in pervasive computing have to be self-adaptive, which means adapting themselves to dynamic environments. Our aim is to enable systematic development of self-adaptive compo-nent-based applications. The paper first introduces a novel policy based framework for self-adaptive scheme in pervasive computing. Then the proposed policy ontology and policy language are well expressive and eas-ily extensible to support the design of policy which is based on the Separation of Concerns principle. Fur-thermore, the context-driven event channel decouples the communication between the suppliers and con-sumers for asynchronous communication. The proposed framework can provide both a domain-independent and a flexible self-adaptation solution.
基金supported by the National Natural Science Foundation of China under Grant No. 60970010the National Basic Research 973 Program of China under Grant No. 2009CB320705the Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No. 20090073110026
文摘New challenges including how to share information on heterogeneous devices appear in data-intensive pervasive computing environments. Data integration is a practical approach to these applications. Dealing with inconsistencies is one of the important problems in data integration. In this paper we motivate the problem of data inconsistency solution for data integration in pervasive environments. We define data qualit~ criteria and expense quality criteria for data sources to solve data inconsistency. In our solution, firstly, data sources needing high expense to obtain data from them are discarded by using expense quality criteria and utility function. Since it is difficult to obtain the actual quality of data sources in pervasive computing environment, we introduce fuzzy multi-attribute group decision making approach to selecting the appropriate data sources. The experimental results show that our solution has ideal effectiveness.
文摘Mobile devices are resource-limited, and task migration has become an important and attractive feature of mobile clouds. To validate task migration, we propose a novel approach to the simulation of task migration in a pervasive cloud environment. Our approach is based on Colored Petri Net(CPN). In this research, we expanded the semantics of a CPN and created two task migration models with different task migration policies: one that took account of context information and one that did not. We evaluated the two models using CPN-based simulation and analyzed their task migration accessibility, integrity during the migration process, reliability, and the stability of the pervasive cloud system after task migration. The energy consumption and costs of the two models were also investigated. Our results suggest that CPN with context sensing task migration can minimize energy consumption while preserving good overall performance.
文摘Reality over Web (ROW) is a novel concept, where a window on the web corresponds to a window onto a real space. Once the correspondence is established, users should be able to interact or manipulate the objects or people in the real space through the web window. In this paper, we introduce the RoW concept and highlight the principles that govern its design and implementation. A system architecture for realizing the RoW concept is described along with a proof-of-concept prototype that implements portions of the RoW concept. One essential part of an RoW implementation is accurate Iocationing of objects and people in a video frame. The Iocationing problem becomes particularly challenging because we want to reuse existing infrastructure as much as possible. We developed a high-frequency sound-based Iocationing scheme and implemented it on the prototype. The results from initial experiments performed on the Iocationing scheme are reported here.
基金supported by a grant from the Ministry of Health,Labour and Welfare(MHLW)of Japan(H24-iyaku-wakate-011)
文摘Background:The only drug approved for pervasive developmental disorders(PDD)in Japan is pimozide.Several psychotropic drugs are also prescribed for offlabel use in Japan,but details regarding their prescription and use are largely unknown.The purpose of this study was to clarify the use of drug treatment in Japanese children with PDD.Methods:Data were extracted from claims data from the Japan Medical Data Center for children younger than 18 years of age who were newly diagnosed with PDD(International Classification of Diseases version 10 codes:F84)from 2005 to 2010(total of 3276 patients as of 2010).The prescription rates were presented as the percentage of PDD patients who were prescribed each drug.Results:Prior to 2010,the prescription rates for atypical antipsychotics,other antipsychotics,psychostimulants,all other central nervous system drugs,anticovnvulsants,non-barbiturates,and Parkinson’s disease/syndrome drugs significantly increased among the Anatomical Therapeutic Chemical classifications defined as the“nervous system”(trend P≤0.02).The prescription rate for risperidone consistently increased,reaching 6.9%in 2010(trend P<0.0001),the highest rate of the surveyed drugs among the antipsychotics.The prescription rate for aripiprazole also increased(trend P<0.0001),reaching 1.9%in 2010.The prescription rate for pimozide showed no annual changes,with a low rate of 0.4%in 2010.Conclusion:Compared with pimozide,the prescription rates for risperidone,aripiprazole and other psychotropic drugs have increased.Because safety data for these drugs in Japanese children are sparse,there is a need for future safety evaluations of these drugs in Japanese children.
基金supported by the Veneto Region Health Administration
文摘Background:Pervasive developmental disorders(PDDs)can be very difficult to diagnose in children and to communicate such a diagnosis to their parents.Families of children with PDD learn of their child's diagnosis long after the first symptoms are noted in the child's behavior.Methods:An area-based survey was conducted to assess all social and health care providers taking care of patients with PDDs in the Veneto Region(North-East Italy).Results:Only 28%of health care providers arrived at a definite diagnosis when the child was in his/her first year of age,51%when the child was 2-3 years old and 21%from age of 4 years and up.On average,the latency between the time of the diagnosis and its communication to the family was 6.9 months.However,a number of families did not ever have a diagnosis communicated to them.Sometimes,68%of the providers did not communicate a PDDs diagnosis to patient's families,and 4%of them quite commonly.Conclusion:The well-known delay in making a diagnosis of PDDs has two distinct components:one relating to the difficulty of confirming a diagnosis of PDDs,the other,hitherto unrecognized,relating to the family being notified.
基金This work has been funded by the European Commission(FP7 project GENESIS,reference No.223996)the Austrian Federal Ministry for Science and ResearchThe au。
文摘Security has recently become a major concern in distributed geo-infrastructures for spatial data provision.Thus,a lightweight approach for securing distributed low-power environments such as geo-sensor networks is needed.The first part of this article presents a survey of current security mechanisms for authentication and authorisation.Based on this survey,a lightweight and scalable token-based security infrastructure was developed,which is tailored for use in distributed geo-web service infrastructures.The developed security framework comprises dedicated components for authentication,rule-based authorisation and optimised storage and administration of access rules.For validation purposes,a prototypical implementation of the approach has been created.