Geodynamic studies have shown that mantle convection is like a giant blender to make the original heterogeneous mantle mixing and homogenizing. However, some models, especially from geochemical data show that the mode...Geodynamic studies have shown that mantle convection is like a giant blender to make the original heterogeneous mantle mixing and homogenizing. However, some models, especially from geochemical data show that the modem mantle may still contain a number of reservoir bodies with different chemical composition. Then, the modern mantle is homogeneous? Authors have defined a box replacement degree of convective mantle mixing and pervasion degree of convective mantle mixing (that equals to initial density of tracing elements divided by final density of tracing elements) to investigate the mantle mixing. The previous results have shown that after four billion years the mantle is basic uniform and the box replacement of the convective mantle is more than 80% in steady-state convection models. This paper calculates and discusses the pervasion degree of convective mantle mixing in detail. For the initial state we will set some 10°× 10°(spacing 0.25°) tracing boxes, which includes 1 681 tracer, at the top and bottom of the mantle, and then track the motions of these tracers, and investigate the convective mixed pervasions. The results show that at the initial stage though the convective mixing pervasions are very different from mode to mode, after running for some time, the convective mixing pervasions for most modes are going to be a constant and the tracers are more evenly distributed in the whole mantle.展开更多
A novel dynamic software allocation algorithm suitable for pervasive computing environments is proposed to minimize power consumption of mobile devices. Considering the power cost incurred by the computation, communic...A novel dynamic software allocation algorithm suitable for pervasive computing environments is proposed to minimize power consumption of mobile devices. Considering the power cost incurred by the computation, communication and migration of software components, a power consumption model of component assignments between a mobile device and a server is set up. Also, the mobility of components and the mobility relationships between components are taken into account in software allocation. By using network flow theory, the optimization problem of power conservation is transformed into the optimal bipartition problem of a flow network which can be partitioned by the max-flow rain-cut algorithm. Simulation results show that the proposed algorithm can save si^nificantlv more energy than existing algorithms.展开更多
Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for ...Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5 G generation environment, and can apply in the DRM-related applications.展开更多
Mental health problems in children and adolescents include several types of emotional and behavioural disorders, including disruptive, depression, anxiety and pervasive developmental(autism) disorders, characterized a...Mental health problems in children and adolescents include several types of emotional and behavioural disorders, including disruptive, depression, anxiety and pervasive developmental(autism) disorders, characterized as either internalizing or externalizing problems. Disruptive behavioural problems such as temper tantrums, attention deficit hyperactivity disorder, oppositional, defiant or conduct disorders are the commonest behavioural problems in preschool and school age children. The routine Paediatric clinic or Family Medicine/General Practitioner surgery presents with several desirable characteristics that make them ideal for providing effective mental health services to children and adolescents. DSM-5 and ICD-10 are the universally accepted standard criteria for the classification of mental and behaviour disorders in childhood and adults. The age and gender prevalence estimation of various childhood behavioural disorders are variable and difficult to compare worldwide. A review of relevant published literature was conducted, including published metaanalyses and national guidelines. We searched for articles indexed by Ovid, Pub Med, Pub Med Medical Central, CINAHL, EMBASE, Database of Abstracts and Reviews, and the Cochrane Database of Systematic reviews and other online sources. The searches were conducted using a combination of search expressions including "childhood", "behaviour", "disorders" or "problems". Childhood behaviour and emotional problems with their related disorders have significant negative impacts on the individual, the family and the society. They are commonly associated with poor academic, occupational, and psychosocial functioning. It is important for all healthcare professionals, especially the Paediatricians to be aware of the range of presentation, prevention and management of the common mental health problems in children and adolescents.展开更多
In several countries,the ageing population contour focuses on high healthcare costs and overloaded health care environments.Pervasive health care monitoring system can be a potential alternative,especially in the COVI...In several countries,the ageing population contour focuses on high healthcare costs and overloaded health care environments.Pervasive health care monitoring system can be a potential alternative,especially in the COVID-19 pandemic situation to help mitigate such problems by encouraging healthcare to transition from hospital-centred services to self-care,mobile care and home care.In this aspect,we propose a pervasive system to monitor the COVID’19 patient’s conditions within the hospital and outside by monitoring their medical and psychological situation.It facilitates better healthcare assistance,especially for COVID’19 patients and quarantined people.It identies the patient’s medical and psychological condition based on the current context and activities using a fuzzy context-aware reasoning engine based model.Fuzzy reasoning engine makes decisions using linguistic rules based on inference mechanisms that support the patient condition identication.Linguistics rules are framed based on the fuzzy set attributes belong to different context types.The fuzzy semantic rules are used to identify the relationship among the attributes,and the reasoning engine is used to ensure precise real-time context interpretation and current evaluation of the situation.Outcomes are measured using a fuzzy logic-based context reasoning system under simulation.The results indicate the usefulness of monitoring the COVID’19 patients based on the current context.展开更多
Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC...Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.展开更多
Sub-Saharan Africa(SSA)has the highest maternal and under-five mortality rates in the world.The advent of the coronavirus disease 2019 exacerbated the region's problems by overwhelming the health systems and affec...Sub-Saharan Africa(SSA)has the highest maternal and under-five mortality rates in the world.The advent of the coronavirus disease 2019 exacerbated the region's problems by overwhelming the health systems and affecting access to healthcare through travel restrictions and rechanelling of resources towards the containment of the pandemic.The region failed to achieve the Millenium Development Goals on maternal and child mortalities,and is poised to fail to achieve the same goals in the Sustainable Development Goals.To improve on the maternal and child health outcomes,many SSA countries introduced digital technologies for educating pregnant and nurs-ing women,making doctors'appointments and sending reminders to mothers and expectant mothers,as well as capturing information about patients and their illnesses.However,the collected epidemiological data are not being utilised to inform patient care and improve on the quality,efficiency and access to maternal,neonatal and child health(MNCH)care.To the researchers'best knowledge,no review paper has been published that focuses on digital health for MNCH care in SSA and proposes data-driven approaches to the same.Therefore,this study sought to:(1)identify digital systems for MNCH in SSA;(2)identify the applicability and weaknesses of the dig-ital MNCH systems in SSA;and(3)propose a data-driven model for diverging emerging technologies into MNCH services in SSA to make better use of data to improve MNCH care coverage,efficiency and quality.The PRISMA methodology was used in this study.The study revealed that there are no data-driven models for monitoring pregnant women and under-five children in Sub-Saharan Africa,with the available digital health technologies mainly based on SMS and websites.Thus,the current digital health systems in SSA do not support real-time,ubiquitous,pervasive and data-driven healthcare.Their main applicability is in non-real-time pregnancy moni-toring,education and information dissemination.Unless new and more effective approaches are implemented,SSA might remain with the highest and unacceptable maternal and under-five mortality rates globally.The study proposes feasible emerging technologies that can be used to provide data-driven healthcare for MNCH in SSA,and the recommendations on how to make the transition successful as well as the lessons learn from other regions.展开更多
It has long been a dream in the electronics industry to be able to write out electronics directly, as simply as printing a picture onto paper with an offi ce printer. The fi rstever prototype of a liquid-metal printer...It has long been a dream in the electronics industry to be able to write out electronics directly, as simply as printing a picture onto paper with an offi ce printer. The fi rstever prototype of a liquid-metal printer has been invented and demonstrated by our lab, bringing this goal a key step closer. As part of a continuous endeavor, this work is dedicated to significantly extending such technology to the consumer level by making a very practical desktop liquid-metal printer for society in the near future. Through the industrial design and technical optimization of a series of key technical issues such as working reliability, printing resolution, automatic control, human-machine interface design, software, hardware, and integration between software and hardware, a high-quality personal desktop liquid-metal printer that is ready for mass production in industry was fabricated. Its basic features and important technical mechanisms are explained in this paper, along with demonstrations of several possible consumer end-uses for making functional devices such as li ght-emitting diode(LED) displays. This liquid-metal printer is an automatic, easyto-use, and low-cost personal electronics manufacturing tool with many possible applications. This paper discusses important roles that the new machine may play for a group of emerging needs. The prospective future of this cuttingedge technology is outlined, along with a comparative interpretation of several historical printing methods. This desktop liquid-metal printer is expected to become a basic electronics manufacturing tool for a wide variety of emerging practices in the academic realm, in industry, and in education as well as for individual end-users in the near future.展开更多
Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications ...Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes,IoV has not been completely explored by business organizations.In order to tackle this problem,we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition,the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulation results show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach.展开更多
In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other ...In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other in advance,they should mutually authenticate each other.The service provider prefers to authenticate the user based on his identity while the user tends to stay anonymous.Privacy and security are two important but seemingly contradictory objectives.As a result,a user prefers not to expose any sensitive information to the service provider such as his physical location,ID and so on when being authenticated.In this paper,a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed.Not only can a user's anonymous authentication be achieved,but also the public key cryptography operations can be reduced by adopting this scheme.Different access control policies for different services are enabled by using biometric encryption technique.The correctness of the proposed authentication and key establishment protocol is formally verified based on SVO logic.展开更多
With the improvement of mobile equipment performance and development of Pervasive Computing,interactive computational applications such as Multi-Agent (MA) systems in Pervasive Computing Environments (PCE) become more...With the improvement of mobile equipment performance and development of Pervasive Computing,interactive computational applications such as Multi-Agent (MA) systems in Pervasive Computing Environments (PCE) become more and more prevalent. Many applications in PCE require Agent communication,manual control,and diversity of devices. Hence system in PCE must be designed flexible,and optimize the use of network,storage and computing resources. However,traditional MA software framework cannot completely adapt to these new features. A new MA software framework and its Agent Communication Modules to solve the problem brought by PCE was proposed. To describe more precisely,it presents Wright/ADL (Architecture Description Language) description of the new framework. Then,it displays an application called AI Eleven based on this new framework. AI Eleven achieves Agent-Agent communication and good collaboration for a task. Two experiments on AI Eleven will demonstrate the new framework's practicability and superiority.展开更多
Wireless networks are key enablers of ubiquitous communication. With the evolution of networking technologies and the need for these to inter-operate and dynamically adapt to user requirements, intelligent networks ar...Wireless networks are key enablers of ubiquitous communication. With the evolution of networking technologies and the need for these to inter-operate and dynamically adapt to user requirements, intelligent networks are the need of the hour. Use of machine learning techniques allows these networks to adapt to changing environments and enables them to make decisions while continuing to learn about their environment. In this paper, we survey the various problems of wireless networks that have been solved using machine-learning based prediction techniques and identify additional problems to which prediction can be applied. We also look at the gaps in the research done in this area till date.展开更多
Linear topology is useful in several pervasive application scenarios. Even though a linear topology can be handled by unspecific routing algorithms over general purpose MAC protocols, better performance can be obtaine...Linear topology is useful in several pervasive application scenarios. Even though a linear topology can be handled by unspecific routing algorithms over general purpose MAC protocols, better performance can be obtained by specialized techniques. This paper describes a new communication scheme called Wireless Wire (WiWi), which builds up a bidirectional wireless communication channel with deterministic properties in terms of throughput and latency over a strip of pervasive devices with short-range transmission capabilities. The system is synchronous and fault tolerant. With low cost and extremely simple devices, WiWi builds up a “wire-like” dielectric link, but its applications are not limited to end-to-end communications. For example, WiWi can be used to collect data from sensors along the path, thus acting as a virtual conveyor belt.展开更多
Wireless body area networks (WBANs) use RF communication for interconnection of tiny sensor nodes located in, on, or in close prox- imity to the human body. A WBAN enables physiological signals, physical activity, a...Wireless body area networks (WBANs) use RF communication for interconnection of tiny sensor nodes located in, on, or in close prox- imity to the human body. A WBAN enables physiological signals, physical activity, and body position to be continuously monitored.展开更多
Non-coding regions are the major component of human genomes and the long non-coding RNA(IncRNA)is a class of pervasive genes located in noncoding regions(Morris and Mattick,2014).IncRNAs play a wide range of regul...Non-coding regions are the major component of human genomes and the long non-coding RNA(IncRNA)is a class of pervasive genes located in noncoding regions(Morris and Mattick,2014).IncRNAs play a wide range of regulatory roles in gene transcription,translation,epigenetic modification and protein function by interacting with different types of molecules including DNA,展开更多
Recent developments of the wireless sensor network will revolutionize the way of remote monitoring in dif-ferent domains such as smart home and smart care, particularly remote cardiac care. Thus, it is challenging to ...Recent developments of the wireless sensor network will revolutionize the way of remote monitoring in dif-ferent domains such as smart home and smart care, particularly remote cardiac care. Thus, it is challenging to propose an energy efficient technique for automatic ECG diagnosis (AED) to be embedded into the wireless sensor. Due to the high resource requirements, classical AED methods are unsuitable for pervasive cardiac care (PCC) applications. This paper proposes an embedded real-time AED algorithm dedicated to PCC sys-tems. This AED algorithm consists of a QRS detector and a rhythm classifier. The QRS detector adopts the linear time-domain statistical and syntactic analysis method and the geometric feature extraction modeling technique. The rhythm classifier employs the self-learning expert system and the confidence interval method. Currently, this AED algorithm has been implemented and evaluated on the PCC system for 30 patients in the Gabriel Monpied hospital (CHRU of Clermont-Ferrand, France) and the MIT-BIH cardiac arrhythmias da-tabase. The overall results show that this energy efficient algorithm provides the same performance as the classical ones.展开更多
Today, the number of embedded system was applied in the field of automation and control has far exceeded a variety of general-purpose computer. Embedded system is gradually penetrated into all fields of human society,...Today, the number of embedded system was applied in the field of automation and control has far exceeded a variety of general-purpose computer. Embedded system is gradually penetrated into all fields of human society, and ubiquitous embedded applications constitute the 'ubiquitous' computing era. Embedded operating system is the core of the em-bedded system, and it directly affects the performance of the whole system. Our Liaoning Provincial Key Laboratory of Embedded Technology has successfully developed five kinds of device-level embedded operating systems by more than ten years’ efforts, and these systems are Webit 5.0, Worix, μKernel, iDCX 128 and μc/os-II 128. This paper mainly analyses and compares the implementation mechanism and performance of these five kinds of device-level embedded operating systems in detail.展开更多
基金supported by National Natural Science Foundation of China (40574043)
文摘Geodynamic studies have shown that mantle convection is like a giant blender to make the original heterogeneous mantle mixing and homogenizing. However, some models, especially from geochemical data show that the modem mantle may still contain a number of reservoir bodies with different chemical composition. Then, the modern mantle is homogeneous? Authors have defined a box replacement degree of convective mantle mixing and pervasion degree of convective mantle mixing (that equals to initial density of tracing elements divided by final density of tracing elements) to investigate the mantle mixing. The previous results have shown that after four billion years the mantle is basic uniform and the box replacement of the convective mantle is more than 80% in steady-state convection models. This paper calculates and discusses the pervasion degree of convective mantle mixing in detail. For the initial state we will set some 10°× 10°(spacing 0.25°) tracing boxes, which includes 1 681 tracer, at the top and bottom of the mantle, and then track the motions of these tracers, and investigate the convective mixed pervasions. The results show that at the initial stage though the convective mixing pervasions are very different from mode to mode, after running for some time, the convective mixing pervasions for most modes are going to be a constant and the tracers are more evenly distributed in the whole mantle.
基金The National Natural Science Foundation of China(No60503041)the Science and Technology Commission of ShanghaiInternational Cooperation Project (No05SN07114)
文摘A novel dynamic software allocation algorithm suitable for pervasive computing environments is proposed to minimize power consumption of mobile devices. Considering the power cost incurred by the computation, communication and migration of software components, a power consumption model of component assignments between a mobile device and a server is set up. Also, the mobility of components and the mobility relationships between components are taken into account in software allocation. By using network flow theory, the optimization problem of power conservation is transformed into the optimal bipartition problem of a flow network which can be partitioned by the max-flow rain-cut algorithm. Simulation results show that the proposed algorithm can save si^nificantlv more energy than existing algorithms.
基金supported by the National Natural Science Foundation of China under Grant 61272519the Research Funds of Blockchain Joint Lab between BUPT and BCTthe joint Blockchain and Security Lab between BUPT and CAPSTONE
文摘Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5 G generation environment, and can apply in the DRM-related applications.
文摘Mental health problems in children and adolescents include several types of emotional and behavioural disorders, including disruptive, depression, anxiety and pervasive developmental(autism) disorders, characterized as either internalizing or externalizing problems. Disruptive behavioural problems such as temper tantrums, attention deficit hyperactivity disorder, oppositional, defiant or conduct disorders are the commonest behavioural problems in preschool and school age children. The routine Paediatric clinic or Family Medicine/General Practitioner surgery presents with several desirable characteristics that make them ideal for providing effective mental health services to children and adolescents. DSM-5 and ICD-10 are the universally accepted standard criteria for the classification of mental and behaviour disorders in childhood and adults. The age and gender prevalence estimation of various childhood behavioural disorders are variable and difficult to compare worldwide. A review of relevant published literature was conducted, including published metaanalyses and national guidelines. We searched for articles indexed by Ovid, Pub Med, Pub Med Medical Central, CINAHL, EMBASE, Database of Abstracts and Reviews, and the Cochrane Database of Systematic reviews and other online sources. The searches were conducted using a combination of search expressions including "childhood", "behaviour", "disorders" or "problems". Childhood behaviour and emotional problems with their related disorders have significant negative impacts on the individual, the family and the society. They are commonly associated with poor academic, occupational, and psychosocial functioning. It is important for all healthcare professionals, especially the Paediatricians to be aware of the range of presentation, prevention and management of the common mental health problems in children and adolescents.
基金funding by the University of Malta’s Internal Research Grants。
文摘In several countries,the ageing population contour focuses on high healthcare costs and overloaded health care environments.Pervasive health care monitoring system can be a potential alternative,especially in the COVID-19 pandemic situation to help mitigate such problems by encouraging healthcare to transition from hospital-centred services to self-care,mobile care and home care.In this aspect,we propose a pervasive system to monitor the COVID’19 patient’s conditions within the hospital and outside by monitoring their medical and psychological situation.It facilitates better healthcare assistance,especially for COVID’19 patients and quarantined people.It identies the patient’s medical and psychological condition based on the current context and activities using a fuzzy context-aware reasoning engine based model.Fuzzy reasoning engine makes decisions using linguistic rules based on inference mechanisms that support the patient condition identication.Linguistics rules are framed based on the fuzzy set attributes belong to different context types.The fuzzy semantic rules are used to identify the relationship among the attributes,and the reasoning engine is used to ensure precise real-time context interpretation and current evaluation of the situation.Outcomes are measured using a fuzzy logic-based context reasoning system under simulation.The results indicate the usefulness of monitoring the COVID’19 patients based on the current context.
基金Supported by the National Natural Science Foun-dation of China (60573030 ,60303026 ,60473020) the Institutefor Infocomm Research 21 Heng Mui Keng Terrace ,Singapore .
文摘Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.
文摘Sub-Saharan Africa(SSA)has the highest maternal and under-five mortality rates in the world.The advent of the coronavirus disease 2019 exacerbated the region's problems by overwhelming the health systems and affecting access to healthcare through travel restrictions and rechanelling of resources towards the containment of the pandemic.The region failed to achieve the Millenium Development Goals on maternal and child mortalities,and is poised to fail to achieve the same goals in the Sustainable Development Goals.To improve on the maternal and child health outcomes,many SSA countries introduced digital technologies for educating pregnant and nurs-ing women,making doctors'appointments and sending reminders to mothers and expectant mothers,as well as capturing information about patients and their illnesses.However,the collected epidemiological data are not being utilised to inform patient care and improve on the quality,efficiency and access to maternal,neonatal and child health(MNCH)care.To the researchers'best knowledge,no review paper has been published that focuses on digital health for MNCH care in SSA and proposes data-driven approaches to the same.Therefore,this study sought to:(1)identify digital systems for MNCH in SSA;(2)identify the applicability and weaknesses of the dig-ital MNCH systems in SSA;and(3)propose a data-driven model for diverging emerging technologies into MNCH services in SSA to make better use of data to improve MNCH care coverage,efficiency and quality.The PRISMA methodology was used in this study.The study revealed that there are no data-driven models for monitoring pregnant women and under-five children in Sub-Saharan Africa,with the available digital health technologies mainly based on SMS and websites.Thus,the current digital health systems in SSA do not support real-time,ubiquitous,pervasive and data-driven healthcare.Their main applicability is in non-real-time pregnancy moni-toring,education and information dissemination.Unless new and more effective approaches are implemented,SSA might remain with the highest and unacceptable maternal and under-five mortality rates globally.The study proposes feasible emerging technologies that can be used to provide data-driven healthcare for MNCH in SSA,and the recommendations on how to make the transition successful as well as the lessons learn from other regions.
基金supported by the Research Funding of the Chinese Academy of Sciences (KGZD-EW-T04-4)
文摘It has long been a dream in the electronics industry to be able to write out electronics directly, as simply as printing a picture onto paper with an offi ce printer. The fi rstever prototype of a liquid-metal printer has been invented and demonstrated by our lab, bringing this goal a key step closer. As part of a continuous endeavor, this work is dedicated to significantly extending such technology to the consumer level by making a very practical desktop liquid-metal printer for society in the near future. Through the industrial design and technical optimization of a series of key technical issues such as working reliability, printing resolution, automatic control, human-machine interface design, software, hardware, and integration between software and hardware, a high-quality personal desktop liquid-metal printer that is ready for mass production in industry was fabricated. Its basic features and important technical mechanisms are explained in this paper, along with demonstrations of several possible consumer end-uses for making functional devices such as li ght-emitting diode(LED) displays. This liquid-metal printer is an automatic, easyto-use, and low-cost personal electronics manufacturing tool with many possible applications. This paper discusses important roles that the new machine may play for a group of emerging needs. The prospective future of this cuttingedge technology is outlined, along with a comparative interpretation of several historical printing methods. This desktop liquid-metal printer is expected to become a basic electronics manufacturing tool for a wide variety of emerging practices in the academic realm, in industry, and in education as well as for individual end-users in the near future.
基金funded by the Abu Dhabi University,Faculty Research Incentive Grant(19300483–Adel Khelifi),United Arab Emirates.Link to Sponsor website:https://www.adu.ac.ae/research/research-at-adu/overview.
文摘Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes,IoV has not been completely explored by business organizations.In order to tackle this problem,we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition,the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulation results show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach.
基金Supported by the National Natural Science Foundation of China (No.60703101)
文摘In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other in advance,they should mutually authenticate each other.The service provider prefers to authenticate the user based on his identity while the user tends to stay anonymous.Privacy and security are two important but seemingly contradictory objectives.As a result,a user prefers not to expose any sensitive information to the service provider such as his physical location,ID and so on when being authenticated.In this paper,a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed.Not only can a user's anonymous authentication be achieved,but also the public key cryptography operations can be reduced by adopting this scheme.Different access control policies for different services are enabled by using biometric encryption technique.The correctness of the proposed authentication and key establishment protocol is formally verified based on SVO logic.
基金Guangdong-Hong Kong Technology Cooperation Funding Scheme, China ( No.2007A010101003)Guangdong-Ministry of Education Industry-University Cooperation Funding Scheme,China (No.2007B090200018)
文摘With the improvement of mobile equipment performance and development of Pervasive Computing,interactive computational applications such as Multi-Agent (MA) systems in Pervasive Computing Environments (PCE) become more and more prevalent. Many applications in PCE require Agent communication,manual control,and diversity of devices. Hence system in PCE must be designed flexible,and optimize the use of network,storage and computing resources. However,traditional MA software framework cannot completely adapt to these new features. A new MA software framework and its Agent Communication Modules to solve the problem brought by PCE was proposed. To describe more precisely,it presents Wright/ADL (Architecture Description Language) description of the new framework. Then,it displays an application called AI Eleven based on this new framework. AI Eleven achieves Agent-Agent communication and good collaboration for a task. Two experiments on AI Eleven will demonstrate the new framework's practicability and superiority.
文摘Wireless networks are key enablers of ubiquitous communication. With the evolution of networking technologies and the need for these to inter-operate and dynamically adapt to user requirements, intelligent networks are the need of the hour. Use of machine learning techniques allows these networks to adapt to changing environments and enables them to make decisions while continuing to learn about their environment. In this paper, we survey the various problems of wireless networks that have been solved using machine-learning based prediction techniques and identify additional problems to which prediction can be applied. We also look at the gaps in the research done in this area till date.
文摘Linear topology is useful in several pervasive application scenarios. Even though a linear topology can be handled by unspecific routing algorithms over general purpose MAC protocols, better performance can be obtained by specialized techniques. This paper describes a new communication scheme called Wireless Wire (WiWi), which builds up a bidirectional wireless communication channel with deterministic properties in terms of throughput and latency over a strip of pervasive devices with short-range transmission capabilities. The system is synchronous and fault tolerant. With low cost and extremely simple devices, WiWi builds up a “wire-like” dielectric link, but its applications are not limited to end-to-end communications. For example, WiWi can be used to collect data from sensors along the path, thus acting as a virtual conveyor belt.
文摘Wireless body area networks (WBANs) use RF communication for interconnection of tiny sensor nodes located in, on, or in close prox- imity to the human body. A WBAN enables physiological signals, physical activity, and body position to be continuously monitored.
基金supported by the National Natural Science Foundation of China(Nos.31270885 and 31471247)the open fund of Functional Oil Laboratory Associated by Oil Crops Research Institute,Chinese Academy of Agricultural Sciences and Infinitus (China) Company Ltd
文摘Non-coding regions are the major component of human genomes and the long non-coding RNA(IncRNA)is a class of pervasive genes located in noncoding regions(Morris and Mattick,2014).IncRNAs play a wide range of regulatory roles in gene transcription,translation,epigenetic modification and protein function by interacting with different types of molecules including DNA,
文摘Recent developments of the wireless sensor network will revolutionize the way of remote monitoring in dif-ferent domains such as smart home and smart care, particularly remote cardiac care. Thus, it is challenging to propose an energy efficient technique for automatic ECG diagnosis (AED) to be embedded into the wireless sensor. Due to the high resource requirements, classical AED methods are unsuitable for pervasive cardiac care (PCC) applications. This paper proposes an embedded real-time AED algorithm dedicated to PCC sys-tems. This AED algorithm consists of a QRS detector and a rhythm classifier. The QRS detector adopts the linear time-domain statistical and syntactic analysis method and the geometric feature extraction modeling technique. The rhythm classifier employs the self-learning expert system and the confidence interval method. Currently, this AED algorithm has been implemented and evaluated on the PCC system for 30 patients in the Gabriel Monpied hospital (CHRU of Clermont-Ferrand, France) and the MIT-BIH cardiac arrhythmias da-tabase. The overall results show that this energy efficient algorithm provides the same performance as the classical ones.
文摘Today, the number of embedded system was applied in the field of automation and control has far exceeded a variety of general-purpose computer. Embedded system is gradually penetrated into all fields of human society, and ubiquitous embedded applications constitute the 'ubiquitous' computing era. Embedded operating system is the core of the em-bedded system, and it directly affects the performance of the whole system. Our Liaoning Provincial Key Laboratory of Embedded Technology has successfully developed five kinds of device-level embedded operating systems by more than ten years’ efforts, and these systems are Webit 5.0, Worix, μKernel, iDCX 128 and μc/os-II 128. This paper mainly analyses and compares the implementation mechanism and performance of these five kinds of device-level embedded operating systems in detail.