scholarly journals The Construction of the Fusion and Symbiosis Path of Infant Sports Development Based on Intelligent Environment

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Lefeng Zhao ◽  
Yaping Zhao

In view of the differences and uniqueness of intelligence between people, the application of new educational thoughts is the need of the time; in the educational atmosphere created by the intelligent environment, it is urgent to seek a path of integration and symbiosis. This article takes the development of children's sports driven by the intelligent education project as the main research object, selects our city's children's football as the representative of sports events to carry out case studies, and uses the spectrum education program to explore the intelligent development of intelligent children with logical and mathematical advantages in the field of sports. This paper designs a data fusion method for homogeneous smart sensors. The correlation degree of the nodes in the continuous sampling period is obtained by defining the spatial correlation coefficient, and the confidence value and coherent degree of integration are obtained by applying the angle of attraction between nodes in the definition of fusion strategy in the evaluation of neighborhood, and lastly, the node coefficient of weight is reallocated to validate the fused expression. The feasibility of the simulation is used to confirm the trustworthiness of the solution. Based on the development status of children’s physical education, this article uses intelligent mobile networks to find out the problems in the physical education classes of kindergarten teachers and the problems that are not compatible with the development of children’s physical education. The kindergarten normal students receive targeted physical education and acquire solid professional skills. The study indicates that the percentage of basic motor and basic motility classes in the city's kindergartens is 100%, suggesting that all preschools in the city operate fundamental motor practice classes for a group of children. They have fully realized that basic movement exercises have an impact on children’s body shape.




Author(s):  
Zhanna Vladimirovna Gudinova ◽  
Galina Nikolaevna Zhernakovа ◽  
Irina Vladimirovna Gegechkori ◽  
Elena Ivanovna Tolkova ◽  
Yuliya Sergeevna Vaskovskaya

This research analyses school physical evaluation forms obtained from one of Omsk public schools’ roll books as well as the physical development assessment of 820 students of this school. The findings uncovered a violation of the requirements of SanPiN, the provisions of the Russian Federation Ministry of Health orders regarding the maintenance of physical evaluation forms, the definition of medical groups for students in physical education, and conflicting information about the children’s health, which may cause severe clinical conditions in physical education classes. The noncompliance of the regulatory framework for RPN (in terms of the Health List) and the Russian Federation Ministry of Health (in terms of physical education regulation for children with accommodations) was also uncovered.



2020 ◽  
Vol 2 (10) ◽  
pp. 158-168
Author(s):  
Svitlana Shevchenko ◽  
Yuliia Zhdanovа ◽  
Svitlana Spasiteleva ◽  
Pavlo Skladannyi

This article examines the problem of implementing active teaching methods for students majoring in 125 Cybersecurity. The study of qualitative analysis of information security risks (IS) is presented on the example of studying the discipline "Risk Theory", namely the use of SWOT-analysis tools for risk assessment in the field of IS of small and medium business. General relevance and possibilities of using SWOT-analysis in the field of IS risk to study the internal environment of the organization, its strengths and weaknesses with the definition of enterprise strategies in the external environment: confronting threats to secure information (confidentiality, availability and integrity), and other its development. Based on scientific sources, the main research of the definition is analyzed: IS risks, risk analysis and their quality assessment. The content and procedure of SWOT-analysis are described. Using forms of group work and active methods (trainings) in the educational process, the basic factors for SWOT-analysis of the virtual organization "Internet Provider" were created, methodical expert assessments were conducted to identify the primary features of these factors, the analysis of the results was obtained.It is proved that the introduction of this technology in the educational process promotes the development of theoretical knowledge and the formation and development of practical skills of future specialists in information and cyber security



2015 ◽  
Vol 3 (5) ◽  
pp. 216 ◽  
Author(s):  
Gustavo Dias

This paper addresses the relations between migrants, mobility, tactics, negotiation, and the contemporary definition of borders in the aftermath of 9/11.The empirical focus of this paper is how Brazilians from Alto Paranaiba journey through airports located in the Schengen area and in the British territory to London. As a main research orientation, I use the notion of journey as approached by mobility studies, where actions and skills remain an important link between the wayfarer and the social space in which s/he moves through, the embodied practice to how we grasp the world. Migrants deal and struggle against border regime, but they are not powerless social actors. They rather produce creative resistance to reinvent their journey through the surveillance apparatus, which manage and delimit places with targets and threats. In this process, I explore the notion of border crossing movement as a tactical mobility developed by migrants to overcome the border control imposed by governments in airports. The article was drawn through fieldwork conducted initially in London, between 2009 and 2013, and afterwards in Alto Paranaiba, during 2013. The ethnographic study consisted in semi-structured interviews, participant observation through snowball technique, which enabled me to access a considerable number of participants in these two regions explored. The argument that I develop is that migrants as social actors are part important in the dialogue produced between border crossing and border reinforcement.



2021 ◽  
Vol 297 ◽  
pp. 01019
Author(s):  
Abdeslam Houari ◽  
Tomader Mazri

6G of mobile networks plays a crucial role in improving the capacity and enhancing the quality of services of Vehicle-to-Everything (V2X) based networks evolving in an intelligent environment. VANET is a promising project in the intelligent transportation field using V2X communications. The emergence of several 5G and 6G technologies has raised several challenges for scientists and researchers to allow vehicles and road users to enjoy several services while ensuring their safety on the road. Among these technologies, the unmanned aerial vehicle (UAV), which can perform different tasks for road users and vehicle drivers such as data caching, packet relaying and processing. In this article, we present a new approach based on 6G Unmanned Aerial Vehicles (UAV) technology on a vehicular cloud architecture while exploiting the exchange support of information-centric networking (ICN) for the improvement of network capacity.



2005 ◽  
Vol 24 (3) ◽  
pp. 243-264 ◽  
Author(s):  
Beatriz Muros Ruiz ◽  
Juan-Miguel Fernández-Balboa

Many researchers and theoretical scholars have questioned the social-transformative claims of critical pedagogy (CP) in physical education. Most of these criticisms center on its application in physical education teacher education (PETE). Our knowledge of the perspectives and practices of physical education teacher educators (PETEs) who claim to practice CP, however, is still tentative at best; consequently, the reason for its limited success are still largely unknown. To shed some light on this issue, 17 PETEs who claimed to practice critical pedagogy were interviewed at length regarding their definition of CP, including its principles and purposes, and their pedagogical practices. The results show that more than half of the PETEs did not fully understand the main principles and purposes of CP as presented in the literature, and that many of their methods were incongruent with these principles and purposes. This lack of understanding of CP might be an important factor contributing to its limited success in PETE. In view of this, caution and critical reflection are recommended when engaging in this type of pedagogy. Some implications for PETE are provided as well.



Author(s):  
Alberto Díez Albaladejo ◽  
Fabricio Gouveia ◽  
Marius Corici ◽  
Thomas Magedanz

Next Generation Mobile Networks (NGMNs) constitute the evolution of mobile network architectures towards a common IP based network. One of the main research topics in wireless networks architectures is QoS control and provisioning. Different approaches to this issue have been described. The introduction of the NGMNs is a major trend in telecommunications, but the heterogeneity of wireless accesses increases the challenges and complicates the design of QoS control and provisioning. This chapter provides an overview of the standard architectures for QoS control in Wireless networks (e.g. UMTS, WiFi, WiMAX, CDMA2000), as well as, the issues on this all-IP environment. It provides the state-of-the-art and the latest trends for converging networks to a common architecture. It also describes the challenges that appear in the design and deployment of QoS architectures for heterogeneous accesses and the available solutions. The Evolved Core from 3GPP is analyzed and described as a suitable and promising solution addressing these challenges.



Author(s):  
Robert J Marks II

The literature on the recovery of signals and images is vast (e.g., [23, 110, 112, 257, 391, 439, 791, 795, 933, 934, 937, 945, 956, 1104, 1324, 1494, 1495, 1551]). In this Chapter, the specific problem of recovering lost signal intervals from the remaining known portion of the signal is considered. Signal recovery is also a topic of Chapter 11 on POCS. To this point, sampling has been discrete. Bandlimited signals, we will show, can also be recovered from continuous samples. Our definition of continuous sampling is best presented by illustration.Asignal, f (t), is shown in Figure 10.1a, along with some possible continuous samples. Regaining f (t) from knowledge of ge(t) = f (t)Π(t/T) in Figure 10.1b is the extrapolation problem which has applications in a number of fields. In optics, for example, extrapolation in the frequency domain is termed super resolution [2, 40, 367, 444, 500, 523, 641, 720, 864, 1016, 1099, 1117]. Reconstructing f (t) from its tails [i.e., gi(t) = f (t){1 − Π(t/T)}] is the interval interpolation problem. Prediction, shown in Figure 10.1d, is the problem of recovering a signal with knowledge of that signal only for negative time. Lastly, illustrated in Figure 10.1e, is periodic continuous sampling. Here, the signal is known in sections periodically spaced at intervals of T. The duty cycle is α. Reconstruction of f (t) from this data includes a number of important reconstruction problems as special cases. (a) By keeping αT constant, we can approach the extrapolation problem by letting T go to ∞. (b) Redefine the origin in Figure 10.1e to be centered in a zero interval. Under the same assumption as (a), we can similarly approach the interpolation problem. (c) Redefine the origin as in (b). Then the interpolation problem can be solved by discarding data to make it periodically sampled. (d) Keep T constant and let α → 0. The result is reconstructing f (t) from discrete samples as discussed in Chapter 5. Indeed, this model has been used to derive the sampling theorem [246]. Figures 10.1b-e all illustrate continuously sampled versions of f (t).



2020 ◽  
Vol 165 ◽  
pp. 02018
Author(s):  
Jin Lin ◽  
Ma Yuping

With the development of electronic technology, remote monitoring has become the main development direction of data management. The monitoring of indoor environmental data is our main research content. The OneNET platform provided by China mobile communications corporation is used as the coordination command center of the intelligent monitoring application system for terminal design and development. OneNET platform provides standardized access terminal and the background monitor template type design method of the staff through constructing a set of environmental data acquisition and monitoring system based on OneNET, implementation of indoor environment parameters, such as temperature, temperature and concentration of PM2.5 real-time reporting and management operation, with abnormal data of automatic alarm. The system shows that the design based on the open platform can effectively improve the generation efficiency of new business and promote the development of Internet of things business.



Author(s):  
Phillip Olla ◽  
Joseph Tan

The reference model presented in this chapter encourages the breakdown of m-health systems into the following five key dimensions: communication infrastructure: this is a description of the mobile telecommunication technologies and networks; device type: this relates to the type of device being used such as PDA, sensor, or tablet PC; data display: describes how the data will be displayed to the user and transmitted such as images, e-mail and textual data; application purpose: identification of the objective for the m-health system; application domain: definition of the area that the system will be implemented. Healthcare stakeholders and system implementer can use the reference model presented in this chapter to understand the security implications of the proposed system, identify the technological infrastructure, business requirements and operational needs of the m-health systems being implemented. A reference model to encapsulate the emerging m-health field is needed for cumulative progress in this field. Currently, the m-health field is disjointed and it is often unclear what constitutes an m-health system. In the future, m-health applications will take advantage of technological advances such as device miniaturizations, device convergence, high-speed mobile networks, and improved medical sensors. This will lead to the increased diffusion of clinical m-health systems requiring better understanding of the components, which constitute the m-health system.



Sign in / Sign up

Export Citation Format

Share Document