Pervasive Computing

Author(s):  
Emerson Loureiro ◽  
Glauber Ferreira ◽  
Hyggo Almeida ◽  
Angelo Perkusich

In this chapter, we introduce the key ideas related to the paradigm of pervasive computing. We discuss its concepts, challenges, and current solutions by dividing it into four research areas. Such division is how we were able to understand what really is involved in pervasive computing at different levels. Our intent is to provide readers with introductory theoretical support in the selected research areas to aid them in their studies of pervasive computing. Within this context, we hope the chapter can be helpful for researchers of pervasive computing, mainly for the beginners, and for students and professors in their academic activities.

Author(s):  
Emerson Loureiro ◽  
Glauber Ferreira ◽  
Hyggo Almeida ◽  
Angelo Perkusich

In this chapter, we introduce the key ideas related to the paradigm of pervasive computing. We discuss its concepts, challenges, and current solutions by dividing it into four research areas. Such division is how we were able to understand what really is involved in pervasive computing at different levels. Our intent is to provide readers with introductory theoretical support in the selected research areas to aid them in their studies of pervasive computing. Within this context, we hope the chapter can be helpful for researchers of pervasive computing, mainly for the beginners, and for students and professors in their academic activities.


2011 ◽  
pp. 9-35
Author(s):  
Emerson Loureiro ◽  
Glauber Ferreira ◽  
Hyggo Almeida ◽  
Angel Perkusich

In this chapter, we introduce the key ideas related to the paradigm of pervasive computing. We discuss its concepts, challenges, and current solutions by dividing it into four research areas. Such division is how we were able to understand what really is involved in pervasive computing at different levels. Our intent is to provide readers with introductory theoretical support in the selected research areas to aid them in their studies of pervasive computing. Within this context, we hope the chapter can be helpful for researchers of pervasive computing, mainly for the beginners, and for students and professors in their academic activities.


2009 ◽  
pp. 228-253
Author(s):  
Emerson Loureiro ◽  
Glauber Ferreira ◽  
Hyggo Almeida ◽  
Angelo Perkusich

In this chapter, we introduce the key ideas related to the paradigm of pervasive computing. We discuss its concepts, challenges, and current solutions by dividing it into four research areas. Such division is how we were able to understand what really is involved in pervasive computing at different levels. Our intent is to provide readers with introductory theoretical support in the selected research areas to aid them in their studies of pervasive computing. Within this context, we hope the chapter can be helpful for researchers of pervasive computing, mainly for the beginners, and for students and professors in their academic activities.


2021 ◽  
Vol XII (1 (34)) ◽  
pp. 167-182
Author(s):  
Anna Gaweł

In pedagogical literature health pedagogy is trated as a subdiscipline of pedagogy, within which the theoretical foundations of modern health education are created. It has theoretical support in classical social pedagogy. The subject of research of health pedagogy is interdisciplinary and it covers issues related to a social health reality, which are analyzed from a pedagogical perspective and on the basis of the assumptions of modern philosophy of health and in connection with the achievements of medical and social sciences in the areas related to the protection and promotion of health. The article presents the formation of the theoretical foundations of pedagogical practice focused on health goals and the concepts and methods of practicing health pedagogy that are emerging today.


2020 ◽  
Vol 9 (6) ◽  
pp. 339
Author(s):  
Zengli Wang ◽  
Hong Zhang

Empirical studies have focused on investigating the interactive relationships between crime pairs. However, many other types of crime patterns have not been extensively investigated. In this paper, we introduce three basic crime patterns in four combinations. Based on graph theory, the subgraphs for each pattern were constructed and analyzed using criminology theories. A Monte Carlo simulation was conducted to examine the significance of these patterns. Crime patterns were statistically significant and generated different levels of crime risk. Compared to the classical patterns, combined patterns create much higher risk levels. Among these patterns, “co-occurrence, repeat, and shift” generated the highest level of crime risk, while “repeat” generated much lower levels of crime risk. “Co-occurrence and shift” and “repeat and shift” showed undulated risk levels, while others showed a continuous decrease. These results outline the importance of proposed crime patterns and call for differentiated crime prevention strategies. This method can be extended to other research areas that use point events as research objects.


Author(s):  
Alberto Abad ◽  
Thaís Marques Abad

South America has become the new epicenter of the coronavirus, especially in Brazil where the disease continues to spread exponentially across the country. This text aims to analyze the psychosocial factors of Covid-19 on back to school strategies in Brazil from a bioecological perspective. At the microsystem level, the population is experiencing different levels of stress and fear; at the microsystem level, changes in routines, separation from family and friends, and closure of schools; and at the macrosystem level, national guidelines to control the pandemic, institutional standards on a national and international scale. Therefore, the main focus for the success of school return must be in the prevention of contagion and with physical and psychological health, and should not only consider the demands of curricula, financial or administrative management. For this reason, it is paramount that greater female representativeness is increased in decision-making levels of the meso and macrosystem, regarding the resumption of school and academic activities in the pandemic period, since the number of female leaders in decision-making, is still insufficient.


2014 ◽  
Vol 71 (3) ◽  
pp. 1090-1104 ◽  
Author(s):  
Yanfei Kang ◽  
Danijel Belušić ◽  
Kate Smith-Miles

Abstract Time series are characterized by a myriad of different shapes and structures. A number of events that appear in atmospheric time series result from as yet unidentified physical mechanisms. This is particularly the case for stable boundary layers, where the usual statistical turbulence approaches do not work well and increasing evidence relates the bulk of their dynamics to generally unknown individual events. This study explores the possibility of extracting and classifying events from time series without previous knowledge of their generating mechanisms. The goal is to group large numbers of events in a useful way that will open a pathway for the detailed study of their characteristics, and help to gain understanding of events with previously unknown origin. A two-step method is developed that extracts events from background fluctuations and groups dynamically similar events into clusters. The method is tested on artificial time series with different levels of complexity and on atmospheric turbulence time series. The results indicate that the method successfully recognizes and classifies various events of unknown origin and even distinguishes different physical characteristics based only on a single-variable time series. The method is simple and highly flexible, and it does not assume any knowledge about the shape geometries, amplitudes, or underlying physical mechanisms. Therefore, with proper modifications, it can be applied to time series from a wider range of research areas.


Author(s):  
Attila Csaba Marosi ◽  
Péter Kacsuk

Cloud Computing (CC) offers simple and cost effective outsourcing in dynamic service environments and allows the construction of service-based applications extensible with the latest achievements of diverse research areas. CC is built using dedicated and reliable resources and provides uniform seemingly unlimited capacities. Volunteer Computing (VC) on the other hand uses volatile, heterogeneous and unreliable resources. This chapter per the authors makes an attempt starting from a definition for Cloud Computing to identify the required steps and formulate a definition for what can be considered as the next evolutionary stage for Volunteer Computing: Volunteer Clouds (VCl). There are many idiosyncrasies of VC to overcome (e.g., volatility, heterogeneity, reliability, responsiveness, scalability, etc.). Heterogeneity exists in VC at different levels. The vision of CC promises to provide a homogeneous environment. The goal of this chapter per the authors is to identify methods and propose solutions that tackle the heterogeneities and thus, make a step towards Volunteer Clouds.


2018 ◽  
Vol 2 (3) ◽  
pp. 141-152
Author(s):  
Minghong Chen ◽  
Jingye Qu ◽  
Yuan Xu ◽  
Jiangping Chen

Abstract Following an integrated data analytics framework that includes descriptive analysis and multiple automatic content analysis, we examined 265 projects that have been funded by the National Science Foundation (NSF) under the Smart and Connected Health (SCH) program. Our analysis discovered certain characteristics of these projects, including the distribution of the funds over years, the leading organizations in SCH, and the multidisciplinary nature of these projects. We also conducted content analysis on project titles and automatic analysis on the abstracts of the projects, including term frequency/word cloud analysis, clustering analysis, and topic modeling using Biterm method. Our analysis found that five main research areas were explored in these projects: system or platform development, modeling or algorithmic development for various purposes, designing smart health devices, clinical data collection and application, and education and academic activities of SCH. Together we obtained a comparatively fair understanding of these projects and demonstrated how different analytic approaches could complement each other. Future research will focus on the impact of these projects through an analysis of their publications and citations.


2010 ◽  
Vol 22 (5) ◽  
pp. 761 ◽  
Author(s):  
Kelly M. Hare ◽  
Alison Cree

Research on the causes of pregnancy failure in vertebrates has historically been mammal-focussed. However, live-birth (viviparity) has evolved multiple times, and is present in all other vertebrate taxa except Aves and Agnatha. Viviparous lizards (O. Squamata, excluding snakes and amphisbaenians) provide a valuable experimental group when studying major evolutionary events and some are also species of high conservation value. Consequently, both researchers and herpetoculturists often require high reproductive output from captive-held lizards. We reviewed the literature to determine potential or known causes of pregnancy failure for captive lizards. Pregnancy success across species averages ~86%, but varies extensively and does not appear to be related to embryonic stage when brought into captivity or level of placentation. Causes of pregnancy failure also vary among species, but correct thermal environments are vital to success, and providing adequate nutrition before vitellogenesis increases the number of viable offspring. A coordinated sequence of hormonal changes involving both pro-pregnancy and pro-labour factors is important for successful pregnancies, although uncertainty remains around the maternal concentrations of corticosterone that allow successful development. Several research areas commonly studied in mammals have yet to be explored or fully addressed in pregnant lizards, including impacts of toxins, parasites, UV light and nutritional quality. As viviparity has evolved over 100 times in lizards, and many different levels of placentation exist, pregnant lizards provide valuable models for studies in ecology and evolution and offer a useful comparison for studies on other viviparous vertebrates.


Sign in / Sign up

Export Citation Format

Share Document