Wireless Sensor Networks (WSNs) have found more and more applications in a variety of pervasive computing environments. However, how to support the development, maintenance, deployment and execution of applications ...Wireless Sensor Networks (WSNs) have found more and more applications in a variety of pervasive computing environments. However, how to support the development, maintenance, deployment and execution of applications over WSNs remains to be a nontrivial and challenging task, mainly because of the gap between the high level requirements from pervasive computing applications and the underlying operation of WSNs. Middleware for WSN can help bridge the gap and remove impediments. In recent years, research has been carried out on WSN middleware from different aspects and for different purposes. In this paper, we provide a comprehensive review of the existing work on WSN middleware, seeking for a better understanding of the current issues and future directions in this field. We propose a reference framework to analyze the functionalities of WSN middleware in terms of the system abstractions and the services provided. We review the approaches and techniques for implementing the services. On the basis of the analysis and by using a feature tree, we provide taxonomy of the features of WSN middleware and their relationships, and use the taxonomy to classify and evaluate existing work. We also discuss open problems in this important area of research.展开更多
Mental health problems in children and adolescents include several types of emotional and behavioural disorders, including disruptive, depression, anxiety and pervasive developmental(autism) disorders, characterized a...Mental health problems in children and adolescents include several types of emotional and behavioural disorders, including disruptive, depression, anxiety and pervasive developmental(autism) disorders, characterized as either internalizing or externalizing problems. Disruptive behavioural problems such as temper tantrums, attention deficit hyperactivity disorder, oppositional, defiant or conduct disorders are the commonest behavioural problems in preschool and school age children. The routine Paediatric clinic or Family Medicine/General Practitioner surgery presents with several desirable characteristics that make them ideal for providing effective mental health services to children and adolescents. DSM-5 and ICD-10 are the universally accepted standard criteria for the classification of mental and behaviour disorders in childhood and adults. The age and gender prevalence estimation of various childhood behavioural disorders are variable and difficult to compare worldwide. A review of relevant published literature was conducted, including published metaanalyses and national guidelines. We searched for articles indexed by Ovid, Pub Med, Pub Med Medical Central, CINAHL, EMBASE, Database of Abstracts and Reviews, and the Cochrane Database of Systematic reviews and other online sources. The searches were conducted using a combination of search expressions including "childhood", "behaviour", "disorders" or "problems". Childhood behaviour and emotional problems with their related disorders have significant negative impacts on the individual, the family and the society. They are commonly associated with poor academic, occupational, and psychosocial functioning. It is important for all healthcare professionals, especially the Paediatricians to be aware of the range of presentation, prevention and management of the common mental health problems in children and adolescents.展开更多
Pervasive developmental disorders (PDD) remain little known to populations in developing countries. In black Africa their social representations remain strongly influenced by local belief systems. The general objectiv...Pervasive developmental disorders (PDD) remain little known to populations in developing countries. In black Africa their social representations remain strongly influenced by local belief systems. The general objective of this study was to understand the perceptions and representations of Ivorian parents vis-à-vis PDD. This was a mixed (qualitative and quantitative) prospective cross-sectional study with a descriptive aim that involved a sample of 49 parents. The sampling was of the qualitative type by multiple cases with reasoned choice by saturation. Our results showed that male parents were mostly aged between 40 - 49 years (48.98%) with a higher level of education (67.34%) while mothers were mostly aged between 30 - 39 (61.22%) and a higher level (30.61%). Autistic children were negatively perceived by their parents: either as a source of psychological suffering (82.85%), or as mysterious children who sacrificed their parents (44.66%), or as “bobo” children (mute children in common Ivorian language) (16.66%) or like rude children (13.34%). The supposed origin of the disorder according to the parents was mystical-religious (60.94%);natural (25%);hereditary (6.25%). In 6.25% of cases, PDD were assumed to be of unknown or iatrogenic origin attributable to vaccination (1.56%). 75.51% of parents said that in addition to conventional medical therapies, they also used traditional therapies. The use of this therapeutic alternative would be linked to the perceptions and beliefs that feed the socio-cultural representations of our respondents.展开更多
Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC...Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.展开更多
Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for ...Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5 G generation environment, and can apply in the DRM-related applications.展开更多
In the age of big data, services in the pervasive edge environment are expected to offer end-users better Quality-of-Experience(QoE) than that in a normal edge environment. However, the combined impact of the storage,...In the age of big data, services in the pervasive edge environment are expected to offer end-users better Quality-of-Experience(QoE) than that in a normal edge environment. However, the combined impact of the storage, delivery, and sensors used in various types of edge devices in this environment is producing volumes of high-dimensional big data that are increasingly pervasive and redundant. Therefore, enhancing the QoE has become a major challenge in high-dimensional big data in the pervasive edge computing environment. In this paper, to achieve high QoE, we propose a QoE model for evaluating the qualities of services in the pervasive edge computing environment. The QoE is related to the accuracy of high-dimensional big data and the transmission rate of this accurate data. To realize high accuracy of high-dimensional big data and the transmission of accurate data through out the pervasive edge computing environment, in this study we focused on the following two aspects.First, we formulate the issue as a high-dimensional big data management problem and test different transmission rates to acquire the best QoE. Then, with respect to accuracy, we propose a Tensor-Fast Convolutional Neural Network(TF-CNN) algorithm based on deep learning, which is suitable for high-dimensional big data analysis in the pervasive edge computing environment. Our simulation results reveal that our proposed algorithm can achieve high QoE performance.展开更多
Recent advances in additive manufacturing enable redesigning material morphology on nano-,micro-,and meso-scale,for achieving an enhanced functionality on the macro-scale.From non-planar and flexible electronic circui...Recent advances in additive manufacturing enable redesigning material morphology on nano-,micro-,and meso-scale,for achieving an enhanced functionality on the macro-scale.From non-planar and flexible electronic circuits,through biomechanically realistic surgical models,to shoe soles individualized for the user comfort,multiple scientific and technological areas undergo material-property redesign and enhancement enabled by 3D printing.Fiber-device technology is currently entering such a transformation.In this paper,we review the recent advances in adopting 3D printing for direct digital manufacturing of fiber preforms with complex cross-sectional architectures designed for the desired thermally drawn fiber-device functionality.Subsequently,taking a recursive manufacturing approach,such fibers can serve as a raw material for 3D printing,resulting in macroscopic objects with enhanced functionalities,from optoelectronic to bio-functional,imparted by the fiber-devices properties.展开更多
目的总结SPTAN1基因突变导致全面发育落后伴或不伴癫痫性脑病患儿的临床特征、治疗及基因突变特点。方法回顾性总结2019年8月至2021年9月于中南大学湘雅医院儿科就诊的3例SPTAN1基因突变引起发育性癫痫性脑病5型患儿的临床资料。以“SPT...目的总结SPTAN1基因突变导致全面发育落后伴或不伴癫痫性脑病患儿的临床特征、治疗及基因突变特点。方法回顾性总结2019年8月至2021年9月于中南大学湘雅医院儿科就诊的3例SPTAN1基因突变引起发育性癫痫性脑病5型患儿的临床资料。以“SPTAN1”“发育性癫痫性脑病5型”“developmental and epileptic encephalopathy 5”为检索词查阅在线人类孟德尔遗传数据库、PubMed数据库、中国知网数据库及万方数据库建库至2021年12月相关文献,总结SPTAN1基因突变患儿的临床表现、实验室和影像学检查、治疗及预后特点。结果3例SPTAN1基因突变引起发育性癫痫性脑病5型的患儿均表现为全面发育落后,婴儿期起病。例1出现早发性癫痫性脑病、小头畸形;例2出现房间隔缺损;例3头颅磁共振成像(MRI)显示小脑发育不良;抗发作治疗有部分疗效,但未能控制痉挛发作,经康复训练等治疗后发育稍有改善,但仍落后于同龄儿。3例患儿SPTAN1基因突变均为杂合变异,分别为c.6923_6928dup、c.6619_6621delGAG和c.6749T>C,其中c.6749T>C在既往文献中未见报道。共检索到13篇文献报道SPTAN1基因变异患儿69例,国内未见报道;其中67例为杂合变异,常染色体显性遗传,包括35例错义突变、12例缺失突变、11例重复突变、9例无义突变,其余2例为复合杂合错义突变;共发现38个SPTAN1基因变异位点。患儿临床表型主要包括智力障碍(32/69)、癫痫发作(30/69)、发育落后(28/69)、进行性小头畸形(27/69)、肌张力低下(23/69)、视觉注意力差(15/69)、痉挛性四肢瘫痪(9/69)、胃肠道异常(7/69)等,癫痫发作形式以痉挛发作为主,头部MRI异常主要包括小脑和脑干萎缩、胼胝体发育不良、髓鞘发育不良和脑萎缩。既往报道中多种抗发作治疗药物对癫痫发作有疗效,预后差异大,重者可致死,轻者仅轻度智力障碍或运动障碍。结论SPTAN1基因突变引起的发育性�展开更多
In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other ...In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other in advance,they should mutually authenticate each other.The service provider prefers to authenticate the user based on his identity while the user tends to stay anonymous.Privacy and security are two important but seemingly contradictory objectives.As a result,a user prefers not to expose any sensitive information to the service provider such as his physical location,ID and so on when being authenticated.In this paper,a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed.Not only can a user's anonymous authentication be achieved,but also the public key cryptography operations can be reduced by adopting this scheme.Different access control policies for different services are enabled by using biometric encryption technique.The correctness of the proposed authentication and key establishment protocol is formally verified based on SVO logic.展开更多
Recent developments of the wireless sensor network will revolutionize the way of remote monitoring in dif-ferent domains such as smart home and smart care, particularly remote cardiac care. Thus, it is challenging to ...Recent developments of the wireless sensor network will revolutionize the way of remote monitoring in dif-ferent domains such as smart home and smart care, particularly remote cardiac care. Thus, it is challenging to propose an energy efficient technique for automatic ECG diagnosis (AED) to be embedded into the wireless sensor. Due to the high resource requirements, classical AED methods are unsuitable for pervasive cardiac care (PCC) applications. This paper proposes an embedded real-time AED algorithm dedicated to PCC sys-tems. This AED algorithm consists of a QRS detector and a rhythm classifier. The QRS detector adopts the linear time-domain statistical and syntactic analysis method and the geometric feature extraction modeling technique. The rhythm classifier employs the self-learning expert system and the confidence interval method. Currently, this AED algorithm has been implemented and evaluated on the PCC system for 30 patients in the Gabriel Monpied hospital (CHRU of Clermont-Ferrand, France) and the MIT-BIH cardiac arrhythmias da-tabase. The overall results show that this energy efficient algorithm provides the same performance as the classical ones.展开更多
Linear topology is useful in several pervasive application scenarios. Even though a linear topology can be handled by unspecific routing algorithms over general purpose MAC protocols, better performance can be obtaine...Linear topology is useful in several pervasive application scenarios. Even though a linear topology can be handled by unspecific routing algorithms over general purpose MAC protocols, better performance can be obtained by specialized techniques. This paper describes a new communication scheme called Wireless Wire (WiWi), which builds up a bidirectional wireless communication channel with deterministic properties in terms of throughput and latency over a strip of pervasive devices with short-range transmission capabilities. The system is synchronous and fault tolerant. With low cost and extremely simple devices, WiWi builds up a “wire-like” dielectric link, but its applications are not limited to end-to-end communications. For example, WiWi can be used to collect data from sensors along the path, thus acting as a virtual conveyor belt.展开更多
New challenges including how to share information on heterogeneous devices appear in data-intensive pervasive computing environments. Data integration is a practical approach to these applications. Dealing with incons...New challenges including how to share information on heterogeneous devices appear in data-intensive pervasive computing environments. Data integration is a practical approach to these applications. Dealing with inconsistencies is one of the important problems in data integration. In this paper we motivate the problem of data inconsistency solution for data integration in pervasive environments. We define data qualit~ criteria and expense quality criteria for data sources to solve data inconsistency. In our solution, firstly, data sources needing high expense to obtain data from them are discarded by using expense quality criteria and utility function. Since it is difficult to obtain the actual quality of data sources in pervasive computing environment, we introduce fuzzy multi-attribute group decision making approach to selecting the appropriate data sources. The experimental results show that our solution has ideal effectiveness.展开更多
Wireless networks are key enablers of ubiquitous communication. With the evolution of networking technologies and the need for these to inter-operate and dynamically adapt to user requirements, intelligent networks ar...Wireless networks are key enablers of ubiquitous communication. With the evolution of networking technologies and the need for these to inter-operate and dynamically adapt to user requirements, intelligent networks are the need of the hour. Use of machine learning techniques allows these networks to adapt to changing environments and enables them to make decisions while continuing to learn about their environment. In this paper, we survey the various problems of wireless networks that have been solved using machine-learning based prediction techniques and identify additional problems to which prediction can be applied. We also look at the gaps in the research done in this area till date.展开更多
A type of electromagnetic hip-mounted generator (EHG) is proposed to harvest energy from human hip motion to generate electricity. Based on the law of electromagnetic induction, the EHG generator can convert the kin...A type of electromagnetic hip-mounted generator (EHG) is proposed to harvest energy from human hip motion to generate electricity. Based on the law of electromagnetic induction, the EHG generator can convert the kinetic power of the thigh swing into electrical energy during walking or running. To demonstrate the feasibility of the present method, a prototype of the EHG has been designed and fabricated. A theoretical analysis has been conducted to interpret the working behavior of this prototype. In addition, the performance of the system has been experimentally tested through a rotary motor and human body motion. When driven by the rotary motor at a rotation speed of 100 r/rain, the open-circuit voltage of this prototype is 2.5 V. Further, a maximum open-circuit voltage of approximately 1 V and a maximum output power of 284 μW could be produced respectively when walking with an EHG at a speed of 1.47 m/s. This handy renewable energy technology is promising as a pervasive electricity generation system for a group of wearable or implanted sensors, actuators and mobile electronics.展开更多
基金Hong Kong Polytechnic University under the ICRG Grant No.G-YE57,Hong Kong RGC under the Grant of A Research Center Ubiquitous Computingthe National Hi-Tech Development 863 Program of China under Grant No.2006AA01Z231.
文摘Wireless Sensor Networks (WSNs) have found more and more applications in a variety of pervasive computing environments. However, how to support the development, maintenance, deployment and execution of applications over WSNs remains to be a nontrivial and challenging task, mainly because of the gap between the high level requirements from pervasive computing applications and the underlying operation of WSNs. Middleware for WSN can help bridge the gap and remove impediments. In recent years, research has been carried out on WSN middleware from different aspects and for different purposes. In this paper, we provide a comprehensive review of the existing work on WSN middleware, seeking for a better understanding of the current issues and future directions in this field. We propose a reference framework to analyze the functionalities of WSN middleware in terms of the system abstractions and the services provided. We review the approaches and techniques for implementing the services. On the basis of the analysis and by using a feature tree, we provide taxonomy of the features of WSN middleware and their relationships, and use the taxonomy to classify and evaluate existing work. We also discuss open problems in this important area of research.
文摘Mental health problems in children and adolescents include several types of emotional and behavioural disorders, including disruptive, depression, anxiety and pervasive developmental(autism) disorders, characterized as either internalizing or externalizing problems. Disruptive behavioural problems such as temper tantrums, attention deficit hyperactivity disorder, oppositional, defiant or conduct disorders are the commonest behavioural problems in preschool and school age children. The routine Paediatric clinic or Family Medicine/General Practitioner surgery presents with several desirable characteristics that make them ideal for providing effective mental health services to children and adolescents. DSM-5 and ICD-10 are the universally accepted standard criteria for the classification of mental and behaviour disorders in childhood and adults. The age and gender prevalence estimation of various childhood behavioural disorders are variable and difficult to compare worldwide. A review of relevant published literature was conducted, including published metaanalyses and national guidelines. We searched for articles indexed by Ovid, Pub Med, Pub Med Medical Central, CINAHL, EMBASE, Database of Abstracts and Reviews, and the Cochrane Database of Systematic reviews and other online sources. The searches were conducted using a combination of search expressions including "childhood", "behaviour", "disorders" or "problems". Childhood behaviour and emotional problems with their related disorders have significant negative impacts on the individual, the family and the society. They are commonly associated with poor academic, occupational, and psychosocial functioning. It is important for all healthcare professionals, especially the Paediatricians to be aware of the range of presentation, prevention and management of the common mental health problems in children and adolescents.
文摘Pervasive developmental disorders (PDD) remain little known to populations in developing countries. In black Africa their social representations remain strongly influenced by local belief systems. The general objective of this study was to understand the perceptions and representations of Ivorian parents vis-à-vis PDD. This was a mixed (qualitative and quantitative) prospective cross-sectional study with a descriptive aim that involved a sample of 49 parents. The sampling was of the qualitative type by multiple cases with reasoned choice by saturation. Our results showed that male parents were mostly aged between 40 - 49 years (48.98%) with a higher level of education (67.34%) while mothers were mostly aged between 30 - 39 (61.22%) and a higher level (30.61%). Autistic children were negatively perceived by their parents: either as a source of psychological suffering (82.85%), or as mysterious children who sacrificed their parents (44.66%), or as “bobo” children (mute children in common Ivorian language) (16.66%) or like rude children (13.34%). The supposed origin of the disorder according to the parents was mystical-religious (60.94%);natural (25%);hereditary (6.25%). In 6.25% of cases, PDD were assumed to be of unknown or iatrogenic origin attributable to vaccination (1.56%). 75.51% of parents said that in addition to conventional medical therapies, they also used traditional therapies. The use of this therapeutic alternative would be linked to the perceptions and beliefs that feed the socio-cultural representations of our respondents.
基金Supported by the National Natural Science Foun-dation of China (60573030 ,60303026 ,60473020) the Institutefor Infocomm Research 21 Heng Mui Keng Terrace ,Singapore .
文摘Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.
基金supported by the National Natural Science Foundation of China under Grant 61272519the Research Funds of Blockchain Joint Lab between BUPT and BCTthe joint Blockchain and Security Lab between BUPT and CAPSTONE
文摘Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5 G generation environment, and can apply in the DRM-related applications.
基金supported by the National Key Basic Research and Development (973) Program of China (No. 2015CB352401)the National Natural Science Foundation of China (Nos. 61572262 and 61772286)+1 种基金China Postdoctoral Science Foundation (No. 2017M610252)China Postdoctoral Science Special Foundation (No. 2017T100297)
文摘In the age of big data, services in the pervasive edge environment are expected to offer end-users better Quality-of-Experience(QoE) than that in a normal edge environment. However, the combined impact of the storage, delivery, and sensors used in various types of edge devices in this environment is producing volumes of high-dimensional big data that are increasingly pervasive and redundant. Therefore, enhancing the QoE has become a major challenge in high-dimensional big data in the pervasive edge computing environment. In this paper, to achieve high QoE, we propose a QoE model for evaluating the qualities of services in the pervasive edge computing environment. The QoE is related to the accuracy of high-dimensional big data and the transmission rate of this accurate data. To realize high accuracy of high-dimensional big data and the transmission of accurate data through out the pervasive edge computing environment, in this study we focused on the following two aspects.First, we formulate the issue as a high-dimensional big data management problem and test different transmission rates to acquire the best QoE. Then, with respect to accuracy, we propose a Tensor-Fast Convolutional Neural Network(TF-CNN) algorithm based on deep learning, which is suitable for high-dimensional big data analysis in the pervasive edge computing environment. Our simulation results reveal that our proposed algorithm can achieve high QoE performance.
基金supported by IU Collaborative Research Grants(IUCRG)ProgramIU Faculty Research Support Program-External Resubmission(FRSP-ER)IU Emerging Areas of Research(EAR)Program.
文摘Recent advances in additive manufacturing enable redesigning material morphology on nano-,micro-,and meso-scale,for achieving an enhanced functionality on the macro-scale.From non-planar and flexible electronic circuits,through biomechanically realistic surgical models,to shoe soles individualized for the user comfort,multiple scientific and technological areas undergo material-property redesign and enhancement enabled by 3D printing.Fiber-device technology is currently entering such a transformation.In this paper,we review the recent advances in adopting 3D printing for direct digital manufacturing of fiber preforms with complex cross-sectional architectures designed for the desired thermally drawn fiber-device functionality.Subsequently,taking a recursive manufacturing approach,such fibers can serve as a raw material for 3D printing,resulting in macroscopic objects with enhanced functionalities,from optoelectronic to bio-functional,imparted by the fiber-devices properties.
文摘目的总结SPTAN1基因突变导致全面发育落后伴或不伴癫痫性脑病患儿的临床特征、治疗及基因突变特点。方法回顾性总结2019年8月至2021年9月于中南大学湘雅医院儿科就诊的3例SPTAN1基因突变引起发育性癫痫性脑病5型患儿的临床资料。以“SPTAN1”“发育性癫痫性脑病5型”“developmental and epileptic encephalopathy 5”为检索词查阅在线人类孟德尔遗传数据库、PubMed数据库、中国知网数据库及万方数据库建库至2021年12月相关文献,总结SPTAN1基因突变患儿的临床表现、实验室和影像学检查、治疗及预后特点。结果3例SPTAN1基因突变引起发育性癫痫性脑病5型的患儿均表现为全面发育落后,婴儿期起病。例1出现早发性癫痫性脑病、小头畸形;例2出现房间隔缺损;例3头颅磁共振成像(MRI)显示小脑发育不良;抗发作治疗有部分疗效,但未能控制痉挛发作,经康复训练等治疗后发育稍有改善,但仍落后于同龄儿。3例患儿SPTAN1基因突变均为杂合变异,分别为c.6923_6928dup、c.6619_6621delGAG和c.6749T>C,其中c.6749T>C在既往文献中未见报道。共检索到13篇文献报道SPTAN1基因变异患儿69例,国内未见报道;其中67例为杂合变异,常染色体显性遗传,包括35例错义突变、12例缺失突变、11例重复突变、9例无义突变,其余2例为复合杂合错义突变;共发现38个SPTAN1基因变异位点。患儿临床表型主要包括智力障碍(32/69)、癫痫发作(30/69)、发育落后(28/69)、进行性小头畸形(27/69)、肌张力低下(23/69)、视觉注意力差(15/69)、痉挛性四肢瘫痪(9/69)、胃肠道异常(7/69)等,癫痫发作形式以痉挛发作为主,头部MRI异常主要包括小脑和脑干萎缩、胼胝体发育不良、髓鞘发育不良和脑萎缩。既往报道中多种抗发作治疗药物对癫痫发作有疗效,预后差异大,重者可致死,轻者仅轻度智力障碍或运动障碍。结论SPTAN1基因突变引起的发育性�
基金Supported by the National Natural Science Foundation of China (No.60703101)
文摘In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other in advance,they should mutually authenticate each other.The service provider prefers to authenticate the user based on his identity while the user tends to stay anonymous.Privacy and security are two important but seemingly contradictory objectives.As a result,a user prefers not to expose any sensitive information to the service provider such as his physical location,ID and so on when being authenticated.In this paper,a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed.Not only can a user's anonymous authentication be achieved,but also the public key cryptography operations can be reduced by adopting this scheme.Different access control policies for different services are enabled by using biometric encryption technique.The correctness of the proposed authentication and key establishment protocol is formally verified based on SVO logic.
文摘Recent developments of the wireless sensor network will revolutionize the way of remote monitoring in dif-ferent domains such as smart home and smart care, particularly remote cardiac care. Thus, it is challenging to propose an energy efficient technique for automatic ECG diagnosis (AED) to be embedded into the wireless sensor. Due to the high resource requirements, classical AED methods are unsuitable for pervasive cardiac care (PCC) applications. This paper proposes an embedded real-time AED algorithm dedicated to PCC sys-tems. This AED algorithm consists of a QRS detector and a rhythm classifier. The QRS detector adopts the linear time-domain statistical and syntactic analysis method and the geometric feature extraction modeling technique. The rhythm classifier employs the self-learning expert system and the confidence interval method. Currently, this AED algorithm has been implemented and evaluated on the PCC system for 30 patients in the Gabriel Monpied hospital (CHRU of Clermont-Ferrand, France) and the MIT-BIH cardiac arrhythmias da-tabase. The overall results show that this energy efficient algorithm provides the same performance as the classical ones.
文摘Linear topology is useful in several pervasive application scenarios. Even though a linear topology can be handled by unspecific routing algorithms over general purpose MAC protocols, better performance can be obtained by specialized techniques. This paper describes a new communication scheme called Wireless Wire (WiWi), which builds up a bidirectional wireless communication channel with deterministic properties in terms of throughput and latency over a strip of pervasive devices with short-range transmission capabilities. The system is synchronous and fault tolerant. With low cost and extremely simple devices, WiWi builds up a “wire-like” dielectric link, but its applications are not limited to end-to-end communications. For example, WiWi can be used to collect data from sensors along the path, thus acting as a virtual conveyor belt.
基金supported by the National Natural Science Foundation of China under Grant No. 60970010the National Basic Research 973 Program of China under Grant No. 2009CB320705the Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No. 20090073110026
文摘New challenges including how to share information on heterogeneous devices appear in data-intensive pervasive computing environments. Data integration is a practical approach to these applications. Dealing with inconsistencies is one of the important problems in data integration. In this paper we motivate the problem of data inconsistency solution for data integration in pervasive environments. We define data qualit~ criteria and expense quality criteria for data sources to solve data inconsistency. In our solution, firstly, data sources needing high expense to obtain data from them are discarded by using expense quality criteria and utility function. Since it is difficult to obtain the actual quality of data sources in pervasive computing environment, we introduce fuzzy multi-attribute group decision making approach to selecting the appropriate data sources. The experimental results show that our solution has ideal effectiveness.
文摘Wireless networks are key enablers of ubiquitous communication. With the evolution of networking technologies and the need for these to inter-operate and dynamically adapt to user requirements, intelligent networks are the need of the hour. Use of machine learning techniques allows these networks to adapt to changing environments and enables them to make decisions while continuing to learn about their environment. In this paper, we survey the various problems of wireless networks that have been solved using machine-learning based prediction techniques and identify additional problems to which prediction can be applied. We also look at the gaps in the research done in this area till date.
文摘A type of electromagnetic hip-mounted generator (EHG) is proposed to harvest energy from human hip motion to generate electricity. Based on the law of electromagnetic induction, the EHG generator can convert the kinetic power of the thigh swing into electrical energy during walking or running. To demonstrate the feasibility of the present method, a prototype of the EHG has been designed and fabricated. A theoretical analysis has been conducted to interpret the working behavior of this prototype. In addition, the performance of the system has been experimentally tested through a rotary motor and human body motion. When driven by the rotary motor at a rotation speed of 100 r/rain, the open-circuit voltage of this prototype is 2.5 V. Further, a maximum open-circuit voltage of approximately 1 V and a maximum output power of 284 μW could be produced respectively when walking with an EHG at a speed of 1.47 m/s. This handy renewable energy technology is promising as a pervasive electricity generation system for a group of wearable or implanted sensors, actuators and mobile electronics.