Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Computing: pervasive

Mark Weiser, a leading light at the Xerox PARC computer science laboratory, hrst dehned the concept of ubiquitous or pervasive computing. In an article published in Scientific American in 1991 [12], he wrote The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it. ... [Pg.763]

Some of those computers will be the thousands we access in the course of browsing the Internet. Others will be embedded in walls, chairs, light switches, cars, and even the human body. In short, pervasive computing is the antithesis of virtual reality. Instead of creating an artificial world inside the computer, it invisibly enhances the world that already exists. [Pg.763]

Pervasive computing has numerous applications, but it offers particular potential to the pharmaceutical and health care industries by facilitating the transmission and collection of biological data on a real-time basis outside a clinical setting. That, in turn, means it can be used to monitor patients and manage their health to test new drugs in totally different ways and to deliver health care anywhere, anytime [13]. [Pg.764]

In addition to such direct advantages, pervasive computing has a big social contribution to make. It can be used, for example, to enable patients and their relatives to keep in touch, and to help people with cognitive disabilities function on a daily basis. One illness that lends itself to such treatment is senile dementia, which is likely to be a growing trend in the graying populations of the Western World. [Pg.764]

However, pervasive computing will ultimately do much more it will change the very way in which new drugs are tested. At present, all drugs go through three clinical phases, but the process is both very costly and very inefficient. Clinical trials cannot detect rare side effects and drug interactions, or sometimes even fairly common reactions. In fact, one recent study conducted by Harvard Medical School and Public Citizen, the US consumer advocacy... [Pg.768]

But the power of pervasive computing is not simply its ability to monitor the health of individual patients and trigger remedial action it will also... [Pg.770]

Although, as stated at the beginning of this chapter, novel IT strategies cannot transform the pharmaceutical industry the discovery, development, and delivery to the patient of innovative new medicines meeting a variety of unmet medical needs is entirely dependent on the successful implementation and integration of powerful, predictive, and pervasive computing. [Pg.772]

Davies N, Henderson S. Drngs, devices and the promise of pervasive computing. Curr Drug Discov 2003 October 25-28. [Pg.773]

Stanford V. Using pervasive compnting to deliver elder care. IEEE Pervasive Comput Mobile Ubiquitous Syst 2002 1 10-13. [Pg.773]

The traditional computing model where data are exchanged across the network becomes inefficient and inadequate when vast amounts of data are involved or when the data need to be protected for compliance to privacy laws. The traditional computing model where software is kept stationary on a designated system becomes not only inefficient but inadequate for pervasive computing environment. [Pg.383]

Secondly, globalized production cannot work unless aU elements of the company s global operations fit together without error. Thus, new production systems based on pervasive computer-mediated design and manufacturing can assemble parts from up and down the supply chain without first-time errors of fit. Modern civil and military aircraft production give prime examples of this freedom from physical error. In a customer-oriented system, any over-cost or delayed delivery is an error with the same effects on company performance as a defective product. The implication for test and inspection is that we must be able to measure these customer needs and convert them into measurable precursors of error states. [Pg.1889]

Liu, J.J., Xu, W., Huang, M.-C., Alshurafa, N., Sarrafzadeh, M., Raut, N., Yadegar, B., 2013b. A dense pressure sensitive bedsheet design for imobtrusive sleep posture monitoring. In 2013 IEEE Intemational Conference on Pervasive Computing and Communications (PerCom), San Diego. [Pg.213]

Paradiso JA, Starner T (2005) Energy scavenging for mobile and wireless electronics. IEEE Pervasive Comput 4(1) 18-27... [Pg.94]

Bellavista P, Kupper A, Helal S (2008) Location-based services back to the future. Pervasive Comput IEEE 7(2) 85-89... [Pg.168]

Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W. (2004). Security and privacy aspects of low-cost radio frequency identification systems. InProceedings ofSecurity in Pervasive Computing 2003. [Pg.140]

D. H. Wilson and C. Atkeson, Simultaneous tracking and activity recognition (STAR) using many anonymous, binary sensors, in Pervasive Computing Lecture Notes in Computer Science, Vol. 3468, pp. 62-79,2005. [Pg.620]

J.P. Walters, Z. Liang, W. Shi, V. Chaudhary, Wireless sensor network security a survey, in Y. Xiao (Ed.), Security in Distributed, Grid, Mobile and Pervasive Computing, Auerbach PubUcations, CRC Press, 2007. [Pg.144]

Jayaraman, S., 2014. A note on smart textiles. IEEE Pervasive Computing 2, 5—6. [Pg.534]

T. Stiefmeier, D. Roggen, G. Troster, G. Ogris, P. Lukowicz, Wearable activity tracking in car manufacturing. Pervasive Comput. IEEE 7 (2) (April—June 2008) 42—50. [Pg.656]


See other pages where Computing: pervasive is mentioned: [Pg.753]    [Pg.763]    [Pg.763]    [Pg.763]    [Pg.764]    [Pg.764]    [Pg.765]    [Pg.767]    [Pg.768]    [Pg.769]    [Pg.769]    [Pg.769]    [Pg.771]    [Pg.771]    [Pg.771]    [Pg.771]    [Pg.772]    [Pg.127]    [Pg.129]    [Pg.614]    [Pg.614]    [Pg.844]    [Pg.1]    [Pg.229]    [Pg.620]    [Pg.700]    [Pg.201]    [Pg.1]   
See also in sourсe #XX -- [ Pg.768 , Pg.771 ]

See also in sourсe #XX -- [ Pg.201 ]




SEARCH



© 2024 chempedia.info