نتایج جستجو برای: ubiquitous activities monitoring
تعداد نتایج: 699813 فیلتر نتایج به سال:
OBJECTIVES To summarize excellent research in the field of medical sensor, signal and imaging informatics published in the year 2011. METHODS Synopsis of the articles selected for the IMIA (International Medical Informatics Association) Yearbook 2012 through a manual initial selection and a peer review process to find the best paper in this domain published in 2011. RESULTS Current research...
We have been developing AirScope, an event-based air quality monitoring system, since 2008 and regularly add new features to it. The first version of AirScope is up and running on desktop and mobile platforms; however, it is limited in its capability to assimilate new sensors and components from other parties. In order to add third party components, extensive manual integration is required. In ...
Anesthesiology, V 125 • No 2 263 August 2016 F or more than a decade, the possibility that exposure to anesthetics may be harmful to the developing human brain has intrigued anesthesiologists and the public alike. The urgent desire to create more clarity and the need to inform parents of young children who need surgery have spawned intense research activity, ...
BACKGROUND Advances in ubiquitous computing, smart homes, and sensor technologies enable novel, longitudinal health monitoring applications in the home. Many home monitoring technologies have been proposed to detect health crises, support aging-in-place, and improve medical care. Health professionals and potential end users in the lay public, however, sometimes question whether home health moni...
Ubiquitous computing is about making computers and computerized artefacts a pervasive part of our everyday lifes, bringing more and more activities into the realm of information. The computationalization, informationalization of everyday activities increases not only our reach, efficiency and capabilities but also the amount and kinds of data gathered about us and our activities. In this thesis...
objectives the aim of this paper was to survey the relationship between attachment styles, self-monitoring and cybercrime in social network users. patients and methods the collins and read adult attachment scale, and the snyder self-monitoring and cybercrime scales were sent to 500 social network users. of these, 203 users (103 men and 100 women) filled out the questionnaires. results the resul...
Ubiquitous computing opens new possibilities in various aspects of human activities. The paper proposes an approach to emergency situation response that benefits from the ubiquitous computing. The approach is based on utilizing profiles to facilitate the coordination of the activities of the emergency response operation members. The major approach underlying idea is to represent the operation m...
Various organizations use the RFID technology for linking, tracking and identifying various objects in their operative context. Nevertheless, the RFID components cannot yet be considered as mobile, intelligent and communicating elements of the organization’s information infrastructure. They are not always used for accomplishing the linkage between the physical world and the adopted Information ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید