Top PDF Mobile Technologies Internet of Things Concept Support

Mobile Technologies Internet of Things Concept Support

Mobile Technologies Internet of Things Concept Support

V dnešní době se čím dál více využívá konceptu Internet Of Things (IOT) a to nejen v oblasti technického průmyslu nebo zemědělství, ale také ve zdravotnictví. Předměty, věci a nebo zvířata či lidé mohou představovat entitu, jednotku, která se může označit jednoduchým a ekonomicky nenáročným identifikátorem, který se nazývá NFC (Near Field Communication) tag. Tento identifikátor v sobě nese určitou informaci o stavu dané věci či člověka.

43 Read more

Collaborative Edge Computing in Mobile Internet of Things

Collaborative Edge Computing in Mobile Internet of Things

This research explores the geographic concept of place and its relationship to identity in contemporary poetry performances. Identity is the most prominent issue of New World African folklore studies, stemming from problems with race, nationhood, and colonial influences. Moreover, many scholars recognize that there is significantly less discernible African retention in African American folklore compared to other New World African folklore. Thus, this research examines contemporary African American storytelling through observing performances of poetry, a notable representation of folklore, to investigate whether African memory has been mobilized in today’s African American folklore. The qualitative method of nonparticipant observation was used to collect data, which included 25 poetry performances by African American poets and artists. This contemporary form of storytelling was coded, analyzed, and then compared to traditional African storytelling traits. Conclusions from this research indicate parallels between storytelling traits observed in contemporary African American poetry and traits that historically have been demonstrated in African storytelling.
Show more

89 Read more

Collaborative Edge Computing in Mobile Internet of Things

Collaborative Edge Computing in Mobile Internet of Things

Mary grew up in the Fourth Ward’s Grady Homes housing projects in a working-class home with three younger siblings whom she helped to raise. Her mother was a homemaker and her father worked in a warehouse. She attended Our Lady of Lords, a Catholic elementary school and the neighborhood high school designated for Blacks. Grady High School was inconveniently located over four miles from Mary’s home, which is why her initial reason for applying was to be with her friends. “I had not heard of Henry Grady [school]. I applied to transfer to Grady because of classmates. I said it won’t be as bad because I'll have my friends with me.” Her education at Howard High had suited her fine and prepared her well for the transfer. Weeks later when Mary learned she was the only one of her friends to advance to the next step, the loneliness sank in but the support of her family forced her to continue. Mary’s memory of how she felt amidst the application and enrollment process was extremely detailed. She recalled going to school, receiving the cold shoulder, being insulted by other students, and having to follow her mother’s advice and not cry in front of others at school. As soon as she saw her mother at the end of the school day, the tears broke through. Mary exhaled, “all day long it’s sitting there, just sitting there. And then when she [mom] got off that bus from work, when I heard her feet, it was like the damn broke.” But it was not just her mother’s strength that came in handy as she walked the halls of Grady.
Show more

170 Read more

Collaborative Edge Computing in Mobile Internet of Things

Collaborative Edge Computing in Mobile Internet of Things

The purpose of this study is to use a two-group pretest/posttest experimental design to examine the effect knowledge and beliefs, self-regulation, and social facilitation have on increasing physical activity in African American women. The goal of this study is to increase physical activity in African American women through a comprehensive, 6-week intervention that increases knowledge and changes beliefs about physical activity, and uses social facilitation and self-regulation. The specific aims of this pilot study are to examine the collective effect of knowledge and beliefs, social facilitation, and self- regulation on the physical activity of African American women using an investigator- designed intervention called GET FIT DON’T QUIT. Thirty-four participants will be recruited from two community churches and life centers. In this study, participants will participate in teaching sessions, round table discussions, and goal setting strategies to begin and increase physical activity, strategies, and techniques to reduce sedentary behaviors, and to learn about the importance of incorporating a support person to assist with increasing physical activity. The outcome, measured at baseline and 2 weeks post- intervention, will be an increase in physical activity. Participants in the intervention group will receive a weekly email reminder, telephone call, or text message (the participant’s choice) about ways to increase physical activity.
Show more

174 Read more

Collaborative Edge Computing in Mobile Internet of Things

Collaborative Edge Computing in Mobile Internet of Things

play when they accepted roles within the playframe that were less desirable or subordinated, such as taking on the role as the twirler rather than jumper in a game of jump rope. Within Nora’s playframe, she enacted the role of the server, and I accepted the role of the customer. Although at the time I did not explicitly consider the social dynamics of our play, after analyzing the transcripts, it appears that in fact, as the newcomer, I did use the features of oral language to defer to Nora’s authority within the playframe. For example, I said, “I’m wondering if you have pizza on your menu.” In this sentence, the word if denoted the conditional existence (Halliday, 2004, p. 323) of the pizza, the word you positioned Nora as the actor of the clause, and the determiner your indicated Nora’s ownership of the materials. Nora determined that indeed, the restaurant did serve pizza by referring to the menu. Nora pointed at the menu and said, “Yes, we do. See?” In this instance, the layering of the gestural mode and oral language, specifically Nora’s user of the interrogative, functioned again as an implicit directive for me to adjust my gaze to the marks on the page. Paradise, Mejia-Arauz, Silva, Dexter, and Rogoff (2014) describe two patterns that teachers use to support children’s learning: supportive guidance versus
Show more

250 Read more

Collaborative Edge Computing in Mobile Internet of Things

Collaborative Edge Computing in Mobile Internet of Things

signature components of CREST-Ed and Net-Q programs, such as the year-long residency and TIP-AAR, have a long-term impact on teacher quality. Results of the multilevel logistic regression and average treatment effect models confirmed that factors such as teacher age, teacher race/ethnicity, school socioeconomic composition, school performance and subject taught were significant predictors of teacher retention. However, teacher race/ethnicity was the only significant variable found in all average treatment effect models, suggesting that the factors influencing teacher retention are dynamic over time and change as teachers gain classroom experience. The study contributes to scholarly knowledge in the design of teacher residency programs and on factors associated with beginning teacher retention. The findings from this study may assist local education agencies and educator preparation providers in understanding ways to support pre-service and beginning teachers. Suggestions for future research and implications for policies addressing pre-service teacher support and teacher retention are discussed.
Show more

144 Read more

Collaborative Edge Computing in Mobile Internet of Things

Collaborative Edge Computing in Mobile Internet of Things

Despite the prevalence of new technologies and online learning-related research, and, despite substantial interests for using mobile devices to support learning, little is known of English Learners’ (ELs) literacy activities on mobile phones. Social networking and learning in online spaces have been a popular topic among many language and literacy educators and researchers for years (Belcher, 1999; Black, 2009; Nelson & Temple, 2011). Now, technology- mediated learning, which was once reliant on computer-assisted online spaces, is moving towards mobile phones. Language learners now interact in a mobile world by using various applications and nearly unlimited online access. Most of the studies related to mobile learning were done with technological evaluations (Petrova & Li, 2009). However, only limited research has been done on ELs’ actual mobile phone language learning and literacy practices in and out of school. Rather, most of the published studies are reviews of existing tools and how they can help learners, not necessarily English learners. Godwin-Jones (2008) reviewed online writing tools to examine what features they have and how they can assist learners. His research clearly shows that emerging technologies provide an opportunity for ELs’ self-development of writing skills using various tools--including Google. He argued that the new challenge for language teachers is the issue of how they can help students extend their Internet world beyond their first language and provide appropriate instruction and tools for students’ self-development in that environment. Literacy practices include what students do and most importantly how they use their
Show more

239 Read more

Collaborative Edge Computing in Mobile Internet of Things

Collaborative Edge Computing in Mobile Internet of Things

Hardware based or binary attestation is based on binaries that have been executed on the execution platform. TPM [18] is a co-processor designed to protect cryptographic keys and record software state of a computing platform by using a set of special-purpose Platform Configuration Registers (PCRs). Each PCR stores a single cryptographic hash which can be read by external software. The concept of a Dynamic Root of Trust for Measurement (DRTM) [19] was introduced to address the issue of static PCR read sequence, by allowing the chain of measurements to begin at a user-defined point in the platforms operation. Software Guard Extensions (SGX) [20] provide a hardware-enforced isolated execution environment (an enclave) for application software. The enclave provides a means of attesting software inside the enclave to other enclaves. Binary attestation is brittle as any configuration changes or upgrades result in different hashes of binaries, even if the platform remains in a trustworthy state, leading to high false positives in flagging threats in a wireless sensor network.
Show more

99 Read more

Towards an Production Concept based on Internet Technologies

Towards an Production Concept based on Internet Technologies

The considerable advantages of Internet Technologies are uncontroversial for the technological infrastructure of information and communications in production processes. According to Ather- ton’s (1999) idea Java-based applications support planning and control of all production proc- esses. In this scenario Internet Technologies integrate the technical CAx-Systems with the eco- nomical ERP. This means, Java connects different technological environments and acts as gate- way between automation technology and information technology. This scenario reminds of the already known basic idea of Computer Integrated Manufacturing (CIM). The application of Internet Technologies is set into the center of the consideration and extensive, heterogeneous functionalities are integrated in a homogeneous web-interface. Nevertheless, this attempt does not achieve new advantages vis-à-vis the CIM-concept or quite a new Production Concept. It only centers the attention to industrial applications of Internet Technologies. However, in the literature some self-contained Production Concepts exist, which more or less consider Internet Technolo- gies in production processes. For the discussion of these concepts, we differentiate four criteria: 1. the guiding idea presented in the literature, 2. the aimed conditions of the production system, 3. (general) recommendations for achieving the aimed conditions and 4. the discussed instruments.
Show more

11 Read more

Internet of things support for marketing activities

Internet of things support for marketing activities

The term “Internet of Things” was conceived in 1999 by Kevin Ashton who was part of a team that discovered how to link objects to the Internet through an RFID (Radio-frequency Identification) tag (Ashton, 2009). The internet of things is beginning to incorporate a growing number of home-based internet enabled devices (Crabtree and Tolmie, 2016; Jara et al, 2014; Yun et al, 2015; Li et al, 2012). The internet of things involves embedding tags, sensors and actuators in objects that are networked through an open standard Internet protocol (Crowley and Coutaz, 2015). Household devices will no longer be simply physical objects, but will carry more information with them and become information and communication technologies as well as physical objects (Dutton, 2014). Porter and Heppelmann (2014) commented that smart connected products offer opportunities for new functionality, higher product utilization and capabilities that cut across and transcend traditional product boundaries. Borgia (2014) stated that the expected huge number of internet enabled devices and the significant amount of available data open new opportunities to create services that will bring tangible benefits to companies and consumers.
Show more

15 Read more

Internet of Things: Visions, Technologies, and Areas of Application

Internet of Things: Visions, Technologies, and Areas of Application

In this axis there are posters in railway stations or airports which provided information regarding transportation such as the prize time… these posters are equipped with tags NFC (Near Field Communication: is a standard based short-range wireless connection technology that enabled simple and safe peer-to-peer interconnections between electronics devices). The user can then obtain information on several categories of options on the web either by its hovering mobile phone on the NFC tag, or by pointing the mobile phone for visual markers. The mobile phone automatically gets information of the associated web services(stations, number of passengers, costs, availability and type of services) this application also allows the user to buy tickets online [27].
Show more

9 Read more

Security Threats and Technologies in Internet of Things System

Security Threats and Technologies in Internet of Things System

IV. S ECURITY CHALLENGES AND SECURITY TECHNOLOGIES Making sure that the Internet of Things (IoT) system is secure and reliable is the biggest challenge in current time. Due to various latest technologies in the modern world like wireless technologies, sensor-based technologies, mobile network, etc. the new concepts are used like Mobile Ad-hoc network and Internet of Things system. While these types of network are not free from the attacks and any potential risk in the security area due to its flexibility and scalability. Security problems are important for Internet of Things (IoT) tools due to an updated version of various technologies like 3G or 4G communication networks, wireless network, and mobile broadband network. Every devices or node of the Internet of Things (IoT) system is linked together with the help of the Internet which is basically not secure.
Show more

6 Read more

Collaborative Edge Computing in Mobile Internet of Things

Collaborative Edge Computing in Mobile Internet of Things

Environmental Theory model, ideas and principles were deemed pertinent to the issues to be addressed in the writer’s selected scholarly project on reducing health disparities in the underserved populations. It is important to have a framework that connects all the necessary aspects and the focus of any project. A conceptual framework is the roadmap that guides or shows the direction of the project of interest such as structure, process and outcome (Moran, Burson & Conrad, 2017). A theoretical framework on the other hand, is designed as a guide to a DNP scholarly project to explain, support or challenge existing theories or assumptions (Moran et al. 2017). Nightingale’s Environmental Theory involves consideration of external
Show more

30 Read more

Collaborative Edge Computing in Mobile Internet of Things

Collaborative Edge Computing in Mobile Internet of Things

When teaching learners in the art classroom with special needs and considerations there are two major ways to adapt the curriculum to their intelligences and abilities known as accommodations and modifications. Understanding the difference in our teaching practice is essential “because accommodations do not affect what is being measured and reported, but modifications do” (Jung & Guskey, 2012, p. 51). Accommodations allow students to fully participate in the learning. They are “supports that provide access to the general curriculum but do not fundamentally alter the learning goal” (Jung & Guskey, 2012, p. 51). In an art classroom, a common accommodation would be to wrap padding around a pencil to allow student with a lack of fine motor skills to grasp the pencil easily and comfortably or provide a special flat compass for that same student to more easily draw a circle with control. Modifications are used when accommodations are not enough and provide additional support for the student. Modifications are changes that will amend the learning goal or expected grade-level skills (Jung and Guskey, 2012). Using the previously mentioned example, a modification may need to be made for a student who cannot draw at all, allowing for a different and more accessible medium to be used or perhaps providing a pre-drawn circle on the paper so drawing is not required. Understanding these principles guide me to make the necessary changes to my curriculum according to the intelligences of my students. I commonly use accommodations to provide access and as a consequence engage the
Show more

90 Read more

Collaborative Edge Computing in Mobile Internet of Things

Collaborative Edge Computing in Mobile Internet of Things

This thesis examined the question of how the visual arts, in this case through puppet-making, can contribute quality experiences to the life of young refugee children in terms of promoting their cognitive, communication, and social-emotional development. The research findings not only supported this concept, but also showed how the visual arts can provide children with a safe space to constructively express their feelings and ideas in ways that encourage creativity and meaningful learning in the process. These findings were also supported by an informal trial I carried out with a three-year-old using the methods and approaches detailed herein, the puppet- making process and outcomes are shared in the ‘reflections’ section below. This informal trial and the resources I reviewed on the topic, along with my personal background experience, guided the development and design of the guidebook for developing a puppet-making workshop with young refugees, which specifically targets young children’s cognitive, communication, and social-emotional skills through puppetry. The methods outlined in this thesis set the parameters by which the guidebook was developed, and the discussion section elaborated on the processes involved at every stage of implementation. However, moving forward, there remain a few points to take into consideration with regards to (a) the anticipated outcomes, (b) adaptations across different age groups and languages, and (c) research limitations and future implications.
Show more

84 Read more

Collaborative Edge Computing in Mobile Internet of Things

Collaborative Edge Computing in Mobile Internet of Things

There is a small, privileged group of people who are able to research their many birth control options, who have learned about IUDs, who come away from this education with a positive perception of the IUD, and are able to negotiate the consent of their provider to get one. If you are among them, you may feel a lot of anticipatory anxiety and excitement at the thought of getting one of the most effective, longest lasting birth control methods available today. You might spend hours reading stories online, whether those be from the IUD manufacturing page, a Facebook group dedicated to sharing “IUD Side Affect Support and Advice”, a Reddit thread with thousands of comments, or a magazine or blog article about the experience. In the course of that research, you will encounter many “horror stories” about the IUD experience –about fainting from the pain of insertion, about months of non-stop bleeding, about perforated uteruses and infertility, and about babies born with IUDs buried in their backs.
Show more

90 Read more

Collaborative Edge Computing in Mobile Internet of Things

Collaborative Edge Computing in Mobile Internet of Things

support. In recent years, many HBCU athletic departments have undergone significant reductions in their athletic department programming. For example, NCAA Division II institution Paine College dropped their football programs (Logue, 2016). Stillman College dropped from an NCAA institution to an NAIA institution, cutting all but four sport programs. Additionally, Savannah State University decided to drop from a Division I institution to Division II. With these changes in HBCU athletics, many wonder if Division I HBCUs, struggling to maintain an equal financial footing, should continue to try to compete against other Division I PWIs (Trahan, 2016). When programs are cut at these HBCUs, a lack of resources and fiscal responsibility are often the reasons given to students, alumni, and fans. HBCU administrators state that funding university athletic programs are difficult due to participation costs and small enrollment (Savage, 2017). Limited funding results from HBCUs’ commitment to serving low-income students and small endowments, leading to low operating costs (Gasman, 2009). An understanding of this financial picture is important, as smaller operating costs lead to less available resources for athletic departments.
Show more

177 Read more

Collaborative Edge Computing in Mobile Internet of Things

Collaborative Edge Computing in Mobile Internet of Things

Participants were randomized to one of two interventions. The MBAT intervention group had 33 participants partake while the “iQuit” Mindfully group had 38 participants. The MBAT intervention involved eight weekly 2-hour in-person group treatment sessions, nicotine patch therapy, and self-help materials. The aims of MBAT were to: (a) become more aware of thoughts, feelings, and sensations from moment to moment, (b) develop a different way of relating to thoughts, feelings, and sensations, and (c) increase the ability to disengage attention and choose skillful responses to any thoughts, feelings, or situations that arise (Vidrine et al., 2016). MBAT is intended to serve as a primary treatment approach and incorporates meditation practice later within each treatment session. Participants in the iQuit Mindfully condition similarly received the MBAT intervention and also received text messages throughout the day, which remind participants to practice mindfulness. These texts also reminded participants of their personal reasons to quit as well as specific strategies to aid in cessation (ex: reminders to get rid of cues to smoke, reach out for social support, and to use cognitive behavioral strategies taught in MBAT). Participants were also able to text specified words to request help. For example, they may text CRAVE, STRESS, or SLIP at any point to received additional support through text messages for coping with cravings, stress, or smoking lapses, respectively.
Show more

49 Read more

Collaborative Edge Computing in Mobile Internet of Things

Collaborative Edge Computing in Mobile Internet of Things

The cells at Day 50 p.i. had lower percentages of both GFP- and hexon-expressing cells than the cultures at 21 days p.i., showing a time-dependent downward trend for viral protein expression similar to what has previously been reported for cell line models of persistent infection (3). In untreated samples from both cultures, the number of GFP-expressing cells was substantially higher than the number positive for hexon. While this discrepancy may reflect a true difference in expression levels, it may also reflect an inferior detection capacity of the hexon antibody compared to the direct detection of the expressed GFP. Interestingly, the number of GFP- and hexon-positive cells both approximately doubled in response to the PMA/Iono treatment, showing that both the reporter and the viral late gene have regulatory elements in common. These data also add additional support for PMA/iono signals being able to increase viral gene expression at the protein level in addition to the mRNA level (Chapter 2, Figure 2-2B). In addition, these data again demonstrate that at least half of the untreated infected cells were not expressing detectable levels of GFP or hexon.
Show more

155 Read more

Collaborative Edge Computing in Mobile Internet of Things

Collaborative Edge Computing in Mobile Internet of Things

of these analyses may tentatively suggest support for the two-factor model for several reasons. The criteria to be used for determining which model fit better were alignment with the results of the third research question, parsimony, and interpretability. The three-factor model is better aligned with the third research question because CBM scores may be unidimensional; however, the results of the third research question must be interpreted with extreme caution because the fit for both models was poor. However, when evaluating the parsimony of the models for the fourth research question, the two-factor model is preferable to the three-factor model. It has fewer dimensions, and it required two fewer correlated error terms to achieve mediocre fit. Lastly, the two-factor model is slightly more interpretable than the three-factor model, both because it has fewer correlated error terms and because it gives inherent meaning to the CBM scores. As an additional consideration, the three-factor model required several correlated error terms between CBM indicators and the indicators from other factors. The fact that CBM indicators may share additional variance with indicators from other factors suggests that they may fit better when modeled as loading onto those other factors. Model fit statistics are presented in Table 7, and the final two-factor model is presented in Figure 16. The results of this model should be interpreted with extreme caution, because the fact that so many parameters needed to be added to the model to achieve even a mediocre fit suggests that the theoretical model may have been a poor starting point for modeling the data.
Show more

140 Read more

Show all 10000 documents...