Search results for " Programming"
showing 10 items of 1616 documents
A generalized transitive closure for relational queries
1988
We augment relational algebra with a generalized transitive closure operator that allows for the efficient evaluation of a subclass of recursive queries. The operator is based on a composition operator which is as general as possible when the operator is required to be associative and when only relational algebra operators are used in its definition. The closure of such a composition can be computed using the well-known efficient algorithms designed for the computation of the usual transitive closure. Besides the case in which complete materialization of recursive relations are required, our strategy also yields an efficient solution in the case in which a selection is applied to the closur…
Evaluating Model-Driven Development Claims with Respect to Quality: A Family of Experiments
2021
[EN] Context: There is a lack of empirical evidence on the differences between model-driven development (MDD), where code is automatically derived from conceptual models, and traditional software development method, where code is manually written. In our previous work, we compared both methods in a baseline experiment concluding that quality of the software developed following MDD was significantly better only for more complex problems (with more function points). Quality was measured through test cases run on a functional system. Objective: This paper reports six replications of the baseline to study the impact of problem complexity on software quality in the context of MDD. Method: We con…
Auditory temporal processing in schizophrenia: high level rather than low level deficits?
2006
INTRODUCTION: Patients with schizophrenia demonstrate a wide range of information processing deficits. Most recent studies argue in favour of high level deficits, including attention and context processing, whereas fewer studies have demonstrated deficits at earlier stages of processing, such as perceptual discrimination and organisation. This is the first study to investigate both high and low level processing, within a single paradigm, in the case of auditory temporal processing in schizophrenia. METHODS: Patients with schizophrenia were compared to controls on a series of tasks involving three auditory temporal processes varying from low to higher level: (1) segregation of a complex sequ…
Pose classification using support vector machines
2000
In this work a software architecture is presented for the automatic recognition of human arm poses. Our research has been carried on in the robotics framework. A mobile robot that has to find its path to the goal in a partially structured environment can be trained by a human operator to follow particular routes in order to perform its task quickly. The system is able to recognize and classify some different poses of the operator's arms as direction commands like "turn-left", "turn-right", "go-straight", and so on. A binary image of the operator silhouette is obtained from the gray-level input. Next, a slice centered on the silhouette itself is processed in order to compute the eigenvalues …
Four-subtest short-form of the WAIS-IV for assessment of patients diagnosed with schizophrenia.
2021
Abstract Introduction The present study aimed to obtain a short form of the Spanish version of the WAIS-IV for patients diagnosed with schizophrenia that requires about half an hour to be administered. The reduced test can be very useful in clinical and research settings when an estimation of the intelligence quotient (IQ) is required to decide about intervention programs or to describe the sample. Materials and methods A sample of 143 patients participated in the study, 91 out of them were the test group, and the other 52 were used for a cross-validation analysis. To increase the content validity, the decision was made to create a short form composed of a subtest of each of the four cognit…
An Island Strategy for Memetic Discrete Tomography Reconstruction
2014
In this paper we present a parallel island model memetic algorithm for binary discrete tomography reconstruction that uses only four projections without any further a priori information. The underlying combination strategy consists in separated populations of agents that evolve by means of different processes. Agents progress towards a possible solution by using genetic operators, switch and a particular compactness operator. A guided migration scheme is applied to select suitable migrants by considering both their own and their sub-population fitness. That is, from time to time, we allow some individuals to transfer to different subpopulations. The benefits of this paradigm were tested in …
Potencialidades de Google Maps en la investigación social aplicada
2019
In recent years, Google has devoted resources to build a complete map of the world. They constantly scan the territory, collecting a large amount of data that provides updated and complete geographic information. This allows us to have an interoperable map that provides the end user with a search tool, not only of routes but also of shops, equipment and any type of geo-referenced information. In addition, Google Maps provides a series of Application Programming Interface (API), which provides a library of set of subroutines, functions and procedures (in object-oriented programming) that can be used by other software to automate the extraction of information of the Google platform. These fre…
Search for exclusive photoproduction ofZc±(3900) at COMPASS
2015
A search for the exclusive production of the Z(c)(+/-)(3900) hadron by virtual photons has been performed in the channel Z(c)(+/-)(3900). J/Psi pi(+/-). The data cover the range from 7GeV to 19GeV in the centre-of- mass energy of the photon-nucleon system. The full set of the COMPASS data set collected with a muon beam between 2002 and 2011 has been used. An upper limit for the ratio BR(Z(c)(+/-)(3900)-> J/Psi pi(+/-)) x sigma(gamma N) -> Z(c)(+/-)(3900) N/sigma gamma N -> J/Psi N 3.7 x10(-3) has been established at the confidence level of90%. (C) 2015 The Authors. Published by Elsevier B.V.
A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users
2003
Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.
Interactive Tools for the Visualization of Tangible and Intangible Silk Heritage Emerging from an Interdisciplinary Work
2021
Silk is a unique example of heritage where memory, identity, creativity and knowledge can be found in just one piece. It is a multifaceted, living heritage, as it consists of more than the fabrics themselves, but also the techniques associated with them, historical buildings, trades, festivities, etc. Therefore, designers, weavers, painters, sellers and users are involved in it. However, it is also a fragile heritage, alive in the few industries that still weave with historical looms. Additionally, the COVID19 pandemic has put the entire artisanal and small industrial sector of European silk in risk of disappearing. In this, paper we show some results of the SILKNOW project, whose main obje…