Search results for "Object-oriented programming"
showing 10 items of 282 documents
Distributed Multi-level Motion Planning for Autonomous Vehicles in Large Scale Industrial Environments
2013
In this paper we propose a distributed coordination algorithm for safe and efficient traffic management of heterogeneous robotic agents, moving within dynamic large scale industrial environments. The algorithm consists of a distributed resource--sharing protocol involving a re--planning strategy. Once every agent is assigned with a desired motion path, the algorithm ensures ordered traffic flows of agents, that avoid inter--robot collision and system deadlock (stalls). The algorithm allows multi--level representation of the environment, i.e. large or complex rooms may be seen as a unique resource with given capacity at convenience, which makes the approach appealing for complex industrial e…
Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi–Agent Systems
2007
This paper focuses on the detection of misbehav- ing agents within a group of mobile robots. A novel approach to automatically synthesize a decentralized Intrusion Detection System (IDS) as well as an efficient implementation of local monitors are presented. In our scenario, agents perform possi- bly different independent tasks, but cooperate to guarantee the entire system’s safety. Indeed, agents plan their next actions by following a set of logic rules which is shared among them. Such rules are decentralized, i.e. they depend only on configurations of neighboring agents. However, some agents may not be acting according to this cooperation protocol, due to spontaneous failure or tampering.…
Cyber Security for Wireless Semantic (SCADA/DCS) Systems
2016
International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …
DEMO: Unconventional WiFi-ZigBee communications without gateways
2014
Nowadays, the overcrowding of ISM bands is becoming an evident limitation for the performance and widespread usage of 802.11 and 802.15.4 technologies. In this demo, we prove that it is possible to opportunistically exploit the inter-technology interference between 802.11 and 802.15.4 to build an unconventional low-rate communication channel and signalling protocol, devised to improve the performance of each contending technology. Differently from previous solutions, inter-technology communications do not require the deployment of a gateway with two network interfaces, but can be activated (when needed) directly between two heterogeneous nodes, e.g. a WiFi node and a ZigBee node. This capab…
Attentional processing biases to threat in schizophrenia: Evidence from a free-viewing task with emotional scenes
2021
Attentional biases to threatening stimuli have been suggested to play a key role in the onset and course of schizophrenia. However, current research has not completely demonstrated this assumption. The aim of this eye-tracking study was to shed light on the underlying psychological mechanisms of schizophrenia by examining the attentional processing of socio-emotional information. Forty-four individuals with schizophrenia and 47 healthy controls were assessed in a 3-s free-viewing task with a social scene (i.e., happy, threatening, or neutral) in competition with a non-social one to determine the effects of emotional information on the different stages of the attentional processing. The loca…
On the Convergence of Tsetlin Machines for the IDENTITY- and NOT Operators
2020
The Tsetlin Machine (TM) is a recent machine learning algorithm with several distinct properties, such as interpretability, simplicity, and hardware-friendliness. Although numerous empirical evaluations report on its performance, the mathematical analysis of its convergence is still open. In this article, we analyze the convergence of the TM with only one clause involved for classification. More specifically, we examine two basic logical operators, namely, the "IDENTITY"- and "NOT" operators. Our analysis reveals that the TM, with just one clause, can converge correctly to the intended logical operator, learning from training data over an infinite time horizon. Besides, it can capture arbit…
Supervised Quantum Learning without Measurements
2017
We propose a quantum machine learning algorithm for efficiently solving a class of problems encoded in quantum controlled unitary operations. The central physical mechanism of the protocol is the iteration of a quantum time-delayed equation that introduces feedback in the dynamics and eliminates the necessity of intermediate measurements. The performance of the quantum algorithm is analyzed by comparing the results obtained in numerical simulations with the outcome of classical machine learning methods for the same problem. The use of time-delayed equations enhances the toolbox of the field of quantum machine learning, which may enable unprecedented applications in quantum technologies. The…
Using the factorial experiment method to analyze the corrosion protection process
2017
The organization functions are: research-development, production, commercial, financial-accounting, personnel and quality. In this paper the factorial experimental method will be applied, which is currently one of the most widespread methods used in the research-development departments of the organizations, due to its advantages and efficiency. The experiment was carried out at SC Coifer Impex SRL-Mirsa’s metal structures factory. In this paper it is presented the factors modelling that exerts their influence on two objectives functions: the ensuring the nominal thickness of the rough-cast film and the consumption limiting. For data processing the STATISTICA 7 software was used which provid…
The shared image guiding the treatment process. A precondition for integration of the treatment of schizophrenia.
1994
The aim of the study reported here was to develop psychotherapeutic in-patient treatment for acute schizophrenia, following the principles of a need-adapted approach. To improve the integration of experiences which hospital staff have with acutely psychotic patients and their families, systematic supervision sessions were organised. In these sessions, it was possible to achieve shared psychological images through which the whole staff could integrate patients' behaviour and symptoms, both symbolic and non-symbolic. Such an image was called ‘the shared image guiding the treatment process’ (SIGTP). The process of achieving the SIGTP was interpreted through Peircean semiotics, especially the c…
Optical sectioning microscopy through single-shot Lightfield protocol
2020
Optical sectioning microscopy is usually performed by means of a scanning, multi-shot procedure in combination with non-uniform illumination. In this paper, we change the paradigm and report a method that is based in the light field concept, and that provides optical sectioning for 3D microscopy images after a single-shot capture. To do this we fi rst capture multiple orthographic perspectives of the sample by means of Fourier-domain integral microscopy (FiMic). The second stage of our protocol is the application of a novel refocusing algorithm that is able to produce optical sectioning in real time, and with no resolution worsening, in the case of sparse f luorescent samples.We provide the…