Search results for "Object-oriented programming"

showing 10 items of 282 documents

Distributed Multi-level Motion Planning for Autonomous Vehicles in Large Scale Industrial Environments

2013

In this paper we propose a distributed coordination algorithm for safe and efficient traffic management of heterogeneous robotic agents, moving within dynamic large scale industrial environments. The algorithm consists of a distributed resource--sharing protocol involving a re--planning strategy. Once every agent is assigned with a desired motion path, the algorithm ensures ordered traffic flows of agents, that avoid inter--robot collision and system deadlock (stalls). The algorithm allows multi--level representation of the environment, i.e. large or complex rooms may be seen as a unique resource with given capacity at convenience, which makes the approach appealing for complex industrial e…

Engineeringbusiness.industryMulti-agent systemDistributed computingReal-time computingDeadlockmulti-robotPlanningResource (project management)Shared memorySettore ING-INF/04 - AutomaticaPath (graph theory)RobotMotion planningbusinessProtocol (object-oriented programming)
researchProduct

Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi–Agent Systems

2007

This paper focuses on the detection of misbehav- ing agents within a group of mobile robots. A novel approach to automatically synthesize a decentralized Intrusion Detection System (IDS) as well as an efficient implementation of local monitors are presented. In our scenario, agents perform possi- bly different independent tasks, but cooperate to guarantee the entire system’s safety. Indeed, agents plan their next actions by following a set of logic rules which is shared among them. Such rules are decentralized, i.e. they depend only on configurations of neighboring agents. However, some agents may not be acting according to this cooperation protocol, due to spontaneous failure or tampering.…

Engineeringbusiness.industryMulti-agent systemDistributed computingReal-time computingMobile robotIntrusion detection systemsecuritySpace (commercial competition)Set (abstract data type)Settore ING-INF/04 - AutomaticaIntrusion detectionmulti-agent systemsRule of inferencebusinessProtocol (object-oriented programming)
researchProduct

Cyber Security for Wireless Semantic (SCADA/DCS) Systems

2016

International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …

Engineeringcomputer.internet_protocolSOAP0211 other engineering and technologies[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]02 engineering and technologyComputer securitycomputer.software_genre[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Supervisory controlSecure communicationSCADAWireless Application ProtocolSemantic Wireless (SCADA/DCS)Wireless Security ProtocolProtocol (object-oriented programming)Semantic Cyber Security[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]021110 strategic defence & security studiesbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS021001 nanoscience & nanotechnology(ZIGBEE/SOAP/SECURITY) ProtocolControl and Systems EngineeringKey (cryptography)0210 nano-technologyDistributed control systembusinessSmart Energetic PlatformcomputerComputer network
researchProduct

DEMO: Unconventional WiFi-ZigBee communications without gateways

2014

Nowadays, the overcrowding of ISM bands is becoming an evident limitation for the performance and widespread usage of 802.11 and 802.15.4 technologies. In this demo, we prove that it is possible to opportunistically exploit the inter-technology interference between 802.11 and 802.15.4 to build an unconventional low-rate communication channel and signalling protocol, devised to improve the performance of each contending technology. Differently from previous solutions, inter-technology communications do not require the deployment of a gateway with two network interfaces, but can be activated (when needed) directly between two heterogeneous nodes, e.g. a WiFi node and a ZigBee node. This capab…

Exploitbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniReading (computer)Node (networking)WiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork interfacezigbeeEmbedded systemDefault gatewayComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinessProtocol (object-oriented programming)Computer networkNeuRFonCommunication channel
researchProduct

Attentional processing biases to threat in schizophrenia: Evidence from a free-viewing task with emotional scenes

2021

Attentional biases to threatening stimuli have been suggested to play a key role in the onset and course of schizophrenia. However, current research has not completely demonstrated this assumption. The aim of this eye-tracking study was to shed light on the underlying psychological mechanisms of schizophrenia by examining the attentional processing of socio-emotional information. Forty-four individuals with schizophrenia and 47 healthy controls were assessed in a 3-s free-viewing task with a social scene (i.e., happy, threatening, or neutral) in competition with a non-social one to determine the effects of emotional information on the different stages of the attentional processing. The loca…

Eye MovementsSchizophrenia (object-oriented programming)EmotionsVulnerabilityEye movementAttentional biasGazeAttention Emotion Eye movements Eye tracking PsychopathologyAttentional BiasPsychiatry and Mental healthBiasSchizophreniaHumansEye trackingMechanisms of schizophreniaPsychologyBiological PsychiatryCognitive psychologyPsychopathologyJournal of Psychiatric Research
researchProduct

On the Convergence of Tsetlin Machines for the IDENTITY- and NOT Operators

2020

The Tsetlin Machine (TM) is a recent machine learning algorithm with several distinct properties, such as interpretability, simplicity, and hardware-friendliness. Although numerous empirical evaluations report on its performance, the mathematical analysis of its convergence is still open. In this article, we analyze the convergence of the TM with only one clause involved for classification. More specifically, we examine two basic logical operators, namely, the "IDENTITY"- and "NOT" operators. Our analysis reveals that the TM, with just one clause, can converge correctly to the intended logical operator, learning from training data over an infinite time horizon. Besides, it can capture arbit…

FOS: Computer and information sciencesComputer Science - Machine LearningTraining setLearning automataComputer Science - Artificial IntelligenceComputer sciencebusiness.industryApplied MathematicsTime horizonPropositional calculusLogical connectiveMachine Learning (cs.LG)Artificial Intelligence (cs.AI)Operator (computer programming)Computational Theory and MathematicsArtificial IntelligencePattern recognition (psychology)Convergence (routing)Identity (object-oriented programming)Computer Vision and Pattern RecognitionArtificial intelligencebusinessSoftwareInterpretabilityIEEE Transactions on Pattern Analysis and Machine Intelligence
researchProduct

Supervised Quantum Learning without Measurements

2017

We propose a quantum machine learning algorithm for efficiently solving a class of problems encoded in quantum controlled unitary operations. The central physical mechanism of the protocol is the iteration of a quantum time-delayed equation that introduces feedback in the dynamics and eliminates the necessity of intermediate measurements. The performance of the quantum algorithm is analyzed by comparing the results obtained in numerical simulations with the outcome of classical machine learning methods for the same problem. The use of time-delayed equations enhances the toolbox of the field of quantum machine learning, which may enable unprecedented applications in quantum technologies. The…

FOS: Computer and information sciencesQuantum machine learningField (physics)Computer Science - Artificial IntelligenceComputer sciencelcsh:MedicineFOS: Physical sciencesMachine Learning (stat.ML)01 natural sciencesUnitary stateArticle010305 fluids & plasmasSuperconductivity (cond-mat.supr-con)Statistics - Machine Learning0103 physical sciencesMesoscale and Nanoscale Physics (cond-mat.mes-hall)lcsh:Science010306 general physicsQuantumProtocol (object-oriented programming)Quantum PhysicsClass (computer programming)MultidisciplinaryCondensed Matter - Mesoscale and Nanoscale PhysicsCondensed Matter - Superconductivitylcsh:RQuantum technologyArtificial Intelligence (cs.AI)ComputerSystemsOrganization_MISCELLANEOUSlcsh:QQuantum algorithmQuantum Physics (quant-ph)Algorithm
researchProduct

Using the factorial experiment method to analyze the corrosion protection process

2017

The organization functions are: research-development, production, commercial, financial-accounting, personnel and quality. In this paper the factorial experimental method will be applied, which is currently one of the most widespread methods used in the research-development departments of the organizations, due to its advantages and efficiency. The experiment was carried out at SC Coifer Impex SRL-Mirsa’s metal structures factory. In this paper it is presented the factors modelling that exerts their influence on two objectives functions: the ensuring the nominal thickness of the rough-cast film and the consumption limiting. For data processing the STATISTICA 7 software was used which provid…

FactorialEngineeringData processingbusiness.industryProcess (engineering)media_common.quotation_subjectMechanical engineeringFactorial experimentNominal sizeSoftwarelcsh:TA1-2040Factory (object-oriented programming)Quality (business)Process engineeringbusinesslcsh:Engineering (General). Civil engineering (General)media_commonMATEC Web of Conferences
researchProduct

The shared image guiding the treatment process. A precondition for integration of the treatment of schizophrenia.

1994

The aim of the study reported here was to develop psychotherapeutic in-patient treatment for acute schizophrenia, following the principles of a need-adapted approach. To improve the integration of experiences which hospital staff have with acutely psychotic patients and their families, systematic supervision sessions were organised. In these sessions, it was possible to achieve shared psychological images through which the whole staff could integrate patients' behaviour and symptoms, both symbolic and non-symbolic. Such an image was called ‘the shared image guiding the treatment process’ (SIGTP). The process of achieving the SIGTP was interpreted through Peircean semiotics, especially the c…

Family therapyAdultMalePsychotherapistAdolescentProcess (engineering)Schizophrenia (object-oriented programming)Personality development050108 psychoanalysisSocial EnvironmentDevelopmental psychologySchizotypal Personality Disorder03 medical and health sciences0302 clinical medicineChild of Impaired ParentsmedicineSemioticsHumans0501 psychology and cognitive sciencesPatient Care TeamSchizophrenia Paranoid05 social sciencesSocial environmentmedicine.diseaseSchizotypal personality disorderCombined Modality TherapyObject AttachmentMother-Child Relations030227 psychiatryHospitalizationPsychiatry and Mental healthPersonality DevelopmentAcute DiseaseImaginationSchizophreniaFamily TherapyFemaleSchizophrenic PsychologyPsychologyIndexicalityThe British journal of psychiatry. Supplement
researchProduct

Optical sectioning microscopy through single-shot Lightfield protocol

2020

Optical sectioning microscopy is usually performed by means of a scanning, multi-shot procedure in combination with non-uniform illumination. In this paper, we change the paradigm and report a method that is based in the light field concept, and that provides optical sectioning for 3D microscopy images after a single-shot capture. To do this we fi rst capture multiple orthographic perspectives of the sample by means of Fourier-domain integral microscopy (FiMic). The second stage of our protocol is the application of a novel refocusing algorithm that is able to produce optical sectioning in real time, and with no resolution worsening, in the case of sparse f luorescent samples.We provide the…

FiMicGeneral Computer ScienceOptical sectioningComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technology3d microscopy01 natural sciences010309 opticsOptics0103 physical sciencesMicroscopyGeneral Materials ScienceProtocol (object-oriented programming)Fourier integral microscopebusiness.industryResolution (electron density)Orthographic projectionGeneral EngineeringSingle shotfourier lightfield microscopeGPU computingÒptica021001 nanoscience & nanotechnologySample (graphics)Microscòpialightfield microscopeoptical sectioninglcsh:Electrical engineering. Electronics. Nuclear engineering0210 nano-technologybusinesslcsh:TK1-9971
researchProduct