Search results for "Object-oriented programming"
showing 10 items of 282 documents
Evaluating the feasibility of the Italian version of the computerized interactive remediation of cognition training for schizophrenia (circuits)
2020
Background: Circuits is a computerized cognitive remediation program for individuals with schizophrenia. this study aimed to evaluate the feasibility of the italian version of circuits. MethODs: Feasibility was measured through ad-hoc questionnaires in a non-clinical sample (N.=30; target-score 70%; study 1); in patients with schizophrenia (N.=5; target-score 60%; study 2) and cr therapists (N.=3; target-score 60%; study 2). study 3 was a pilot study investigating: 1) enrolment, compliance, and retention rates; 2) satisfaction; 3) potential post-treatment and follow-up improvements in patients with schizophrenia (N.=20). these results were used to estimate sample size and feasibility for a …
‘We Don’t Differentiate between Old and New Arrivals’. Research Notes on Social Capital Formation in Religious Organizations among Polish Young Migra…
2017
With more than half a million Poles living in the UK, Polish Catholic Church has become an important provider for religious and social services in the UK. In this context, a plethora of religious organizations has been developing around the Polish Parishes especially focusing on youth. Drawing on 12 participant observations and semi-structured interviews with priest, association leaders and Polish youth, this paper asks how social capital is created within religious association by the Polish youth living in the UK. The research identifies 3 types of religious organizations operating in the religious communities and which are the main types of social networks that are formed within these rel…
Design and Implementation of ForCES Protocol
2017
This paper proposes the design and implementation of the ForCES protocol, specifically FP logical point of the ForCES architecture, which is strictly the communication between the CE (Control Element) and the FE (Forwarding Element). It is a flexible and reprogrammable architecture that is established within the specifications issued and defined by the ForCES working group, and consists of elaboration of a protocol that carries information between both elements. In order to comprobate the correct functioning of the implemented the ForCES protocol, is we provide a network testbed scenario, which consist an application client-server. Each device has equipped with the application which based o…
Adaptive live video streaming on low-cost wireless multihop networks for road traffic surveillance in smart cities
2021
Abstract Traffic surveillance is an important issue for Intelligent Transportation Systems (ITS) that helps detect incidents automatically, such as wrong-way drivers, still-standing vehicles and jams. Sometimes these systems require a fast and short-term deployment of video cameras. In these cases, ad-hoc networks could be a low-cost and feasible option, but they have poor performance for video delivery. Thus, we propose a smart live video adaptive streaming technique in order to transport video streams from the cameras to the external road traffic monitoring servers. To achieve this goal, these networks need a thorough study in order to analyze video quality under their inherent constraint…
A Group-Based Protocol for Large Wireless AD-HOC and Sensor Networks
2008
Many routing protocols for ad-hoc networks and sensor networks have been designed, but none of them is based on groups. It is known that grouping nodes gives better performance to the group and to the whole system, thereby avoiding unnecessary message forwarding and additional overheads. We propose an approach where the network is split into several groups of sensors where connections between groups are established as a function of the proximity and the neighbor's available capacity (based on the sensor's energy). In this paper the network architecture is described with its mathematical description and the messages that are needed to proper operation. It is also simulated how much time is n…
MAC learning
2016
Cognition as a way to deal with the challenges of future wireless networks has been largely considered by the recent literature, with a main focus on physical layer adaptability and dynamic spectrum access. In this demo, we show how a simple cognition mechanism can be also applied at the MAC layer, by exploiting the emerging paradigm of programmable wireless cards. The idea is using the formal definition of simple MAC protocol components and platform-independent representation of channel events gathered from the wireless node, for emulating the behavior of protocols which are not currently running on the network, learning about their expected performance, and dynamically reconfiguring the w…
Reaction-diffusion on dynamic inhibition areas: A bio-inspired link scheduling algorithm
2014
We present the Dynamic Inhibition Areas Reaction-Diffusion (DIA-RD) algorithm, a distributed medium access control protocol that globally maximizes the spatial reusability (number of simultaneous transmissions per unit area) of wireless sensor networks. This algorithm is able, in consequence, to minimize the number of time slots needed to schedule the set of demanded links, making it very efficient to solve the Shortest Link Schedule problem. DIA-RD combines accurate interference management, provided by the use of dynamic inhibition areas based on the physical interference model; and global intelligent behavior, provided by the bio-inspired technique known as Reaction-Diffusion. This techni…
Dissemination protocol for Heterogeneous Cooperative Vehicular Networks
2012
International audience; The difficulties associated with network connectivity, unreliable channels, and city environment characteristics make data dissemination task in vehicular urban networks a real challenge. Recently, some interesting solutions have been proposed to perform data dissemination in this environment. Starting from the analysis of these solutions, we present a new dissemination protocol named DHVN (Dissemination protocol for Heterogeneous Cooperative Vehicular Networks) that considers: (i) roads topology, (ii) network connectivity and possible partitioning in case of low traffic density, and (iii) heterogeneous communication capabilities of the vehicles. We compare our proto…
Combining hashing and enciphering algorithms for epidemiological analysis of gathered data.
2008
Summary Objectives: Compiling individual records coming from different sources is necessary for multi-center studies. Legal aspects can be satisfied by implementing anonymization procedures. When using these procedures with a different key for each study it becomes almost impossible to link records from separate data collections. Methods: The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient’s identity. Results: The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme…
Simple scheme for extracting work with a single bath
2019
We propose a simple protocol exploiting the thermalization of a storage bipartite system S to extract work from a resource system R. The protocol is based on a recent work definition involving only a single bath. A general description of the protocol is provided without specifying the characteristics of S. We quantify both the extracted work and the ideal efficiency of the process, also giving maximum bounds for them. Then, we apply the protocol to two cases: two interacting qubits and the Rabi model. In both cases, for very strong couplings, an extraction of work comparable with the bare energies of the subsystems of S is obtained and its peak is reached for finite values of the bath tempe…