Search results for "Object-oriented programming"
showing 10 items of 282 documents
Solving a large multicontainer loading problem in the car manufacturing industry
2017
Abstract Renault, a large car manufacturer with factories all over the world, has a production system in which not every factory produces all the parts required to assemble a vehicle. Every day, large quantities of car parts are sent from one factory to another, defining very large truck/container transportation problems. The main challenge faced by the Renault logistics platforms is to load the items into trucks and containers as efficiently as possible so as to minimize the number of vehicles sent. Therefore, the problem to be solved is a multicontainer loading problem in which, besides the usual geometric constraints preventing items from overlapping and exceeding the dimensions of the c…
A negotiation protocol to improve long distance truck parking
2017
Protocolo técnico para la fotografía de fuentes filológicas primarias
2014
con fines documentales, proyectado para garantizar la máxima fidelidad posible al motivo original representado. Tras una descripción detallada del material necesario, seleccionado específicamente en función de las necesidades particulares de la fotografía de textos manuscritos o impresos, se desarrolla un procedimiento adaptado a las nuevas circunstancias de la fotografía digital, concebido en dos fases: la captación de la imagen en formato RAW, y su posterior edición. En este estudio se trata la primera parte, describiendo sistemáticamente, paso a paso, las decisiones técnicas relativas a los ajustes fotográficos de la toma en diferentes situaciones lumínicas, encaminadas a maximizar la ca…
Identifying gene-environment interactions in schizophrenia: contemporary challenges for integrated, large-scale investigations
2014
European Community Recent years have seen considerable progress in epidemiological and molecular genetic research into environmental and genetic factors in schizophrenia, but methodological uncertainties remain with regard to validating environmental exposures, and the population risk conferred by individual molecular genetic variants is small. There are now also a limited number of studies that have investigated molecular genetic candidate gene-environment interactions (G x E), however, so far, thorough replication of findings is rare and G x E research still faces several conceptual and methodological challenges. in this article, we aim to review these recent developments and illustrate h…
Increasing the Museum Value of Information Technology Objects
2009
In this article, we define the basic concepts of museum work, museum value, and contextual information with the help of a case study and literature. We base the case study on the empirical material of a project that aimed to gather knowledge of the collections of the Finnish Data Processing Museum Association. This article opens up the concepts and analyzes them in the context of museum work and information technology objects.
Human Trafficking: The Viscous Link Between Vulnerability and Proximity Violence
2020
The definition of “human trafficking”, adopted by the United Nations Protocol, clearly describes how the international community has outlined the concepts of victim and perpetrator. Despite the definitive effort made by this Protocol, the present chapter seeks to throw light on the fuzzy area existing within the rapport between vulnerability and proximity violence which makes the consensual exploitation of the victim by the trafficker possible as well as making it difficult to outline its contours in the courtrooms.
One size hardly fits all
2013
This paper casts recent accomplishments in the field of Wireless MAC programmability into the emerging Software Defined Networking perspective. We argue that an abstract (but formal) description of the MAC protocol logic in terms of extensible finite state machines appears a convenient and viable data-plane programming compromise for modeling and deploying realistic MAC protocol logics. Our approach is shown to comply with existing control frameworks, and entails the ability to dynamically change the MAC protocol operation based on context and scenario conditions; in essence, move from the traditional idea of "one-size-fits-all" MAC protocol stack to the innovative paradigm of opportunistic…
MAClets: Active MAC Protocols over hard-coded devices
2012
We introduce MAClets, software programs uploaded and executed on-demand over wireless cards, and devised to change the card's real-time medium access control operation. MAClets permit seamless reconfiguration of the MAC stack, so as to adapt it to mutated context and spectrum conditions and perform tailored performance optimizations hardly accountable by an once-for-all protocol stack design. Following traditional active networking principles, MAClets can be directly conveyed within data packets and executed on hard-coded devices acting as virtual MAC machines. Indeed, rather than executing a pre-defined protocol, we envision a new architecture for wireless cards based on a protocol interpr…
Combined People Position and Compass Detection for Context-aware Service Provision
2006
A novel technique is discussed for people identification and position sensing in augmented reality by the use of two cooperating technologies. People are provided with RFID tags for localization and context definition, and then visually investigated for identity checking and compass detection. The two technologies are discussed within an implementation of a case study dealing with context aware service provision for students in a campus.
Writer identification for historical handwritten documents using a single feature extraction method
2020
International audience; With the growth of artificial intelligence techniques the problem of writer identification from historical documents has gained increased interest. It consists on knowing the identity of writers of these documents. This paper introduces our baseline system for writer identification, tested on a large dataset of latin historical manuscripts used in the ICDAR 2019 competition. The proposed system yielded the best results using Scale Invariant Feature Transform (SIFT) as a single feature extraction method, without any preprocessing stage. The system was compared against four teams who participated in the competition with different feature extraction methods: SRS-LBP, SI…