Search results for "Object-oriented programming"

showing 10 items of 282 documents

Birthweight and its association with retinal vessel equivalents – Results from the population‐based German Gutenberg Health Study

2020

AdultMalemedicine.medical_specialtyAdolescentAssociation (object-oriented programming)610 MedizinBlood PressurePopulation basedGermanYoung Adult610 Medical sciencesEpidemiologymedicineBirth WeightHumansProspective StudiesChildAgedbusiness.industryInfant NewbornInfantRetinal VesselsGeneral MedicineMiddle Agedlanguage.human_languagePopulation based studyRetinal vesselOphthalmologyChild PreschoollanguageFemalebusinessDemographyActa Ophthalmologica
researchProduct

Auditory Mismatch Negativity and Repetition Suppression Deficits in Schizophrenia Explained by Irregular Computation of Prediction Error

2015

Background The predictive coding model is rapidly gaining attention in schizophrenia research. It posits the neuronal computation of residual variance (‘prediction error’) between sensory information and top-down expectation through multiple hierarchical levels. Event-related potentials (ERP) reflect cortical processing stages that are increasingly interpreted in the light of the predictive coding hypothesis. Both mismatch negativity (MMN) and repetition suppression (RS) measures are considered a prediction error correlates based on error detection and error minimization, respectively. Methods Twenty-five schizophrenia patients and 25 healthy controls completed auditory tasks designed to el…

AdultMalemedicine.medical_specialtyAdolescentSchizophrenia (object-oriented programming)lcsh:Medicine610Mismatch negativitySensory systemAudiologyElectroencephalography600 Technik Medizin angewandte Wissenschaften::610 Medizin und Gesundheitbehavioral disciplines and activitiesCorrelationYoung AdultEvent-related potentialmedicineHumansComputer Simulationlcsh:ScienceMultidisciplinarymedicine.diagnostic_testlcsh:RRepeated measures designMiddle AgedEvoked Potentials AuditorySchizophrenialcsh:QFemaleSchizophrenic PsychologyAnalysis of variancePsychologyResearch ArticlePLoS ONE
researchProduct

Pseudoneglect in schizophrenia: A line bisection study with cueing

2007

Numerous authors have reported the existence of lateralised abnormalities towards the right side in patients with schizophrenia.In the present study, a manual line bisection task was used to assess the existence of a visuospatial bias in patients with schizophrenia as compared to healthy subjects and left unilateral neglect patients. In addition, we used a local cueing paradigm (consisting of a number placed on the right, on the left, or at both ends of the line).Healthy subjects showed a leftwards trend in the "no cue" condition (known as pseudoneglect) and neglect patients showed a right bias in all cue conditions. In contrast, patients with schizophrenia placed their manual estimation of…

AdultMalemedicine.medical_specialtyPsychosisCognitive Neurosciencemedia_common.quotation_subjectSchizophrenia (object-oriented programming)AudiologyNeglectPerceptual DisordersmedicineHumansIn patientmedia_commonHealthy subjectsSpace perceptionCognitionMiddle Agedmedicine.diseasePsychiatry and Mental healthUnilateral neglectSpace PerceptionSchizophreniaVisual PerceptionFemaleCuesVisual FieldsPsychologyAntipsychotic AgentsCognitive psychologyCognitive Neuropsychiatry
researchProduct

Association study of a SNP coding for a M129V substitution in the prion protein in schizophrenia.

2003

AdultPsychosisAmyloidAdolescentGenotypePrionsSchizophrenia (object-oriented programming)610 Medicine & healthBiologymedicine.disease_causeGenetic determinismPrion Proteins2738 Psychiatry and Mental HealthOpen Reading FramesPolymorphism (computer science)medicineSNPHumansPoint MutationGenetic Predisposition to DiseaseProtein PrecursorsCodonBiological PsychiatryAgedGeneticsMutationSubstitution (logic)Case-control study11359 Institute for Regenerative Medicine (IREM)Middle Agedmedicine.diseasePsychiatry and Mental healthAmino Acid SubstitutionCase-Control StudiesSchizophrenia2803 Biological PsychiatrySchizophrenia research
researchProduct

Models of E-Democracy

2006

Pulished article in Communications of the Association for Information Systems, 17 (1), 818-840. Also available from the publisher: http://aisel.aisnet.org/cais/vol17/iss1/37/ Several theories of E-Democracy have been presented, and implementations of and experiments in E-Democracy emerged. However, existing literature on the subject appears rather non-comprehensive, lacking an integrated basis, for gathering knowledge in the future. After an analysis of theories of E-Democracy versus implementations reported in related literature, we address the need for a model generally absent from contemporary theoretical literature: the Partisan model of E-Democracy. We aim to simplify the current "jung…

Association (object-oriented programming)Political scienceE-Democracy democracy models literature reviewInformation systemVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321Social scienceE-democracyInformation SystemsPeer review
researchProduct

Analysis and Optimization Technique of Secure Smart Grid Communication Network for Sustainable Development

2019

The smart network includes many sub-frameworks, for example, the Home Area Network (HAN), which are at risk and prone to be attacked remotely. A smart grid communication is meant to design a mutual authentication scheme and a key management protocol. This study is aimed with an efficient arrangement for HAN that analyzes a framework set-up for HAN. In this paper, we have analyzed three cases: First, we show the normal execution then execution along with attackers. Using mutual authentication, we overcome attacks. It has introduced a number of routing schemes for grid networks in recent years, and they provide different level of privacy protection at different cost. First, an unspecified key…

AuthenticationSmart gridComputer sciencebusiness.industryMutual authenticationSession (computer science)Routing (electronic design automation)GridKey managementbusinessProtocol (object-oriented programming)Computer network
researchProduct

A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users

2003

Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.

AuthenticationUser authenticationResource (project management)BiometricsHuman–computer interactionComputer scienceIdentity (object-oriented programming)Security levelComputer securitycomputer.software_genreMobile devicecomputer
researchProduct

Attacks Against the WAP WTLS Protocol

1999

The WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. The protocol is currently being fielded, and it is expected that the protocol will be contained in millions of devices in a few years.

AuthenticationWireless Transport Layer SecurityTransport Layer Securitybusiness.industryComputer scienceData integrityComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWirelessbusinessProtocol (object-oriented programming)Stream cipherBlock cipherComputer network
researchProduct

Cold recycling of reclaimed asphalt pavements

2018

Pavement engineers have in front of them multiple challenges linked to addressing issues related to social development and society’s expanding needs. One of the most substantial of these issues is perhaps how to effectively rehabilitate and/ or maintain the existing road network while preserving and sustaining limited natural resources. The re-usage of existing pavement materials to reconstruct/ rehabilitate our future pavements is the solution that is now more and more selected by the different road administrations around the world. However, upon closer inspection, one can find many areas and details, not negligible issues, that are simply extensions of HMA technology (i.e. mix design proc…

BSM – bitumen stabilized materialsRecycling Reclaimedasphalt Foambitumen Bituminous emulsion Cohesion test Fragmentation test BSM – bitumen stabilized materialsComputer scienceProcess (engineering)Materials Science (miscellaneous)Cohesion test0211 other engineering and technologies020101 civil engineering02 engineering and technologyBuilding and ConstructionFragmentation testMix designNatural resourceConstruction engineering0201 civil engineeringBituminous emulsionAsphalt021105 building & constructionBituminous emulsion; BSM – bitumen stabilized materials; Cohesion test; Foam bitumen; Fragmentation test; Reclaimed asphalt; Recycling; Civil and Structural Engineering; Building and Construction; Materials Science (miscellaneous)Foam bitumenRecyclingProtocol (object-oriented programming)Reclaimed asphaltCivil and Structural Engineering
researchProduct

Service discovery protocols in D2D-enabled cellular networks: Reactive versus proactive

2014

Device-to-Device (D2D) communication, which allows access services offered by nearby devices bypassing the base station, has been regarded as an essential component of the emerging 5G mobile networks. Many advantages can be provided by this direct communication paradigm such as high data rate, traffic offloading, range extension, as well as proximity services and social networking. In such a context, service discovery approaches need to be investigated. In this paper, we propose two protocols for service discovery, namely, reactive (pull) discovery and proactive (push) discovery in infrastructure-coordinated D2D networks. The protocol overhead is calculated and numerical results are provide…

Base stationProtocol overheadSocial networkbusiness.industryComputer scienceComponent (UML)Service discoveryCellular networkContext (language use)businessProtocol (object-oriented programming)5GComputer network2014 IEEE Globecom Workshops (GC Wkshps)
researchProduct