Search results for "Object-oriented programming"
showing 10 items of 282 documents
Birthweight and its association with retinal vessel equivalents – Results from the population‐based German Gutenberg Health Study
2020
Auditory Mismatch Negativity and Repetition Suppression Deficits in Schizophrenia Explained by Irregular Computation of Prediction Error
2015
Background The predictive coding model is rapidly gaining attention in schizophrenia research. It posits the neuronal computation of residual variance (‘prediction error’) between sensory information and top-down expectation through multiple hierarchical levels. Event-related potentials (ERP) reflect cortical processing stages that are increasingly interpreted in the light of the predictive coding hypothesis. Both mismatch negativity (MMN) and repetition suppression (RS) measures are considered a prediction error correlates based on error detection and error minimization, respectively. Methods Twenty-five schizophrenia patients and 25 healthy controls completed auditory tasks designed to el…
Pseudoneglect in schizophrenia: A line bisection study with cueing
2007
Numerous authors have reported the existence of lateralised abnormalities towards the right side in patients with schizophrenia.In the present study, a manual line bisection task was used to assess the existence of a visuospatial bias in patients with schizophrenia as compared to healthy subjects and left unilateral neglect patients. In addition, we used a local cueing paradigm (consisting of a number placed on the right, on the left, or at both ends of the line).Healthy subjects showed a leftwards trend in the "no cue" condition (known as pseudoneglect) and neglect patients showed a right bias in all cue conditions. In contrast, patients with schizophrenia placed their manual estimation of…
Association study of a SNP coding for a M129V substitution in the prion protein in schizophrenia.
2003
Models of E-Democracy
2006
Pulished article in Communications of the Association for Information Systems, 17 (1), 818-840. Also available from the publisher: http://aisel.aisnet.org/cais/vol17/iss1/37/ Several theories of E-Democracy have been presented, and implementations of and experiments in E-Democracy emerged. However, existing literature on the subject appears rather non-comprehensive, lacking an integrated basis, for gathering knowledge in the future. After an analysis of theories of E-Democracy versus implementations reported in related literature, we address the need for a model generally absent from contemporary theoretical literature: the Partisan model of E-Democracy. We aim to simplify the current "jung…
Analysis and Optimization Technique of Secure Smart Grid Communication Network for Sustainable Development
2019
The smart network includes many sub-frameworks, for example, the Home Area Network (HAN), which are at risk and prone to be attacked remotely. A smart grid communication is meant to design a mutual authentication scheme and a key management protocol. This study is aimed with an efficient arrangement for HAN that analyzes a framework set-up for HAN. In this paper, we have analyzed three cases: First, we show the normal execution then execution along with attackers. Using mutual authentication, we overcome attacks. It has introduced a number of routing schemes for grid networks in recent years, and they provide different level of privacy protection at different cost. First, an unspecified key…
A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users
2003
Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.
Attacks Against the WAP WTLS Protocol
1999
The WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. The protocol is currently being fielded, and it is expected that the protocol will be contained in millions of devices in a few years.
Cold recycling of reclaimed asphalt pavements
2018
Pavement engineers have in front of them multiple challenges linked to addressing issues related to social development and society’s expanding needs. One of the most substantial of these issues is perhaps how to effectively rehabilitate and/ or maintain the existing road network while preserving and sustaining limited natural resources. The re-usage of existing pavement materials to reconstruct/ rehabilitate our future pavements is the solution that is now more and more selected by the different road administrations around the world. However, upon closer inspection, one can find many areas and details, not negligible issues, that are simply extensions of HMA technology (i.e. mix design proc…
Service discovery protocols in D2D-enabled cellular networks: Reactive versus proactive
2014
Device-to-Device (D2D) communication, which allows access services offered by nearby devices bypassing the base station, has been regarded as an essential component of the emerging 5G mobile networks. Many advantages can be provided by this direct communication paradigm such as high data rate, traffic offloading, range extension, as well as proximity services and social networking. In such a context, service discovery approaches need to be investigated. In this paper, we propose two protocols for service discovery, namely, reactive (pull) discovery and proactive (push) discovery in infrastructure-coordinated D2D networks. The protocol overhead is calculated and numerical results are provide…