Search results for "programming."
showing 10 items of 3035 documents
Surrogate Measures of Safety at Roundabouts in AIMSUN and VISSIM Environment
2018
This paper addresses issues on road safety analysis through microscopic traffic simulation models. The Surrogate Safety Assessment Model (SSAM) was applied to read vehicle trajectory files generated by two micro-simulators and then calculate surrogate measures of safety. Since safety assessment of any road entity can provide different results based on the micro-simulator which is used, the main objective of this research was to estimate the safety performance of three roundabout layouts and compare the conflict events simulated by AIMSUN and VISSIM. The two micro-simulators were used to build the calibrated models of the roundabouts, each fitting the corresponding empirical capacity functio…
Mafia Methods, Extortion Dynamics and Social Responses
2016
This chapter is devoted to exploring both the empirical results and the policy proposals produced by the GLODERS project. Based on 631 cases of extortions, the Sicily and Calabria extortion database represents a relevant achievement in the field of the research on extortion racket and it is one of the main results of the GLODERS project. Gathering a great amount of information, our empirical analysis revealed the existence of several differences in the extortive conducts carried on within these two regions, which are presented. Moreover, the chapter introduces the legislation related to the crime of extortion. Social and legal responses to the phenomenon are then discussed.
The relationship between loading history and proximal femoral diaphysis cross-sectional geometry
2017
Objectives We investigated the relationship between loading history and bone biomechanical properties used in physical activity reconstructions. These bone properties included bone bending and torsional strength (J), cortical area (CA), the direction of the major axis (theta angle), and element shape ratios determined from cross sections of standardized bone length. In addition, we explored the applicability of anatomically determined cross sections. Methods Our material consisted of hip and proximal thigh magnetic resonance images of Finnish female athletes (N = 91) engaged in high-jump, triple-jump, endurance running, swimming, power-lifting, soccer and squash; along with a group of activ…
Who and how? : Preservice teachers as active agents developing professional identities
2016
Abstract This study is part of an ongoing action research project with preservice class teachers in Finland. The study aims to better understand the forms agency takes in preservice teachers' professional identity development. Through the dialogical analysis of student assignments, this study outlines how student teachers are active within their own development and the way in which experiences are drawn on as preservice teachers exert their identity-agency. The results of this study provide a relational picture of identity development highlighting the way in which identity-agency is contextualized, potentially nourished by the relationships between self and other and dependent on experience.
Improving Online Interaction Among Blended Distance Learners at Makerere University
2017
This article reports on a study done to improve interaction among distance learners offering the blended Bachelor of Education (B.Ed.) programme at Makerere University. The study attempts to answer the question: How can a Learning Management System be used to improve learner interaction on the blended B.Ed. programme at Makerere University? The study adopted the Affordance eLearning Design Framework. This study was done among 54 students studying a Policy Planning and Implementation course on the B.Ed. programme. The study employed qualitative approaches to data collection and analysis. These included semi-structured interviews and observation of the interaction logs within the groups and o…
MOF-VM: Instantiation Revisited
2016
The Model-Driven Architecture (MDA) is based on an understanding of a hierarchy of levels that are placed on top of each other and that are connected with instantiation. For practical MDA use, it is important to be clear about the kinds of objects that reside on the different levels and the relations between them as well as relations to objects outside of the MDA domain. This article aims at enhancing the understanding of these objects and relations by relating them to a virtual MOF machine.
Constructed Action, the Clause and the Nature of Syntax in Finnish Sign Language
2017
AbstractThis paper investigates the interplay of constructed action and the clause in Finnish Sign Language (FinSL). Constructed action is a form of gestural enactment in which the signers use their hands, face and other parts of the body to represent the actions, thoughts or feelings of someone they are referring to in the discourse. With the help of frequencies calculated from corpus data, this article shows firstly that when FinSL signers are narrating a story, there are differences in how they use constructed action. Then the paper argues that there are differences also in the prototypical structure, linkage type and non-manual activity of clauses, depending on the presence or non-prese…
Modelling of Systems for Real
2016
Modelling and Programming are often used together in system development. However, typically there is a large difference between the handling of modelling parts and the handling of programming parts. This leads to the fact that the transition between the two is not easy, and important information is lost as well as extra information has to be provided when combining modelling and programming. This paper shows how modelling and programming could work together in system development.
$^{78}$Ni revealed as a doubly magic stronghold against nuclear deformation
2019
Nuclear magic numbers, which emerge from the strong nuclear force based on quantum chromodynamics, correspond to fully occupied energy shells of protons, or neutrons inside atomic nuclei. Doubly magic nuclei, with magic numbers for both protons and neutrons, are spherical and extremely rare across the nuclear landscape. While the sequence of magic numbers is well established for stable nuclei, evidence reveals modifications for nuclei with a large proton-to-neutron asymmetry. Here, we provide the first spectroscopic study of the doubly magic nucleus $^{78}$Ni, fourteen neutrons beyond the last stable nickel isotope. We provide direct evidence for its doubly magic nature, which is also predi…
Retrieving Monitoring and Accounting Information from Constrained Devices in Internet-of-Things Applications
2013
Part 6: Monitoring Mechanisms; International audience; Internet-of-Things (IoT) is envisioned to provide connectivity to a vast number of sensing or actuating devices with limited computational and communication capabilities. For the organizations that manage these constrained devices, the monitoring of each device’s operational status and performance level as well as the accounting of their resource usage are of great importance. However, monitoring and accounting support is lacking in today’s IoT platforms. Hence, this paper studies the applicability of the Constrained Application Protocol (CoAP), a lightweight transfer protocol under development by IETF, for efficiently retrieving monito…