477 research outputs found

    Agreement in wider environments with weaker assumptions.

    Get PDF
    The set agreement problem states that from n proposed values at most n?1 can be decided. Traditionally, this problem is solved using a failure detector in asynchronous systems where processes may crash but do not recover, where processes have different identities, and where all processes initially know the membership. In this paper we study the set agreement problem and the weakest failure detector L used to solve it in asynchronous message passing systems where processes may crash and recover, with homonyms (i.e., processes may have equal identities) and without a complete initial knowledge of the membership

    Set agreement and the loneliness failure detector in crash-recovery systems

    Get PDF
    The set agreement problem states that from n proposed values at most n-1 can be decided. Traditionally, this problem is solved using a failure detector in asynchronous systems where processes may crash but not recover, where processes have different identities, and where all processes initially know the membership. In this paper we study the set agreement problem and the weakest failure detector L used to solve it in asynchronous message passing systems where processes may crash and recover, with homonyms (i.e., processes may have equal identities) and without a complete initial knowledge of the membership

    Systematic review of smartphone-based passive sensing for health and wellbeing

    Get PDF
    OBJECTIVE: To review published empirical literature on the use of smartphone-based passive sensing for health and wellbeing. MATERIAL AND METHODS: A systematic review of the English language literature was performed following PRISMA guidelines. Papers indexed in computing, technology, and medical databases were included if they were empirical, focused on health and/or wellbeing, involved the collection of data via smartphones, and described the utilized technology as passive or requiring minimal user interaction. RESULTS: Thirty-five papers were included in the review. Studies were performed around the world, with samples of up to 171 (median n = 15) representing individuals with bipolar disorder, schizophrenia, depression, older adults, and the general population. The majority of studies used the Android operating system and an array of smartphone sensors, most frequently capturing accelerometry, location, audio, and usage data. Captured data were usually sent to a remote server for processing but were shared with participants in only 40% of studies. Reported benefits of passive sensing included accurately detecting changes in status, behavior change through feedback, and increased accountability in participants. Studies reported facing technical, methodological, and privacy challenges. DISCUSSION: Studies in the nascent area of smartphone-based passive sensing for health and wellbeing demonstrate promise and invite continued research and investment. Existing studies suffer from weaknesses in research design, lack of feedback and clinical integration, and inadequate attention to privacy issues. Key recommendations relate to developing passive sensing strategies matching the problem at hand, using personalized interventions, and addressing methodological and privacy challenges. CONCLUSION: As evolving passive sensing technology presents new possibilities for health and wellbeing, additional research must address methodological, clinical integration, and privacy issues. Doing so depends on interdisciplinary collaboration between informatics and clinical experts

    Solving k-Set Agreement Using Failure Detectors in Unknown Dynamic Networks

    Get PDF
    International audienceThe failure detector abstraction has been used to solve agreement problems in asynchronous systems prone to crash failures, but so far it has mostly been used in static and complete networks. This paper aims to adapt existing failure detectors in order to solve agreement problems in unknown, dynamic systems. We are specifically interested in the k-set agreement problem. The problem of k-set agreement is a generalization of consensus where processes can decide up to k different values. Although some solutions to this problem have been proposed in dynamic networks, they rely on communication synchrony or make strong assumptions on the number of process failures. In this paper we consider unknown dynamic systems modeled using the formalism of Time-Varying Graphs, and extend the definition of the existing ΠΣx,y failure detector to obtain the ΠΣ ⊥,x,y failure detector, which is sufficient to solve k-set agreement in our model. We then provide an implementation of this new failure detector using connectivity and message pattern assumptions. Finally, we present an algorithm using ΠΣ ⊥,x,y to solve k-set agreement

    Health Care for Older Adults

    Get PDF
    In recent decades, life expectancy has been increasing. This is a historical milestone in the history of humanity. We have never lived so long before. In these circumstances, giving the best care to older adults efficiently is one of the greatest challenges of developed countries. This book explores different initiatives that result in the improvement of health conditions of older adults, such as multicomponent physical exercise programs, interventions that try to avoid loneliness and social isolation, and multidisciplinary assessment, and the treatment of frailty and other geriatric syndromes, of the elderly in various settings such as the Emergency Unit, Orthogeriatrics, and Oncogeriatrics. This book offers different manuscripts to readers, each trying to improve life satisfaction, quality of life, and life expectancy in older adults in different scenarios. It is up to us to achieve these goals. We are sure that these interesting chapters will contribute to improving clinical practices. Following the completion of the Special Issue "Health Care for Older Adults" for the international Journal of Environmental Research and Public Health, the Guest Editors felt the satisfaction of having reached 18 published manuscripts and the possibility of transforming this volume into a book. This book was born from the need to show how health and social advances have increased human longevity as never before. We live longer, knowing more and more the epigenetic mechanisms of this longevity, as extended aging also coexists with the least favorable aging trajectories. Among them, a syndrome stands out from the gerontological and geriatric perspective: frailty. Due to the pandemic, a social problem has increased its presence in clinical practice: ageism. Older adults have found it difficult to access the necessary clinical resources due to the simple matter of age. However, at this moment, we are able to detect and to reverse frailty. In the same way, we should aim to prevent loneliness and social isolation, involved in social frailty. Geriatric syndromes are underdiagnosed and undertreated, but clinical and geriatric knowledge provide diagnostic tools and non-pharmacological approaches to prevent and to treat them. All health professionals working together in an interdisciplinary team could improve the clinical practices to develop a quality health care for older adults, improving their life satisfaction and quality of life perception too

    Face Image and Video Analysis in Biometrics and Health Applications

    Get PDF
    Computer Vision (CV) enables computers and systems to derive meaningful information from acquired visual inputs, such as images and videos, and make decisions based on the extracted information. Its goal is to acquire, process, analyze, and understand the information by developing a theoretical and algorithmic model. Biometrics are distinctive and measurable human characteristics used to label or describe individuals by combining computer vision with knowledge of human physiology (e.g., face, iris, fingerprint) and behavior (e.g., gait, gaze, voice). Face is one of the most informative biometric traits. Many studies have investigated the human face from the perspectives of various different disciplines, ranging from computer vision, deep learning, to neuroscience and biometrics. In this work, we analyze the face characteristics from digital images and videos in the areas of morphing attack and defense, and autism diagnosis. For face morphing attacks generation, we proposed a transformer based generative adversarial network to generate more visually realistic morphing attacks by combining different losses, such as face matching distance, facial landmark based loss, perceptual loss and pixel-wise mean square error. In face morphing attack detection study, we designed a fusion-based few-shot learning (FSL) method to learn discriminative features from face images for few-shot morphing attack detection (FS-MAD), and extend the current binary detection into multiclass classification, namely, few-shot morphing attack fingerprinting (FS-MAF). In the autism diagnosis study, we developed a discriminative few shot learning method to analyze hour-long video data and explored the fusion of facial dynamics for facial trait classification of autism spectrum disorder (ASD) in three severity levels. The results show outstanding performance of the proposed fusion-based few-shot framework on the dataset. Besides, we further explored the possibility of performing face micro- expression spotting and feature analysis on autism video data to classify ASD and control groups. The results indicate the effectiveness of subtle facial expression changes on autism diagnosis

    Self-Assembling Peptide Nanomaterials: Molecular Dynamics Studies, Computational Designs And Crystal Structure Characterizations

    Get PDF
    Peptides present complicated three-dimensional folds encoded in primary amino acid sequences of no more than 50 residues, providing cost-effective routes to the development of self-assembling nanomaterials.� The complexity and subtlety of the molecular interactions in such systems make it interesting to study and to understand the fundamental principles that determine the self-assembly of nanostructures and morphologies in solution. Such principles can then be applied to design novel self-assembling nanomaterials of precisely defined local structures and to controllably engineer new advanced functions into the materials. We first report the rational engineering of complementary hydrophobic interactions to control β-fibril type peptide self-assemblies that form hydrogel networks. Complementary to the experimental observations of the two distinct branching morphologies present in the two β-fibril systems that share a similar sequence pattern, we investigated on network branching, hydrogel properties by molecular dynamics simulations to provide a molecular picture of the assemblies. Next, we present the theory-guided computational design of novel peptides that adopt predetermined local nanostructures and symmetries upon solution assembly. Using such an approach, we discovered a non-natural, single peptide tetra-helical motif that can be used as a common building block for distinct predefined material nanostructures. The crystal structure of one designed peptide assembly demonstrates the atomistic match of the motif structure to the prediction, as well as provides fundamental feedback to the methods used to design and evaluate the computationally designed peptide candidates. This study could potentially improve the success rate of future designs of peptide-based self-assembling nanomaterials

    2021- The Twenty-fifth Annual Symposium of Student Scholars

    Get PDF
    The full program book from the Twenty-fifth Annual Symposium of Student Scholars, held on April 29, 2021. Includes abstracts from the presentations and posters.https://digitalcommons.kennesaw.edu/sssprograms/1023/thumbnail.jp
    • …
    corecore