Search results for "Computer network"

showing 10 items of 1634 documents

Estereotipos asociados al cuerpo humano: análisis de aplicaciones móviles usadas en la educación físico-deportiva

2022

Institutions and educators are massively and uncritically integrating digital curricular materials in their teaching praxis. This article aims to uncover whether health and fitness APP images convey or legitimize stereotypes linked to bodies, focusing on gender, race, somatotype and physical activity practice. We also analyse whether these apps are adequate for the recommended age or whether they are designed by physical education professionals. For that purpose, we designed a descriptive, comparative study based on content analysis on a sample of 373 images from 128 apps selected through a PRISMA review and a pilot test. Our results report that bodies reproduce a series of stereotypes: of …

mobile appsstereotypesComputer Networks and Communicationsbody imageimage interpretationdigital competenceestereotiposComputer Science ApplicationsEducationaplicaciones móvilesTelèfon mòbilinterpretación de imágenes:PEDAGOGÍA [UNESCO]UNESCO::PEDAGOGÍAimagen corporalInformation Systemscompetencia digital docente
researchProduct

Mobilities and the network of personal technologies: Refining the understanding of mobility structure

2017

Our ambition here is to refine the various typologies that compose the mobility structure. We aim to complement the work done by Urry and investigate the role played in the structure of mobility by what we call the “network of personal technologies”. Our new model consists of four different levels: macro-mobilities, micro-mobilities, media mobility and disembodied mobilities. By “macro-mobilities,” we refer to the actions which imply consistent physical displacement, such as travels, tours and commuting. By “micro-mobilities,” we mean small-scale displacements, including bodily movements and emotions. With moving media, we refer both to the new mobility provided by the smartphone to the tra…

mobile phonemobility structureMobilitiesComputer Networks and Communications05 social sciences0507 social and economic geographyta5142050801 communication & media studiesmedia mobilitiesSocial order0508 media and communicationsmacro or micro mobilitiesHuman–computer interactionMobile phoneta5141Sociologyta518Electrical and Electronic Engineering050703 geographydisembodied mobilitiesTelematics and Informatics
researchProduct

Non-Linear Inductor Models Comparison for Switched-Mode Power Supplies Applications

2022

The use of non-linear power inductors, intended as devices exploited up to a current at which the inductance is halved, is of great interest in switched-mode power supplies (SMPSs). Indeed, it allows the use of lighter and cheaper inductors improving the power density. On the other hand, the analysis of SMPSs equipped with non-linear inductors requires appropriate modeling of the inductor reproducing the inductance versus current. This paper compares two main analytical models proposed in the literature: the former is based on a polynomial, and the latter exploits the arctangent function to reproduce the non-linearity of the inductance. Performance is compared by considering the effort of r…

modellingswitched mode power supplynon-linear magnetics; saturable core; inductor; modelling; switched mode power supply; power densitynon-linear magneticsComputer Networks and CommunicationsHardware and ArchitectureControl and Systems Engineeringsaturable coreSignal Processingpower densityElectrical and Electronic EngineeringInductorSettore ING-INF/01 - Elettronica
researchProduct

A visualization technique for accessing solution pool in interactive methods of multiobjective optimization

2015

<pre>Interactive methods of <span>multiobjective</span> optimization repetitively derive <span>Pareto</span> optimal solutions based on decision maker's preference information and present the obtained solutions for his/her consideration. Some interactive methods save the obtained solutions into a solution pool and, at each iteration, allow the decision maker considering any of solutions obtained earlier. This feature contributes to the flexibility of exploring the <span>Pareto</span> optimal set and learning about the optimization problem. However, in the case of many objective functions, the accumulation of derived solutions makes accessing the sol…

multidimensional scalingMathematical optimizationOptimization problemComputer Networks and CommunicationsComputer sciencevisualisointiPareto front visualizationcomputer.software_genreMulti-objective optimizationSet (abstract data type)menetelmätMultidimensional scalingMultiobjective optimizationdimensionality reductionFlexibility (engineering)pareto-tehokkuusDimensionality reductionMultiobjective optimization ; interactive methods ; Pareto front visualization ; dimensionality reduction ; multidimensional scalinginteractive methodsNIMBUSmonitavoiteoptimointiComputer Science ApplicationsVisualizationComputational Theory and MathematicsFeature (computer vision)interaktiivisuusData miningcomputer
researchProduct

Quasi-Fractional Models of Human Tendons Hereditariness

2018

In this study, the authors, after collecting a series of experimental evidences following a creep and relaxation tendon campaign, propose a non-linear model of the viscoelastic behavior of the tendons. The ligaments investigated are the patellars and the hamstrings. The analytical model proposed by the authors aims to explain the non-linear hereditary behavior of these tissues and proposes an approach with which to develop a hereditary fractional-order non-linear model.

musculoskeletal diseasesPatellarComputer scienceQuantitative Biology::Tissues and OrgansEnergy Engineering and Power TechnologyViscoelasticityIndustrial and Manufacturing EngineeringArtificial IntelligencemedicineLigamentInstrumentationbusiness.industryRenewable Energy Sustainability and the EnvironmentComputer Science Applications1707 Computer Vision and Pattern RecognitionStructural engineeringFractional-order hereditarinemusculoskeletal systemTendonmedicine.anatomical_structureComputer Networks and CommunicationCreepEvolution biologyRelaxation (approximation)businessSettore ICAR/08 - Scienza Delle CostruzioniHamstring
researchProduct

Wiener-Granger Causality in Network Physiology with Applications to Cardiovascular Control and Neuroscience

2016

Since the operative definition given by C. W. J. Granger of an idea expressed by N. Wiener, the Wiener–Granger causality (WGC) has been one of the most relevant concepts exploited by modern time series analysis. Indeed, in networks formed by multiple components, working according to the notion of segregation and interacting with each other according to the principle of integration, inferring causality has opened a window on the effective connectivity of the network and has linked experimental evidences to functions and mechanisms. This tutorial reviews predictability improvement, information-based and frequency domain methods for inferring WGC among physiological processes from multivariate…

nonlinear dynamicComputer scienceReliability (computer networking)Biomedical signal processingPhysiologyCardiovascular controldynamical systemdirectionalityGranger causalitymultivariate regression modelingtime series analysiPredictabilityTime seriesElectrical and Electronic EngineeringStatistical hypothesis testingbusiness.industryheart rate variabilitytransfer entropypartial directed coherencepredictioncoupling strengthCausalityconditional mutual informationFrequency domainspectral decompositionSettore ING-INF/06 - Bioingegneria Elettronica E InformaticaArtificial intelligencebusinesscomplexityNeuroscience
researchProduct

Hypervisor-Based White Listing of Executables

2019

We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed

operating systemsmicroprogrammingdatabasesvirtualisointiComputer Networks and CommunicationsComputer science0211 other engineering and technologiesListing (computer)02 engineering and technologycomputer.software_genre020204 information systemsMicrocode0202 electrical engineering electronic engineering information engineeringCode (cryptography)Overhead (computing)virtual machine monitorstietoturvaElectrical and Electronic Engineeringimage segmentation021110 strategic defence & security studieskäyttöjärjestelmätLinuxHypervisorcomputer.file_formatmonitoringOperating systemohjelmointiExecutableLawcomputerIEEE Security & Privacy
researchProduct

Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions

2023

AbstractIS literature has identified various economic, performance, and environmental factors affecting cybersecurity investment decisions. However, economic modeling approaches dominate, and research on cybersecurity performance as an antecedent to investments has taken a backseat. Neglecting the role of performance indicators ignores real-world concerns driving actual cybersecurity investment decision-making. We investigate two critical aspects of cybersecurity performance: breach costs and breach identification source, as antecedents to cybersecurity investment decisions. We use organizational learning to theorize how performance feedback from these two aspects of cybersecurity breaches …

oppiva organisaatioComputer Networks and Communicationsbreach costTheoretical Computer Sciencecybersecurity investmentorganizational learningcybersecurity breachbreach identifcationcybersecurity performancetietoturvakyberturvallisuusSoftwaretieto- ja viestintärikoksetInformation SystemsInformation Systems Frontiers
researchProduct

The relevance of point defects in studying silica-based materials from bulk to nanosystems

2019

The macroscopic properties of silica can be modified by the presence of local microscopic modifications at the scale of the basic molecular units (point defects). Such defects can be generated during the production of glass, devices, or by the environments where the latter have to operate, impacting on the devices’ performance. For these reasons, the identification of defects, their generation processes, and the knowledge of their electrical and optical features are relevant for microelectronics and optoelectronics. The aim of this manuscript is to report some examples of how defects can be generated, how they can impact device performance, and how a defect species or a physical phenomenon …

optical fibersMaterials scienceOptical fiberOptical fiberComputer Networks and Communicationslcsh:TK7800-8360Nanotechnology02 engineering and technology01 natural scienceslaw.inventionPoint defectNanoparticlelaw0103 physical sciencespoint defectsMicroelectronicsRelevance (information retrieval)Electrical and Electronic Engineering010308 nuclear & particles physicsbusiness.industryScale (chemistry)lcsh:ElectronicsSilica021001 nanoscience & nanotechnologyCrystallographic defectHardware and ArchitectureControl and Systems EngineeringSignal Processingnanoparticles0210 nano-technologybusiness
researchProduct

Expectations and Experiences of Implementing a Mobile Secure Communication Application

2020

The privacy and security of communication in corporations and governmental organizations has increased enormously over the years. At the same time, a growing amount of technological solutions to support this have emerged. This study examines user expectations before and use experiences during the implementation phase of a mobile secure communication application. These are investigated from the expectation–confirmation perspective and its influence on continued adoption. The study has an exploratory approach for this investigation. To guide the investigation, the study draws from the expectation–confirmation theory (ECT) and the unified theory of acceptance and use of technology (UTAUT). Emp…

organisaatioviestintäComputer Networks and CommunicationsComputer scienceStrategy and Managementorganisaatiot02 engineering and technologyComputer securitycomputer.software_genresovellusohjelmatManagement Information SystemsSecure communicationmobiililaitteet020204 information systems0502 economics and businessyksityisyys0202 electrical engineering electronic engineering information engineeringodotuksetmobiilisovelluksettietoturvaviestintäMarketingbusiness.industryturvallisuus05 social sciencesComputer Science Applicationstietoliikennekokemukset050211 marketingbusinesscomputer
researchProduct