Search results for "Computer network"

showing 10 items of 1634 documents

Biological Monitoring of Exposure to Benzene in Port Workers

2020

Port workers are exposed to a wide range of occupational hazards that can cause injuries and occupational diseases. Among these, exposure to benzene is one of the most important but least studied. The highest occupational exposures for port workers occur during the filling and loading of gasoline, and cleaning of tanks and receptacles. The aim of the study was to evaluate occupational exposure to low levels of benzene by measuring trans,trans-muconic acid (t,t-MA) in urine samples from workers operating at fuelling stations in a tourist port of Southern Italy. The overall sample was composed of 43 port workers of a tourist port in Southern Italy. In 2018, each participant provided two (morn…

AdultEveningtUrineUrinalysist-muconic acidToxicologybenzene03 medical and health scienceschemistry.chemical_compound0302 clinical medicineHumansMedicine030212 general & internal medicineport workerBenzenePersonal protective equipmentOriginal ResearchMorningSmokerCreatinineSmokersbusiness.industrylcsh:Public aspects of medicine030503 health policy & servicesUrinalysiport workersPublic Health Environmental and Occupational Healthlcsh:RA1-1270Non-SmokersBiomarkeroccupational exposureMiddle AgedPort (computer networking)Sorbic AcidItalybiological monitoringchemistryNon-SmokerCreatininePublic HealthOccupational exposure0305 other medical sciencebusinessBiomarkersHumanFrontiers in Public Health
researchProduct

LOW-RANK APPROXIMATION BASED NON-NEGATIVE MULTI-WAY ARRAY DECOMPOSITION ON EVENT-RELATED POTENTIALS

2014

Non-negative tensor factorization (NTF) has been successfully applied to analyze event-related potentials (ERPs), and shown superiority in terms of capturing multi-domain features. However, the time-frequency representation of ERPs by higher-order tensors are usually large-scale, which prevents the popularity of most tensor factorization algorithms. To overcome this issue, we introduce a non-negative canonical polyadic decomposition (NCPD) based on low-rank approximation (LRA) and hierarchical alternating least square (HALS) techniques. We applied NCPD (LRAHALS and benchmark HALS) and CPD to extract multi-domain features of a visual ERP. The features and components extracted by LRAHALS NCP…

AdultMaleComputer Networks and CommunicationsEmotionsLow-rank approximationEmotional processingEvent-related potentialDecomposition (computer science)Feature (machine learning)HumansRepresentation (mathematics)ta515Mathematicsta113Depressionbusiness.industryGroup (mathematics)ElectroencephalographyPattern recognitionGeneral MedicineMiddle AgedFacial ExpressionAlgebraData Interpretation StatisticalBenchmark (computing)Evoked Potentials VisualFemaleArtificial intelligencebusinessInternational Journal of Neural Systems
researchProduct

Multi-domain feature extraction for small event-related potentials through nonnegative multi-way array decomposition from low dense array EEG

2013

Non-negative Canonical Polyadic decomposition (NCPD) and non-negative Tucker decomposition (NTD) were compared for extracting the multi-domain feature of visual mismatch negativity (vMMN), a small event-related potential (ERP), for the cognitive research. Since signal-to-noise ratio in vMMN is low, NTD outperformed NCPD. Moreover, we proposed an approach to select the multi-domain feature of an ERP among all extracted features and discussed determination of numbers of extracted components in NCPD and NTD regarding the ERP context.

AdultMaleComputer Networks and CommunicationsFeature extractionEmotionsMismatch negativityContext (language use)Signal-To-Noise RatioSignal-to-noise ratioEvent-related potentialDecomposition (computer science)HumansMathematicsBrain MappingElectronic Data Processingbusiness.industryta111BrainPattern recognitionElectroencephalographyGeneral MedicineMiddle AgedFeature (computer vision)Evoked Potentials VisualFemaleArtificial intelligencebusinessPhotic StimulationTucker decompositionInternational Journal of Neural Systems
researchProduct

Permanently online and permanently connected : development and validation of the Online Vigilance Scale

2017

Smartphones and other mobile devices have fundamentally changed patterns of Internet use in everyday life by making online access constantly available. The present paper offers a theoretical explication and empirical assessment of the concept of online vigilance, referring to users' permanent cognitive orientation towards online content and communication as well as their disposition to exploit these options constantly. Based on four studies, a validated and reliable self-report measure of online vigilance was developed. In combination, the results suggest that the Online Vigilance Scale (OVS) shows a stable factor structure in various contexts and user populations and provides future work i…

AdultMaleComputer and Information SciencesAdolescentlcsh:MedicineSocial SciencesEquipmentAddictionYoung AdultHabitsHuman LearningLearning and MemorySociologyHumansPsychologyLearningComputer Networkslcsh:ScienceAgedAged 80 and overCommunication EquipmentBehaviorInternetText MessagingCommunicationlcsh:RCognitive PsychologyReproducibility of ResultsBiology and Life SciencesSocial CommunicationMiddle AgedModels TheoreticalCommunicationsInternet Addiction150 PsychologieVigilance (Psychology)Engineering and TechnologyCognitive Sciencelcsh:QFemaleSelf ReportSmartphoneCell PhonesFactor Analysis Statistical150 PsychologyResearch ArticleNeuroscience
researchProduct

Uso problemático del smartphone: el papel de los Cinco Grandes, la Tríada Oscura y la impulsividad

2021

Abstract. Este estudio examinó las relaciones entre los rasgos de personalidad de los cinco grandes (extraversión, afabilidad, neuroticismo, responsabilidad y apertura a la experiencia), la tríada oscura (maquiavelismo, psicopatía y narcisismo), la impulsividad y el uso problemático del smartphone. Doscientos dos participantes (52.48% hombres), con edades comprendidas entre los 18 y los 58 años, completaron el Ten-Item Personality Inventory, la Smartphone Addiction Scale, el Dirty Dozen y la escala de impulsividad de Plutchik. Los análisis de correlación mostraron que el uso problemático del smartphone estaba significativamente asociado a la extraversión, el neuroticismo, la impulsividad y …

AgreeablenessDark triadExtraversion and introversionComputer Networks and CommunicationsPsychopathyPhysical Therapy Sports Therapy and RehabilitationConscientiousnessmedicine.diseaseImpulsivityNeuroticismEducationmedicinePsychology (miscellaneous)Big Five personality traitsmedicine.symptomPsychologyClinical psychologyAloma: Revista de Psicologia, Ciències de l'Educació i de l'Esport
researchProduct

Unemployment, Personality Traits, and the Use of Facebook

2021

Different personality traits respond differently to unfavourable life situations. Unemployment can have several negative social, economic, and domestic consequences. Many people use social media for a variety of reasons. The aim of this study is to examine the way different personality traits respond to Facebook in the period of unemployment. Data was obtained from 3,002 unemployed respondents in Nigeria. The study used regression model to analyse the data. Among the five personality traits, results indicated that the relationship between neuroticism and online social support was negative. However, the relationship between online social support and satisfaction was positive. The study highl…

AgreeablenessFacebookExtraversion and introversionComputer Networks and Communicationsvaikutuksetmedia_common.quotation_subjectpersoonallisuuden piirteetNigeriasosiaalinen mediasosiaalinen tukiConscientiousnesstyöttömyyspersoonallisuusNeuroticismkokemuksetUnemploymentOpenness to experienceOnline social supportBig Five personality traitsPsychologySocial psychologyInformation Systemsmedia_commonInternational Journal of E-Adoption
researchProduct

Finite-Size and Illumination Conditions Effects in All-Dielectric Metasurfaces

2022

Dielectric metasurfaces have emerged as a promising alternative to their plasmonic counterparts due to lower ohmic losses, which hinder sensing applications and nonlinear frequency conversion, and their larger flexibility to shape the emission pattern in the visible regime. To date, the computational cost of full-wave numerical simulations has forced the exploitation of the Floquet theorem, which implies infinitely periodic structures, in designing such devices. In this work, we show the potential pitfalls of this approach when considering finite-size metasurfaces and beam-like illumination conditions, in contrast to the typical infinite plane-wave illumination compatible with the Floquet t…

All-dielectric metasurfaces BIC Multipolar decomposition T-matrixComputer Networks and CommunicationsHardware and ArchitectureControl and Systems Engineeringall-dielectric metasurfaces; multipolar decomposition; T-matrix; BICSignal ProcessingPhysics::OpticsSettore ING-INF/02 - Campi ElettromagneticiElectrical and Electronic EngineeringElectronics
researchProduct

An AmI-Based Software Architecture Enabling Evolutionary Computation in Blended Commerce: The Shopping Plan Application

2015

This work describes an approach to synergistically exploit ambient intelligence technologies, mobile devices, and evolutionary computation in order to support blended commerce or ubiquitous commerce scenarios. The work proposes a software architecture consisting of three main components: linked data for e-commerce, cloud-based services, and mobile apps. The three components implement a scenario where a shopping mall is presented as an intelligent environment in which customers use NFC capabilities of their smartphones in order to handle e-coupons produced, suggested, and consumed by the abovesaid environment. The main function of the intelligent environment is to help customers define shopp…

Ambient intelligenceArticle SubjectExploitDatabaseComputer Networks and CommunicationsComputer sciencebusiness.industryShopping mallCloud computingTK5101-6720computer.software_genreComputer Science ApplicationsTelecommunicationIntelligent environmentUbiquitous commerceSoftware architecturebusinessMobile devicecomputerMobile Information Systems
researchProduct

Mitigating DDoS using weight‐based geographical clustering

2020

Distributed denial of service (DDoS) attacks have for the last two decades been among the greatest threats facing the internet infrastructure. Mitigating DDoS attacks is a particularly challenging task as an attacker tries to conceal a huge amount of traffic inside a legitimate traffic flow. This article proposes to use data mining approaches to find unique hidden data structures which are able to characterize the normal traffic flow. This will serve as a mean for filtering illegitimate traffic under DDoS attacks. In this endeavor, we devise three algorithms built on previously uncharted areas within mitigation techniques where clustering techniques are used to create geographical clusters …

Anomaly intrusion detectionsComputer Networks and CommunicationsComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDenial-of-service attackFault tolerancecomputer.software_genreClustering techniquesData segmentComputer Science ApplicationsTheoretical Computer ScienceComputational Theory and MathematicsMitigating DDoS attacksCloud burstingData miningCluster analysisWeight based dosingcomputerSoftwareAddress clusteringMitigation techniquesConcurrency and Computation: Practice and Experience
researchProduct

Investigating the Impact of Radiation-Induced Soft Errors on the Reliability of Approximate Computing Systems

2020

International audience; Approximate Computing (AxC) is a well-known paradigm able to reduce the computational and power overheads of a multitude of applications, at the cost of a decreased accuracy. Convolutional Neural Networks (CNNs) have proven to be particularly suited for AxC because of their inherent resilience to errors. However, the implementation of AxC techniques may affect the intrinsic resilience of the application to errors induced by Single Events in a harsh environment. This work introduces an experimental study of the impact of neutron irradiation on approximate computing techniques applied on the data representation of a CNN.

Approximate computingComputer scienceReliability (computer networking)Radiation effectsRadiation induced02 engineering and technologyneuroverkotExternal Data Representation01 natural sciencesConvolutional neural networkSoftwareHardware020204 information systems0103 physical sciences0202 electrical engineering electronic engineering information engineering[SPI.NANO]Engineering Sciences [physics]/Micro and nanotechnologies/MicroelectronicsResilience (network)mikroprosessoritNeutronsResilience010308 nuclear & particles physicsbusiness.industryReliabilityApproximate computingPower (physics)[SPI.TRON]Engineering Sciences [physics]/ElectronicsComputer engineeringsäteilyfysiikka[INFO.INFO-ES]Computer Science [cs]/Embedded SystemsbusinessSoftware
researchProduct