Search results for "DATA"

showing 10 items of 12992 documents

Creating a questionnaire for a scientific study

2016

Using questionnaires has become a permanent part of collecting data in scientific studies within the sphere of human sciences as well as other disciplines. It has been utilized already for nearly a century in collecting data. The first questionnaires were carried out on paper but nowadays there are e-questionnaires alongside it which can be carried out through e-mail or published on a social media platform (for example, Facebook). An often used method is also a survey which is carried out with a research project's own web page, association or company etc. A questionnaire has been considered as an actual scientific method of data collection since 1930s. However, it was already used a little …

0211 other engineering and technologiesHuman science02 engineering and technologyField (computer science)Web pageSocial mediata516SociologySocial sciencescientific study060201 languages & linguisticsData collectionbusiness.industryquestionnairemetodologia021107 urban & regional planningmethodology06 humanities and the artsPublic relationsquantitative surveyScientific methodresearch tools0602 languages and literaturebusinessScientific studyQualitative researchInternational Journal of Research Studies in Education
researchProduct

Comparison of fully non-stationary artificial accelerogram generation methods in reproducing seismicity at a given site

2020

Abstract Seismic input modelling is a crucial step when Non-Linear Time-History Analyses (NLTHAs) are performed, the seismic response of structures being highly responsive to the input employed. When natural accelerograms able to represent local seismicity are not available, the use of generated accelerograms is an efficient solution for input modelling. The aim of the present paper is to compare four methods for generating fully non-stationary artificial accelerograms on the basis of a target spectrum, identified using seven recorded accelerograms registered in the neighbourhood of the construction site during a single event, assumed as target accelerograms. For each method, seven accelero…

0211 other engineering and technologiesSoil Science020101 civil engineeringSpectrum-compatible02 engineering and technologyInduced seismicity0201 civil engineeringSet (abstract data type)Intensity measure parametermedicinePoint (geometry)Seismic site characteristic021101 geological & geomatics engineeringCivil and Structural EngineeringEvent (probability theory)Basis (linear algebra)business.industryFully non-stationaryStiffnessStructural engineeringGeotechnical Engineering and Engineering GeologySettore ICAR/09 - Tecnica Delle CostruzioniArtificial accelerogrammedicine.symptombusinessEnergy (signal processing)GeologySoil Dynamics and Earthquake Engineering
researchProduct

A Novel Border Identification Algorithm Based on an “Anti-Bayesian” Paradigm

2013

Published version of a chapter in the book: Computer Analysis of Images and Patterns. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-40261-6_23 Border Identification (BI) algorithms, a subset of Prototype Reduction Schemes (PRS) aim to reduce the number of training vectors so that the reduced set (the border set) contains only those patterns which lie near the border of the classes, and have sufficient information to perform a meaningful classification. However, one can see that the true border patterns (“near” border) are not able to perform the task independently as they are not able to always distinguish the testing samples. Thus, researchers have worked on thi…

021103 operations researchComputer scienceVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 4220211 other engineering and technologiesClass (philosophy)02 engineering and technologyField (computer science)Term (time)Support vector machineSet (abstract data type)Identification (information)Bayes' theoremCardinality0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingVDP::Mathematics and natural science: 400::Mathematics: 410::Algebra/algebraic analysis: 414InformationSystems_MISCELLANEOUSAlgorithm
researchProduct

Rough Set Theory for Optimization of Packet Management Mechanism in IP Routers

2020

Bandwidth and consequently optimum overall efficiency of network system relies greatly on mechanism of packet management in IP routers. Our research objective is to implement rough set theory to minimizing number of the network system attributes responsible for decision making in selection of those packets, which improve its transmission. Such an approach is called priority queuing system model, as we assign priority to the packets selected, following rough set theory. Regardless of the file format, for all the routers, packets are transmitted in sequence one-by-one. Nonetheless, quality of streaming data largely depends on how much the packet loss is minimized, or eliminated at all, if pos…

021103 operations researchNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth (signal processing)0211 other engineering and technologies02 engineering and technologySystem modelIPv6Set (abstract data type)Transmission (telecommunications)Packet lossRough setbusinessComputer network
researchProduct

Introduction to Spreadsheet Modeling and Metaheuristics

2017

Models, as a simplified representation of reality, are used daily in an attempt to control or understand some aspects of a real system. Simplification of reality is the accepted view of the modeling process, which assumes that reality represents the absolute truth. Without getting too deep into a philosophical discourse, it is worth mentioning the notion of model-dependent realism, a phrase coined by physicists Stephen Hawkings and Leonard Molinow in their book The Grand Design. Model-dependent realism “is based on the idea that our brains interpret the input from our sensory organs by making a model of the world to aid in the decision-making process.” This implies that more than one model …

021103 operations researchPhraseProcess (engineering)Computer science0211 other engineering and technologies02 engineering and technologyRepresentation (arts)Data scienceEpistemology0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingControl (linguistics)MetaheuristicRealism
researchProduct

Combined column-and-row-generation for the optimal communication spanning tree problem

2018

Abstract This paper considers the exact solution of the optimal communication spanning tree problem (OCSTP), which can be described as follows: Given an undirected graph with transportation costs on every edge and communication requirements for all pairs of vertices, the OCSTP seeks for a spanning tree that minimizes the sum of the communication costs between all pairs of vertices, where the communication cost of a pair of vertices is defined as their communication requirement multiplied by the transportation cost of the unique tree path that connects the two vertices. Two types of compact formulations for OCSTP were presented in the literature. The first one is a four-index model based on …

021103 operations researchSpanning treeGeneral Computer ScienceHeuristicComputer scienceIntersection (set theory)0211 other engineering and technologies0102 computer and information sciences02 engineering and technologyManagement Science and Operations ResearchFlow network01 natural sciencesTree (graph theory)GraphVertex (geometry)Combinatorics010201 computation theory & mathematicsModeling and SimulationPath (graph theory)Graph (abstract data type)MathematicsofComputing_DISCRETEMATHEMATICSComputers & Operations Research
researchProduct

The ELECTRE I method to support the FMECA

2018

Abstract In traditional Failure Modes, Effects and Criticality Analysis (FMECA), risk priorities of failure modes are determined through the Risk Priority Number (RPN), which is a function of the three risk parameters Occurrence (O), Severity (S), and Detection (D). In the present paper, an alternative approach to RPN is proposed for the criticality assessment of system failure modes. Particularly, the Multi-Criteria Decision Making (MCDM) method ELECTRE I is proposed to select the most critical failure mode in the set of the failure modes charactering a complex system. The method has been applied to a case study previously proposed by Zammori and Gabrielli (2012).

021110 strategic defence & security studies021103 operations researchComputer science0211 other engineering and technologies02 engineering and technologyFunction (mathematics)Multiple-criteria decision analysisReliability engineeringSet (abstract data type)Failure mode effects and criticality analysisSystem failureControl and Systems EngineeringELECTREFailure mode and effects analysisIFAC-PapersOnLine
researchProduct

Safety regulations : implications of the new risk perspectives

2016

Abstract The current safety regulations for industrial activities are to a large extent functionally oriented and risk-based (informed), expressing what to achieve rather than the means and solutions needed. They are founded on a probability-based perspective on risk, with the use of risk assessment, risk acceptance criteria and tolerability limits. In recent years several risk researchers have argued for the adoption of some new types of risk perspectives which highlight uncertainties rather than probabilities in the way risk is defined, the point being to better reflect the knowledge, and lack of knowledge, dimension of risk. The Norwegian Petroleum Safety Authority has recently implement…

021110 strategic defence & security studiesActuarial scienceta214business.industry0211 other engineering and technologiesFood safety risk analysisregulation02 engineering and technologyrisk acceptance criteriaIndustrial and Manufacturing EngineeringIT risk managementrisk perspectivesIT riskIncentiveRisk analysis (engineering)Risk analysis (business)021105 building & constructionta5141risk acceptance a criteriaBusinessDimension (data warehouse)Safety Risk Reliability and QualityRisk assessmentta512Risk managementReliability Engineering and System Safety
researchProduct

Secure and efficient verification for data aggregation in wireless sensor networks

2017

Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…

021110 strategic defence & security studiesComputer Networks and Communicationsbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesEarly detection020206 networking & telecommunications02 engineering and technologyImpersonation attackComputer Science ApplicationsData aggregatorRobustness (computer science)Information and Communications TechnologySoftware deploymentScalability0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkInternational Journal of Network Management
researchProduct

Two novel subjective logic-based in-network data processing schemes in wireless sensor networks

2016

Wireless sensor networks (WSNs) consist of connected low-cost and small-size sensor nodes. The sensor nodes are characterized by various limitations, such as energy availability, processing power, and storage capacity. Typically, nodes collect data from an environment and transmit the raw or processed data to a sink. However, the collected data contains often redundant information. An in-network processing scheme attempts to eliminate or reduce such redundancy in sensed data. In this paper, we propose two in-network data processing schemes for WSNs, which are built based on a lightweight algebra for data processing. The schemes bring also benefits like decreased network traffic load and inc…

021110 strategic defence & security studiesData processingbusiness.industryComputer scienceVisual sensor networkReal-time computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologySynthetic dataKey distribution in wireless sensor networks0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkWirelessbusinessSubjective logicWireless sensor network2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct