Search results for "Event"

showing 10 items of 4065 documents

Potku – New analysis software for heavy ion elastic recoil detection analysis

2014

Time-of-flight elastic recoil detection (ToF-ERD) analysis software has been developed. The software combines a Python-language graphical front-end with a C code computing back-end in a user-friendly way. The software uses a list of coincident time-of- flight–energy (ToF–E) events as an input. The ToF calibration can be determined with a simple graphical procedure. The graphical interface allows the user to select different elements and isotopes from a ToF–E histogram and to convert the selections to individual elemental energy and depth profiles. The resulting sample composition can be presented as relative or absolute concentrations by integrating the depth profiles over user-defined rang…

ta113Nuclear and High Energy PhysicsIon beam analysista114business.industryComputer scienceEvent (computing)Reference data (financial markets)ion beam analysisERDelastic recoil detectionComputational scienceTOF-ERDElastic recoil detectionSoftwareCoincidentHistogramgraphical open source softwarebusinessInstrumentationGraphical user interfaceNuclear Instruments and Methods in Physics Research Section B: Beam Interactions with Materials and Atoms
researchProduct

Online activity traces around a "Boston bomber"

2013

This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.

ta113Social networkbusiness.industryInternet privacyTragedy (event)ComputingMilieux_LEGALASPECTSOFCOMPUTINGThe InternetSocial mediaSociologySuspectbusinessWeb crawlerDigital mediaProceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
researchProduct

Modelling Recurrent Events for Improving Online Change Detection

2016

The task of online change point detection in sensor data streams is often complicated due to presence of noise that can be mistaken for real changes and therefore affecting performance of change detectors. Most of the existing change detection methods assume that changes are independent from each other and occur at random in time. In this paper we study how performance of detectors can be improved in case of recurrent changes. We analytically demonstrate under which conditions and for how long recurrence information is useful for improving the detection accuracy. We propose a simple computationally efficient message passing procedure for calculating a predictive probability distribution of …

ta113noiseComputer scienceData stream miningMessage passingDetectordata streamsonline change detection02 engineering and technologycomputer.software_genreTask (computing)recurrent eventschange points020204 information systems0202 electrical engineering electronic engineering information engineeringProbability distribution020201 artificial intelligence & image processingNoise (video)Data miningBaseline (configuration management)computerChange detectionProceedings of the 2016 SIAM International Conference on Data Mining
researchProduct

Data mining framework for random access failure detection in LTE networks

2014

Sleeping cell problem is a particular type of cell degradation. There are various software and hardware reasons that might cause such kind of cell outage. In this study a cell becomes sleeping because of Random Access Channel (RACH) failure. This kind of network problem can appear due to misconfiguration, excessive load or software/firmware problem at the Base Station (BS). In practice such failure might cause network performance degradation, which is hardly traceable by an operator. In this paper we present a data mining based framework for the detection of problematic cells. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving BS. The choice of N i…

ta113sleeping cell problembusiness.industryComputer scienceFirmwareHeuristic (computer science)Event (computing)Reliability (computer networking)data miningLTE networkscomputer.software_genreBase stationRandom-access channelUser equipmentData miningbusinessrandom access channelcomputerRandom accessComputer network2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC)
researchProduct

Three Halves of a Whole : Redefining East and West in UNESCO’s East-West Major Project 1957-1966

2017


 
 
 In 1946 Julian Huxley, UNESCO’s rst Director-General, suggested that two opposing philosophies of life were confronting each other from the East and the West, setting the focus on the cultural aspect of this polarisation and de ning the possibility of an East- West conflict as the main threat to world peace. A decade later, in 1957, UNESCO launched The Major Project on the Mutual Appreciation of Eastern and Western Cultural Values to promote its ideas of intercultural understanding as a means to maintaining peace. The core concepts of the Project, East and West, were not strictly defined. Here East and West, as concepts, fit Reinhart Koselleck’s definition of Grundbegri…

ta520Binary oppositionWestkulttuuritEnvironmental ethicsContext (language use)länsikonfliktitCultural conflictconflict preventioncultural conflictGeographyIntercultural relationsUNESCOEastitäDevelopment economicsCultural relationsConceptual historyDepictionArtikkelitRelation (history of concept)Kulttuuripolitiikan tutkimuksen vuosikirja
researchProduct

Memorializing mass deaths at the border: two cases from Canberra (Australia) and Lampedusa (Italy)

2017

In this paper, we compare two seemingly very similar instances in which individuals and organizations within the borders of the global North have memorialized the deaths of irregular migrants at sea: the SIEV X memorial in Australia’s national capital Canberra, and the Giardino della memoria (Garden of Remembrance) on the Italian island of Lampedusa. Unlike ephemeral manifestations of grief, potentially these memorials have effects that reach well beyond their creation. We relate the differences between the memorials to the contexts within which they were created: an immediate local response involving people directly affected by the disaster’s aftermath, on the one hand, and a delayed natio…

ta520Cultural StudiesMemorializationHistorySociology and Political ScienceRefugeemedia_common.quotation_subjectrajat0507 social and economic geographyPoison controlbordersmigrationSuicide preventionOccupational safety and healthpakolaisuusmaahanmuuttoInjury preventionborder-related deaths050602 political science & public administrationmuistaminenLampedusamedia_commonhautamuistomerkitmemorializationbiology05 social scienceskuolemarefugeesbiology.organism_classification0506 political scienceAnthropologymemorialsEthnologyGriefpakolaiset050703 geographyEthnic and Racial Studies
researchProduct

Changing people’s attitudes and beliefs toward driving through floodwaters : Evaluation of a video infographic

2018

Abstract Despite awareness of campaigns such as ‘Turn Around, Don’t Drown’ and the Australian state of Queensland’s ‘If It’s Flooded, Forget It’, people continue to drive through floodwaters, causing loss of life, risk to rescuers, and damage to vehicles. The aim of this study was to develop a video infographic that highlights the dangers of driving through floodwaters and provide safety tips to reduce the risk, and to evaluate its effectiveness in changing the beliefs and intentions of Australian adults toward this risky driving behaviour. This study adopted an online three-wave non-controlled pretest–posttest design. Australian licensed drivers (N = 201, male = 41, female = 160; Mage = 34…

ta520flooded waterwaysTransportationvesiäylät03 medical and health sciences0302 clinical medicineuskomuksethukkuminenPsychological TheorydrivingDrowning prevention030212 general & internal medicineta518Empirical evidenceApplied Psychologyta515Civil and Structural EngineeringSubjective norm030505 public healthwater safetyturvallisuusdrowningInfographicsocial cognitive theoriesRegretta3141tulvatwaterwaysRisk perceptionfloodsAutomotive Engineeringbeliefs0305 other medical sciencePsychologyLoss of lifeClinical psychologysafety and securityTransportation Research Part F : Traffic Psychology and Behaviour
researchProduct

DEVELOPMENT AND VALIDATION IN A GROUP OF INDUSTRY WORKERS, OF AN APPLICATION FOR AUDIOMETRIC SCREENING: A SOLUTION FOR SOCIAL DISTANCE DURING COVID-1…

2020

In the context of the global COVID-19 pandemic, companies and institutions all over the world are trying to find the best ways to reorganize their activity, minimizing the contagion risk among their employees, so as to protect their health and prevent internal SARS-COV-2 outbreaks. The recent development of new communication technologies, such as smartphones and tablets, has paved the way for the development and implementation of different applications. Starting with the above issues, in this study, we wanted to investigate the efficacy of iAudiometry application developed by our research team for the detection of deficits in the auditory system. Furthermore, we analyzed the precision in de…

tablesheadphonessars-cov-2lcsh:R5-920sound pressure levelcovid-19preventionaudiometryoccupational medicinelcsh:Medicine (General)appcommunication technologiesEuromediterranean Biomedical Journal
researchProduct

Kulttuurituottajat taiteen ja talouden risteyskohdassa

2011

talouskulttuuritapahtumatcultural productioncultural industriestapahtumatuotantocultural eventsart occupationskulttuurituottajatcultural intermediariesammatti-identiteettikulttuurialataidealatuottajatkulttuuriteollisuusmanageritcultural managersroolitkulttuurituotantokulttuuritoiminta
researchProduct

Role of odorant-binding proteins in Drosophila melanogaster chemosensory perception

2019

Chemoperception is used by animals to detect nutritive food and avoid toxic compounds. It also allows animals to identify suitable ecological niche and mating partners. Like many other insects, Drosophila melanogaster possesses a very sensitive chemosensory ability and can detect and discriminate a wide panel of semiochemicals. Chemosensory detection is mostly mediated by olfactory and gustatory systems involving several multigene chemoreceptor families. Volatile and non-volatile chemical compounds entering the sensory organ (sensillum) must be solubilized before being transported through the hydrophilic sensillum lymph bathing the dendrites of chemosensory neurons. These perireceptor event…

tastechemoperception[SDV.BBM] Life Sciences [q-bio]/Biochemistry Molecular Biologyperireceptor eventsgoût[SDV.BBM]Life Sciences [q-bio]/Biochemistry Molecular Biologyodorant-binding proteinschimioperceptionévénement périrecepteurdrosophilaprotéines de liaison aux odorantsolfaction
researchProduct