Search results for "General Computer Science"
showing 10 items of 895 documents
Solving the length constrained K-drones rural postman problem
2021
[EN] In this paper we address the Length Constrained K-Drones Rural Postman Problem (LC K-DRPP). This is a continuous optimization problem where a fleet of homogeneous drones have to jointly service (traverse) a set of (curved or straight) lines of a network. Unlike the vehicles in classical arc routing problems, a drone can enter a line through any of its points, service a portion of that line, exit through another of its points, then travel directly to any point on another line, and so on. Moreover, since the range of the drones is restricted, the length of each route is limited by a maximum distance. Some applications for drone arc routing problems include inspection of pipelines, railwa…
Mapping child maltreatment risk: a 12-year spatio-temporal analysis of neighborhood influences.
2017
Abstract Background ‘Place’ matters in understanding prevalence variations and inequalities in child maltreatment risk. However, most studies examining ecological variations in child maltreatment risk fail to take into account the implications of the spatial and temporal dimensions of neighborhoods. In this study, we conduct a high-resolution small-area study to analyze the influence of neighborhood characteristics on the spatio-temporal epidemiology of child maltreatment risk. Methods We conducted a 12-year (2004–2015) small-area Bayesian spatio-temporal epidemiological study with all families with child maltreatment protection measures in the city of Valencia, Spain. As neighborhood units…
Modeling Chickenpox Dynamics with a Discrete Time Bayesian Stochastic Compartmental Model
2018
[EN] We present a Bayesian stochastic susceptible-exposed-infectious-recovered model in discrete time to understand chickenpox transmission in the Valencian Community, Spain. During the last decades, different strategies have been introduced in the routine immunization program in order to reduce the impact of this disease, which remains a public health's great concern. Under this scenario, a model capable of explaining closely the dynamics of chickenpox under the different vaccination strategies is of utter importance to assess their effectiveness. The proposed model takes into account both heterogeneous mixing of individuals in the population and the inherent stochasticity in the transmiss…
Demand Sharing Inaccuracies in Supply Chains: A Simulation Study
2018
We investigate two main sources of information inaccuracies (i.e., errors and delays) in demand information sharing along the supply chain (SC). Firstly, we perform a systematic literature review on inaccuracy in demand information sharing and its impact on supply chain dynamics. Secondly, we model several SC settings using system dynamics and assess the impact of such information inaccuracies on SC performance. More specifically, we study the impact of four factors (i.e., demand error, demand delay, demand variability, and average lead times) using three SC dynamic performance indicators (i.e., bullwhip effect, inventory variability, and average inventory). The results suggest that demand …
Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature
2020
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…
Estimation of Granger causality through Artificial Neural Networks: applications to physiological systems and chaotic electronic oscillators
2021
One of the most challenging problems in the study of complex dynamical systems is to find the statistical interdependencies among the system components. Granger causality (GC) represents one of the most employed approaches, based on modeling the system dynamics with a linear vector autoregressive (VAR) model and on evaluating the information flow between two processes in terms of prediction error variances. In its most advanced setting, GC analysis is performed through a state-space (SS) representation of the VAR model that allows to compute both conditional and unconditional forms of GC by solving only one regression problem. While this problem is typically solved through Ordinary Least Sq…
Human factor policy testing in the sequencing of manual mixed model assembly lines
2004
In this paper the human resource management in manual mixed model assembly U-lines is considered. The objective is to minimise the total conveyor stoppage time to achieve the full efficiency of the line. A model, that includes effects of the human resource, was developed in order to evaluate human factor policies impact on the optimal solution of this line sequencing problem. Different human resource management policies are introduced to cope with the particular layout of the proposed line. Several examples have been proposed to investigate the effects of line dimensions on the proposed management policies. The examples have been solved through a genetic algorithm. The obtained results conf…
Auditory distance perception in an acoustic pipe
2008
In a study of auditory distance perception, we investigated the effects of exaggeration the acoustic cue of reverberation where the intensity of sound did not vary noticeably. The set of stimuli was obtained by moving a sound source inside a 10.2-m long pipe having a 0.3-m diameter. Twelve subjects were asked to listen to a speech sound while keeping their head inside the pipe and then to estimate the egocentric distance from the sound source using a magnitude production procedure. The procedure was repeated eighteen times using six different positions of the sound source. Results show that the point at which perceived distance equals physical distance is located approximately 3.5 m away fr…
Analyzing the security of Windows 7 and Linux for cloud computing
2013
We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.
Durability assessment of basalt fiber polymer as reinforcement to expanded clay concrete in harsh environment
2021
Basalt fiber-reinforced polymer composites are receiving considerable attention as they represent a low-cost green source of raw materials. In most cases, fiber-reinforced polymer composites face harsh environments, such as chloride ions in coastal marine environments or cold regions with salt deicing. The resistance of fiber-reinforced polymers subjected to the above environments is critical for the safe design and application of such composites. This research aims to develop a framework to investigate the durability properties of the lightweight expanded clay basalt fiber polymer reinforced concrete exposed to the NaCl environment. The specified quantity of concrete structural elements wa…