Search results for "General Computer Science"

showing 10 items of 895 documents

Solving the length constrained K-drones rural postman problem

2021

[EN] In this paper we address the Length Constrained K-Drones Rural Postman Problem (LC K-DRPP). This is a continuous optimization problem where a fleet of homogeneous drones have to jointly service (traverse) a set of (curved or straight) lines of a network. Unlike the vehicles in classical arc routing problems, a drone can enter a line through any of its points, service a portion of that line, exit through another of its points, then travel directly to any point on another line, and so on. Moreover, since the range of the drones is restricted, the length of each route is limited by a maximum distance. Some applications for drone arc routing problems include inspection of pipelines, railwa…

Arc routingMatheuristicInformation Systems and ManagementTraverseGeneral Computer ScienceHeuristic (computer science)Computer science0211 other engineering and technologiesLength constraintsLogistics02 engineering and technologyManagement Science and Operations ResearchIndustrial and Manufacturing Engineering0502 economics and businessPoint (geometry)Finite setDrones050210 logistics & transportation021103 operations researchHeuristic05 social sciencesRange (mathematics)Modeling and SimulationPolygonal chainLine (geometry)MATEMATICA APLICADAAlgorithmArc routingEuropean Journal of Operational Research
researchProduct

Mapping child maltreatment risk: a 12-year spatio-temporal analysis of neighborhood influences.

2017

Abstract Background ‘Place’ matters in understanding prevalence variations and inequalities in child maltreatment risk. However, most studies examining ecological variations in child maltreatment risk fail to take into account the implications of the spatial and temporal dimensions of neighborhoods. In this study, we conduct a high-resolution small-area study to analyze the influence of neighborhood characteristics on the spatio-temporal epidemiology of child maltreatment risk. Methods We conducted a 12-year (2004–2015) small-area Bayesian spatio-temporal epidemiological study with all families with child maltreatment protection measures in the city of Valencia, Spain. As neighborhood units…

Area-specific risk estimationTime FactorsGeneral Computer ScienceHealth geographyPoison controlNeighborhood influenceslcsh:Computer applications to medicine. Medical informaticsSuicide preventionOccupational safety and health03 medical and health sciences0302 clinical medicineSpatio-Temporal AnalysisResidence CharacteristicsRisk FactorsEnvironmental healthInjury preventionHumans0501 psychology and cognitive sciences030212 general & internal medicineChild AbuseChildSocioeconomic statusChild maltreatmentResearch05 social sciencesPublic Health Environmental and Occupational HealthAbsolute risk reductionHuman factors and ergonomicsSmall-area studyGeneral Business Management and AccountingSocial ClassSocioeconomic FactorsSpainlcsh:R858-859.7Disease mappingSpatial inequalityBayesian spatio-temporal modelingPsychology050104 developmental & child psychologyInternational journal of health geographics
researchProduct

Modeling Chickenpox Dynamics with a Discrete Time Bayesian Stochastic Compartmental Model

2018

[EN] We present a Bayesian stochastic susceptible-exposed-infectious-recovered model in discrete time to understand chickenpox transmission in the Valencian Community, Spain. During the last decades, different strategies have been introduced in the routine immunization program in order to reduce the impact of this disease, which remains a public health's great concern. Under this scenario, a model capable of explaining closely the dynamics of chickenpox under the different vaccination strategies is of utter importance to assess their effectiveness. The proposed model takes into account both heterogeneous mixing of individuals in the population and the inherent stochasticity in the transmiss…

Article SubjectGeneral Computer ScienceComputer scienceComputationBayesian probabilityPosterior probabilityPopulation01 natural scienceslcsh:QA75.5-76.95010305 fluids & plasmas010104 statistics & probabilityMixing (mathematics)0103 physical sciencesmedicineEconometrics0101 mathematicseducationeducation.field_of_studyMultidisciplinaryChickenpoxPrediction intervalmedicine.diseaseVaccinationDiscrete time and continuous timePosterior predictive distributionlcsh:Electronic computers. Computer scienceMATEMATICA APLICADA
researchProduct

Demand Sharing Inaccuracies in Supply Chains: A Simulation Study

2018

We investigate two main sources of information inaccuracies (i.e., errors and delays) in demand information sharing along the supply chain (SC). Firstly, we perform a systematic literature review on inaccuracy in demand information sharing and its impact on supply chain dynamics. Secondly, we model several SC settings using system dynamics and assess the impact of such information inaccuracies on SC performance. More specifically, we study the impact of four factors (i.e., demand error, demand delay, demand variability, and average lead times) using three SC dynamic performance indicators (i.e., bullwhip effect, inventory variability, and average inventory). The results suggest that demand …

Article SubjectGeneral Computer ScienceIMPACTComputer scienceSupply chain0211 other engineering and technologiesINFORMATION DISTORTIONINVENTORYDELAYS02 engineering and technologyERRORSlcsh:QA75.5-76.95Bullwhip effect0202 electrical engineering electronic engineering information engineeringEconometricsPERSPECTIVE021103 operations researchMultidisciplinaryInformation sharingContrast (statistics)BULLWHIPPOLICYSettore ING-IND/35 - Ingegneria Economico-GestionaleINCENTIVESLow demandMODEL020201 artificial intelligence & image processinglcsh:Electronic computers. Computer sciencePerformance indicatorComplexity
researchProduct

Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature

2020

Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…

Artificial intelligence and cybersecuritycybersecurityGeneral Computer ScienceComputer scienceinformation securitysystematic reviewsprotocols02 engineering and technologyIntrusion detection systemtekoälyComputer securitycomputer.software_genre01 natural sciencesDomain (software engineering)systematic reviewGeneral Materials Sciencekirjallisuuskatsauksettietoturvakyberturvallisuussystemaattiset kirjallisuuskatsauksettietoverkkorikoksetkyberrikollisuusbusiness.industry010401 analytical chemistryGeneral Engineeringartificial intelligence021001 nanoscience & nanotechnology0104 chemical sciencesSupport vector machinekoneoppiminenmachine learningcomputer crimeArtificial intelligencelcsh:Electrical engineering. Electronics. Nuclear engineeringSystematic mappingIntrusion prevention system0210 nano-technologybusinesscomputerlcsh:TK1-9971Qualitative researchIEEE Access
researchProduct

Estimation of Granger causality through Artificial Neural Networks: applications to physiological systems and chaotic electronic oscillators

2021

One of the most challenging problems in the study of complex dynamical systems is to find the statistical interdependencies among the system components. Granger causality (GC) represents one of the most employed approaches, based on modeling the system dynamics with a linear vector autoregressive (VAR) model and on evaluating the information flow between two processes in terms of prediction error variances. In its most advanced setting, GC analysis is performed through a state-space (SS) representation of the VAR model that allows to compute both conditional and unconditional forms of GC by solving only one regression problem. While this problem is typically solved through Ordinary Least Sq…

Artificial neural networks; Chaotic oscillators; Granger causality; Multivariate time series analysis; Network physiology; Penalized regression techniques; Remote synchronization; State-space models; Stochastic gradient descent L1; Vector autoregressive modelGeneral Computer ScienceDynamical systems theoryComputer science02 engineering and technologyChaotic oscillatorsPenalized regression techniquesNetwork topologySettore ING-INF/01 - ElettronicaMultivariate time series analysisVector autoregression03 medical and health sciences0302 clinical medicineScientific Computing and Simulation0202 electrical engineering electronic engineering information engineeringRepresentation (mathematics)Optimization Theory and ComputationNetwork physiologyState-space modelsArtificial neural networkArtificial neural networksData ScienceTheory and Formal MethodsQA75.5-76.95Stochastic gradient descent L1Granger causality State-space models Vector autoregressive model Artificial neural networks Stochastic gradient descent L1 Multivariate time series analysis Network physiology Remote synchronization Chaotic oscillators Penalized regression techniquesRemote synchronizationStochastic gradient descentAutoregressive modelAlgorithms and Analysis of AlgorithmsVector autoregressive modelElectronic computers. Computer scienceSettore ING-INF/06 - Bioingegneria Elettronica E InformaticaGranger causality020201 artificial intelligence & image processingGradient descentAlgorithm030217 neurology & neurosurgeryPeerJ Computer Science
researchProduct

Human factor policy testing in the sequencing of manual mixed model assembly lines

2004

In this paper the human resource management in manual mixed model assembly U-lines is considered. The objective is to minimise the total conveyor stoppage time to achieve the full efficiency of the line. A model, that includes effects of the human resource, was developed in order to evaluate human factor policies impact on the optimal solution of this line sequencing problem. Different human resource management policies are introduced to cope with the particular layout of the proposed line. Several examples have been proposed to investigate the effects of line dimensions on the proposed management policies. The examples have been solved through a genetic algorithm. The obtained results conf…

Assembly line; Conveyor stoppage; Human factor; SequencingMixed modelConveyor stoppageMathematical optimizationGeneral Computer ScienceOperations researchComputer sciencebusiness.industryAssembly lineManagement Science and Operations ResearchSettore ING-IND/35 - Ingegneria Economico-GestionaleModeling and SimulationHuman resource managementFactor (programming language)Human factorGenetic algorithmSequencingLine (text file)Human resourcesbusinesscomputercomputer.programming_language
researchProduct

Auditory distance perception in an acoustic pipe

2008

In a study of auditory distance perception, we investigated the effects of exaggeration the acoustic cue of reverberation where the intensity of sound did not vary noticeably. The set of stimuli was obtained by moving a sound source inside a 10.2-m long pipe having a 0.3-m diameter. Twelve subjects were asked to listen to a speech sound while keeping their head inside the pipe and then to estimate the egocentric distance from the sound source using a magnitude production procedure. The procedure was repeated eighteen times using six different positions of the sound source. Results show that the point at which perceived distance equals physical distance is located approximately 3.5 m away fr…

Auditory displayReverberationRange (music)Critical distanceSound and Music ComputingGeneral Computer SciencePerformanceSpeech recognitionmedia_common.quotation_subjectExperimental and Cognitive PsychologySound and Music Computing; Auditory display; Distance perceptionTheoretical Computer ScienceLoudnessPerceptionExperimentationSound (geography)media_commonMathematicsExperimentation; Measurement; Performance; Acoustic pipe; Auditory display; Distance perceptionMeasurementgeographygeography.geographical_feature_categorySettore INF/01 - InformaticaAuditory displaySound intensityAcoustic pipeAcoustic pipe; auditory display; distance perceptionDistance perceptionACM Transactions on Applied Perception
researchProduct

Analyzing the security of Windows 7 and Linux for cloud computing

2013

We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.

AuthenticationCloud computing securityGeneral Computer ScienceComputer sciencebusiness.industryAuthorizationData securityAccess controlCloud computingInformation securityComputer security modelAsset (computer security)EncryptionInternet securityComputer securitycomputer.software_genreSecurity and safety features new to Windows VistaSecurity information and event managementSecurity serviceNetwork Access ControlSecurity through obscuritybusinessLawcomputerComputers & Security
researchProduct

Durability assessment of basalt fiber polymer as reinforcement to expanded clay concrete in harsh environment

2021

Basalt fiber-reinforced polymer composites are receiving considerable attention as they represent a low-cost green source of raw materials. In most cases, fiber-reinforced polymer composites face harsh environments, such as chloride ions in coastal marine environments or cold regions with salt deicing. The resistance of fiber-reinforced polymers subjected to the above environments is critical for the safe design and application of such composites. This research aims to develop a framework to investigate the durability properties of the lightweight expanded clay basalt fiber polymer reinforced concrete exposed to the NaCl environment. The specified quantity of concrete structural elements wa…

Basaltchemistry.chemical_classification0209 industrial biotechnologybasalt fiber in the harsh environmentMaterials scienceGeneral Computer Science020209 energyGeneral Chemical Engineeringbasalt fiber concrete durabilityGeneral Engineering02 engineering and technologyPolymerlightweight concreteRaw materialEngineering (General). Civil engineering (General)Durability020901 industrial engineering & automationchemistryBasalt fiber0202 electrical engineering electronic engineering information engineeringPolymer compositesComposite materialTA1-2040Reinforcementexpanded clayCogent Engineering
researchProduct