Search results for "NETWORKS"
showing 10 items of 3260 documents
A note on normalization schemes: The case of generalized forecast error variance decompositions
2016
The aim of this paper is to propose new normalization schemes for the values obtained from the generalized forecast error variance decomposition, in order to obtain more reliable net spillover measures. We provide a review of various matrix normalization schemes used in different application domains. The intention is to contribute to the financial econometrics literature aimed at building a bridge between different approaches able to detect spillover effects, such as spatial regressions and network analyses. Considering DGPs characterized by different degrees of correlation and persistence, we show that the popular row normalization scheme proposed by Diebold and Yilmaz (2012), as well as t…
Shape staggering of midshell mercury isotopes from in-source laser spectroscopy compared with density-functional-theory and Monte Carlo shell-model c…
2019
Neutron-deficient Hg177-185 isotopes were studied using in-source laser resonance-ionization spectroscopy at the CERN-ISOLDE radioactive ion-beam facility in an experiment combining different detection methods tailored to the studied isotopes. These include either α-decay tagging or multireflection time-of-flight gating for isotope identification. The endpoint of the odd-even nuclear shape staggering in mercury was observed directly by measuring for the first time the isotope shifts and hyperfine structures of Hg177-180. Changes in the mean-square charge radii for all mentioned isotopes, magnetic dipole, and electric quadrupole moments of the odd-A isotopes and arguments in favor of I=7/2 s…
En métal et en céramique. Production, imitation, circulation des oenochoés « rhodiennes » entre la Méditerranée, l’Italie et les communautés no…
2019
At present there is no study taking into account these classe of containers, in different materials and in such a vast geographical area. It is necessary to relate the different productions of these classe of vases, from prototypes to local imitations, in order to understand the role of these products in similar or different contexts. The objective is to approach the contacts between Italy, the Mediterranean and the northern Alpine communities from different aspects:- first of all from the productions and the technical aspects,- then by the identification and in-depth study of the local imitations of these receptacles,- second, by the circulation of imported objects (routes and nature of tr…
Seizure Prediction Using EEG Channel Selection Method
2022
Seizure prediction using intracranial electroencephalogram (iEEG) is still challenging because of complicated signals in spatial and time domains. Feature selection in the spatial domain (i.e., channel selection) has been largely ignored in this field. Hence, in this paper, a novel approach of iEEG channel selection strategy combined with one-dimensional convolutional neural networks (1D-CNN) was presented for seizure prediction. First, 15-sec and 30-sec iEEG segments with an increasing number of channels (from one channel to all channels) were sequentially fed into 1D-CNN models for training and testing. Then, the channel case with the best classification rate was selected for each partici…
WRKY gene family drives dormancy release in onion bulbs
2022
Onion (Allium cepa L.) is an important bulb crop grown worldwide. Dormancy in bulbous plants is an important physiological state mainly regulated by a complex gene network that determines a stop of vegetative growth during unfavorable seasons. Limited knowledge on the molecular mechanisms that regulate dormancy in onion were available until now. Here, a comparison between uninfected and onion yellow dwarf virus (OYDV)-infected onion bulbs highlighted an altered dormancy in the virus-infected plants, causing several symptoms, such as leaf striping, growth reduction, early bulb sprouting and rooting, as well as a lower abscisic acid (ABA) level at the start of dormancy. Furthermore, by compar…
A Framework to Facilitate Wireless Sensor Network Application Development
2013
Elektroniskā versija nesatur pielikumus
Hypervisor-Based White Listing of Executables
2019
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed
Modeling epidemics through ladder operators
2020
Highlights • We propose an operatorial model to describe epidemics. • The model describes well the asymptotic numbers of the epidemics. • Ladder operators are used to model exchanges between the “actors” of the system.
Estimating Programming Exercise Difficulty using Performance Factors Analysis
2020
This Work in Progress Paper studies student and exercise modelling based on pass/fail log data gathered from an introductory programming course. Contemporary education capitalizes on the communications technology and remote study. This can create distance between the teacher and students and the resulting lack of awareness of the difficulties students encounter can lead to low student satisfaction, dropout and poor grades. In many cases, various technological solutions are used to collect individual exercise submissions, but there are little resources for indexing or modelling the exercises in depth. Exercise specific feedback from students may not be easily obtainable either. In the presen…
Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions
2023
AbstractIS literature has identified various economic, performance, and environmental factors affecting cybersecurity investment decisions. However, economic modeling approaches dominate, and research on cybersecurity performance as an antecedent to investments has taken a backseat. Neglecting the role of performance indicators ignores real-world concerns driving actual cybersecurity investment decision-making. We investigate two critical aspects of cybersecurity performance: breach costs and breach identification source, as antecedents to cybersecurity investment decisions. We use organizational learning to theorize how performance feedback from these two aspects of cybersecurity breaches …