Search results for "machine"
showing 10 items of 2592 documents
Reducing whole-body vibration exposure in backhoe loaders by education of operators
2012
Author's version of an article published in the journal: International Journal of Industrial Ergonomics. Also available from the publisher at: http://dx.doi.org/10.1016/j.ergon.2012.03.001 Whole-body vibration is a health hazard for operators of construction machinery. The level of whole-body vibration exposure on the operator is governed by three different factors; performance of the suspension system of the machine, planning of the work and the skills of the operator.In this research work it is investigated whether there is a potential in bringing down the level of whole-body vibration exposure by educating operators of backhoe loaders. This is carried out by an experimental setup. Six ex…
Vaccine Hesitancy on Social Media: Sentiment Analysis from June 2011 to April 2019
2021
Vaccine hesitancy was one of the ten major threats to global health in 2019, according to the World Health Organisation. Nowadays, social media has an important role in the spread of information, misinformation, and disinformation about vaccines. Monitoring vaccine-related conversations on social media could help us to identify the factors that contribute to vaccine confidence in each historical period and geographical area. We used a hybrid approach to perform an opinion-mining analysis on 1,499,227 vaccine-related tweets published on Twitter from 1st June 2011 to 30th April 2019. Our algorithm classified 69.36% of the tweets as neutral, 21.78% as positive, and 8.86% as negative. The perce…
Computational methods and theory for ion channel research
2022
Ion channels are fundamental biological devices that act as gates in order to ensure selective ion transport across cellular membranes; their operation constitutes the molecular mechanism through which basic biological functions, such as nerve signal transmission and muscle contraction, are carried out. Here, we review recent results in the field of computational research on ion channels, covering theoretical advances, state-of-the-art simulation approaches, and frontline modeling techniques. We also report on few selected applications of continuum and atomistic methods to characterize the mechanisms of permeation, selectivity, and gating in biological and model channels.
Low-Head Hydropower for Energy Recovery in Wastewater Systems
2022
Hydraulic turbines for energy recovery in wastewater treatment plants, with relatively large discharges values and small head jumps, are usually screw Archimedes or Kaplan types. In the specific case of a small head jump (about 3 m) underlying a rectangular weir in the major Palermo (Italy) water treatment plant, a traditional Kaplan solution is compared with two other new proposals: a Hydrostatic Pressure Machine (HPM) located at the upstream channel and a cross-flow turbine (CFT) located in a specific underground room downstream of the same channel. The fluid mechanical formulations of the flow through these turbines are analyzed and the characteristic parameters are stated. Numerical ana…
Universal Patterns in Color-Emotion Associations Are Further Shaped by Linguistic and Geographic Proximity
2020
Many of us “see red,” “feel blue,” or “turn green with envy.” Are such color-emotion associations fundamental to our shared cognitive architecture, or are they cultural creations learned through our languages and traditions? To answer these questions, we tested emotional associations of colors in 4,598 participants from 30 nations speaking 22 native languages. Participants associated 20 emotion concepts with 12 color terms. Pattern-similarity analyses revealed universal color-emotion associations (average similarity coefficient r = .88). However, local differences were also apparent. A machine-learning algorithm revealed that nation predicted color-emotion associations above and beyond tho…
How can algorithms help in segmenting users and customers? : A systematic review and research agenda for algorithmic customer segmentation
2023
What algorithm to choose for customer segmentation? Should you use one algorithm or many? How many customer segments should you create? How to evaluate the results? In this research, we carry out a systematic literature review to address such central questions in customer segmentation research and practice. The results from extracting information from 172 relevant articles show that algorithmic customer segmentation is the predominant approach for customer segmentation. We found researchers employing 46 different algorithms and 14 different evaluation metrics. For the algorithms, K-means clustering is the most employed. For the metrics, separation-focused metrics are slightly more prevalent…
Towards digital cognitive clones for the decision-makers: adversarial training experiments
2021
Abstract There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveilla…
Interactive evolutionary multiobjective optimization with modular physical user interface
2022
© 2022 Copyright held by the owner/author(s). Incorporating the preferences of a domain expert, a decision-maker (DM), in solving multiobjective optimization problems increased in popularity in recent years. The DM can choose to use different types of preferences depending on his/her comfort, requirements, or the problem being solved. Most papers, where preference-based and interactive algorithms have been proposed, do not pay attention to the user interfaces and input devices. If they do, they use character or graphics-based preference input methods. We propose the option of using a physical or tactile input device that gives the DM a better sense of control over providing his/her preferen…
On Attacking Future 5G Networks with Adversarial Examples : Survey
2022
The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various requirements in different vertical sectors while operating on top of the same physical infrastructure. The recent progress in artificial intelligence and machine learning is theorized to be a potential answer to the arising resource allocation challenges. It is therefore expected that future generation mobile networks will heavily depend on its artificial intelligence components which may result in …
Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems
2020
Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine Learning models used in a cloud data platform service. Adversarial examples are malicious inputs to ML-models that provide erroneous model outputs while appearing to be unmodified. This kind of attack can fool the classifier and can prevent ML-models from generalizing well and from learning high-level representation; instead, the ML-model learns superficial dataset regularity. This study focuses on investigating, detecting, and preventing adversarial attacks towards a cloud dat…