837 resultados para clustering users in social network


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Hepatitis C infection (HCV) continues to disproportionately affect Hispanics/Latinos in the United States. Hispanic/Latino intravenous drug users (IDUs), because of their risky injection and sexual behaviors, are prone to HCV infection and rapid transmission of the virus to others via several routes. With a prevalence rate of approximately 75% among IDUs, it is imperative that transmission of HCV be prevented in this population. This study aims to examine the associations between demographic, injection and sexual risk factors to HCV infection in a group Hispanic/Latino IDUs in Miami-Dade County, Florida. Preliminary unadjusted results in this sample reveal that age (OR=4.592, p=0.004), weekly injection (OR=5.171, p=0.000), daily injection frequency (OR=3.856, p=0.000) and use of a dirty needle (OR=2.320, p= 0.006) were all significantly associated with HCV infection. Being born outside the U.S. was significantly negatively associated with HCV infection (OR=0.349, p=0.004). Additionally, having two or more sex partners in the past three months (OR=0.472, p=0.014) was negatively associated with HCV infection. After adjusting for all other variables, older age (AOR=7.470, p=0.006), weekly injection (AOR=3.238, p=0.007) and daily injection frequency (AOR=2.625, p=0.010) were all significantly associated with HCV infection. Being born outside the U.S. (AOR=0.369, p=0.019) was a significant protective factor for HCV infection, along with having two or more sex partners in the past three months (AOR=0.481, p=0.037). When analyzing the significant variables in a backward regression model, having 2 or more sex partners in the past three months was not significant at the p

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Postprint

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the quick advance of web service technologies, end-users can conduct various on-line tasks, such as shopping on-line. Usually, end-users compose a set of services to accomplish a task, and need to enter values to services to invoke the composite services. Quite often, users re-visit websites and use services to perform re-occurring tasks. The users are required to enter the same information into various web services to accomplish such re-occurring tasks. However, repetitively typing the same information into services is a tedious job for end-users. It can negatively impact user experience when an end-user needs to type the re-occurring information repetitively into web services. Recent studies have proposed several approaches to help users fill in values to services automatically. However, prior studies mainly suffer the following drawbacks: (1) limited support of collecting and analyzing user inputs; (2) poor accuracy of filling values to services; (3) not designed for service composition. To overcome the aforementioned drawbacks, we need maximize the reuse of previous user inputs across services and end-users. In this thesis, we introduce our approaches that prevent end-users from entering the same information into repetitive on-line tasks. More specifically, we improve the process of filling out services in the following 4 aspects: First, we investigate the characteristics of input parameters. We propose an ontology-based approach to automatically categorize parameters and fill values to the categorized input parameters. Second, we propose a comprehensive framework that leverages user contexts and usage patterns into the process of filling values to services. Third, we propose an approach for maximizing the value propagation among services and end-users by linking a set of semantically related parameters together and similar end-users. Last, we propose a ranking-based framework that ranks a list of previous user inputs for an input parameter to save a user from unnecessary data entries. Our framework learns and analyzes interactions of user inputs and input parameters to rank user inputs for input parameters under different contexts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Describes and analyzes the results obtained after analysis of the publications present in Scopus data base and used that tool rankings generated by the research group Scimago on the production of the different countries of Central America on the issue of documentation the means of mass communication. Performed a comparative about different countries in the region and the scientific analyzes. Finally, and given and data analysis, a number of recommendations are made to improve the production and the presence in indexed database.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper examines the social dynamics of electronic exchanges in the human services, particularly in social work. It focuses on the observable effects that email and texting have on the linguistic, relational and clinical rather than managerial aspects of the profession. It highlights how electronic communication is affecting professionals in their practice and learners as they become acculturated to social work. What are the gains and losses of the broad use of electronic devices in daily lay and professional, verbal and non-verbal communication? Will our current situation be seriously detrimental to the demeanor of future practitioners, their use of language, and their ability to establish close personal relationships? The paper analyzes social work linguistic and behavioral changes in light of the growth of electronic communication and offers a summary of merits and demerits viewed through a prism emerging from Baron’s (2000) analysis of human communication.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Situational awareness is achieved naturally by the human senses of sight and hearing in combination. Automatic scene understanding aims at replicating this human ability using microphones and cameras in cooperation. In this paper, audio and video signals are fused and integrated at different levels of semantic abstractions. We detect and track a speaker who is relatively unconstrained, i.e., free to move indoors within an area larger than the comparable reported work, which is usually limited to round table meetings. The system is relatively simple: consisting of just 4 microphone pairs and a single camera. Results show that the overall multimodal tracker is more reliable than single modality systems, tolerating large occlusions and cross-talk. System evaluation is performed on both single and multi-modality tracking. The performance improvement given by the audio–video integration and fusion is quantified in terms of tracking precision and accuracy as well as speaker diarisation error rate and precision–recall (recognition). Improvements vs. the closest works are evaluated: 56% sound source localisation computational cost over an audio only system, 8% speaker diarisation error rate over an audio only speaker recognition unit and 36% on the precision–recall metric over an audio–video dominant speaker recognition method.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this article we argue that young people’s political participation in the social media can be considered ‘public pedagogy’. The argument builds on a previous empirical analysis of a Swedish net community called Black Heart. Theoretically, the article is based on a particular notion of public pedagogy, education and Hannah Arendt’s expressive agonism. The political participation that takes place in the net community builds up an educational situation that involves central characteristics: communication, community building, a strong content focus and content production, argumentation and rule following. These characteristics pave the way for young people’s public voicing, experiencing, preferences and political interests that guide their everyday political life and learning – a phenomenon that we understand as a form of public pedagogy. 

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Market research is often conducted through conventional methods such as surveys, focus groups and interviews. But the drawbacks of these methods are that they can be costly and timeconsuming. This study develops a new method, based on a combination of standard techniques like sentiment analysis and normalisation, to conduct market research in a manner that is free and quick. The method can be used in many application-areas, but this study focuses mainly on the veganism market to identify vegan food preferences in the form of a profile. Several food words are identified, along with their distribution between positive and negative sentiments in the profile. Surprisingly, non-vegan foods such as cheese, cake, milk, pizza and chicken dominate the profile, indicating that there is a significant market for vegan-suitable alternatives for such foods. Meanwhile, vegan-suitable foods such as coconut, potato, blueberries, kale and tofu also make strong appearances in the profile. Validation is performed by using the method on Volkswagen vehicle data to identify positive and negative sentiment across five car models. Some results were found to be consistent with sales figures and expert reviews, while others were inconsistent. The reliability of the method is therefore questionable, so the results should be used with caution.