2020
Authors
Sousa, CN; Cabrita, F; Rodrigues, S; Ventura, A; de Matos, AN; Almeida, P; Teles, P; Loureiro, L; Xavier, E;
Publication
THERAPEUTIC APHERESIS AND DIALYSIS
Abstract
2020
Authors
Ribeiro, OMPL; Martins, MMFPdS; Tronchin, DMR; Teles, PJFC; Trindade, LDL; Ventura Silva, JMA;
Publication
Revista Baiana de Enfermagem?
Abstract
2020
Authors
Ribeiro O.M.P.L.; da Silva Martins M.M.F.P.; Tronchin D.M.R.; Teles P.J.F.C.; de Lima Trindade L.; da Silva J.M.A.V.;
Publication
Revista Baiana de Enfermagem
Abstract
Objective: to analyze the factorial structure of the Perception Scale of Nursing Activities that Contribute to the Quality of Care. Method: a methodological study with 3,451 nurses from 36 Portuguese hospitals. In addition to carrying out confirmatory factorial analysis, Cronbach’s alpha and composite reliability were used to assess the reliability of the obtained factorial model. Results: the factorial weights of the solution found were mostly high; the values of the model’s adjustment indexes were reasonable; Cronbach’s alpha was elevated for the entire scale and five dimensions, being acceptable in only one dimension. The composite reliability was also high in five dimensions, except for one, considered acceptable. All activities showed high individual reliability. Conclusion: Compared to the original scale, the identified factorial model contemplates six dimensions and not seven, producing a reliable and valid scale, which can be applied in the hospital context.
2020
Authors
Azad, MA; Bag, S; Tabassum, S; Hao, F;
Publication
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING
Abstract
Nuisance or unsolicited calls and instant messages come at any time in a variety of different ways. These calls would not only exasperate recipients with the unwanted ringing, impacting their productivity, but also lead to a direct financial loss to users and service providers. Telecommunication Service Providers (TSPs) often employ standalone detection systems to classify call originators as spammers or non-spammers using their behavioral patterns. These approaches perform well when spammers target a large number of recipients of one service provider. However, professional spammers try to evade the standalone systems by intelligently reducing the number of spam calls sent to one service provider, and instead distribute calls to the recipients of many service providers. Naturally, collaboration among service providers could provide an effective defense, but it brings the challenge of privacy protection and system resources required for the collaboration process. In this paper, we propose a novel decentralized collaborative system named privy for the effective blocking of spammers who target multiple TSPs. More specifically, we develop a system that aggregates the feedback scores reported by the collaborating TSPs without employing any trusted third party system, while preserving the privacy of users and collaborators. We evaluate the system performance of privy using both the synthetic and real call detail records. We find that privy can correctly block spammers in a quicker time, as compared to standalone systems. Further, we also analyze the security and privacy properties of the privy system under different adversarial models.
2020
Authors
Tabassum, S;
Publication
Abstract
2020
Authors
Barros, P; Cerveira, A; Baptista, J;
Publication
Intelligent Systems Design and Applications - 20th International Conference on Intelligent Systems Design and Applications (ISDA 2020) held December 12-15, 2020
Abstract
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.