Institution
University of North Carolina at Charlotte
Education•Charlotte, North Carolina, United States•
About: University of North Carolina at Charlotte is a education organization based out in Charlotte, North Carolina, United States. It is known for research contribution in the topics: Population & Poison control. The organization has 8772 authors who have published 22239 publications receiving 562529 citations. The organization is also known as: UNC Charlotte & UNCC.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: HCPs are at risk of developing WRA from exposure to cleaning substances from exposure in the longest job to cleaning agents and disinfectants/sterilants.
Abstract: Objectives Work-related asthma (WRA) is an important public health problem affecting one quarter of adults with asthma. Although cleaning substances are routinely used in hospitals, few studies have addressed their potential adverse respiratory health effects on healthcare professionals (HCPs). This study attempts to identify relationship between work-related exposure to cleaning-related chemicals and development of WRA among HCPs. Methods Of 5600 HCPs surveyed, 3650 responded to a validated questionnaire about their occupation, asthma diagnosis, variability of asthma symptoms at and away from work, and exposure to individual cleaning substances. Workplace asthma was defined as a categorical variable with four mutually exclusive categories: work-related asthma symptoms (WRAS), work-exacerbated asthma (WEA), occupational asthma (OA) and none. Multivariable logistic regression analysis was used to evaluate the association between self-reported use of cleaning substances and asthma outcomes among HCPs. Results Prevalences of WRAS, WEA and OA were 3.3%, 1.1% and 0.8%, respectively. The prevalence estimates were generally higher among female than male HCPs. The odds of WRAS and WEA increased in a dose-dependent manner for exposure in the longest job to cleaning agents and disinfectants/sterilants, respectively. For exposure in any job, the odds of WRAS were significantly elevated for both factor 1 (bleach, cleaners/abrasives, toilet cleaners, detergents and ammonia) and factor 2 (glutaraldehyde/ortho-phtaldehyde, chloramines and ethylene oxide). Significantly elevated odds of WEA were observed for exposure to bleach, factor 2 and formalin/formaldehyde. Exposure to chloramines was significantly associated with an almost fivefold elevated odds of OA. Conclusions HCPs are at risk of developing WRA from exposure to cleaning substances.
124 citations
••
TL;DR: This paper proposes a novel grid-based gateway deployment method using a cross-layer throughput optimization, and proves that the achieved throughput by the method is a constant times of the optimal.
Abstract: In this paper, we address the problem of gateway placement for throughput optimization in multi-hop wireless mesh networks. Assume that each mesh node in the mesh network has a traffic demand. Given the number of gateways to be deployed (denoted by k) and the interference model in the network, we study where to place exactly k gateways in the mesh network such that the total throughput is maximized while it also ensures a certain fairness among all mesh nodes. We propose a novel grid-based gateway deployment method using a cross-layer throughput optimization, and prove that the achieved throughput by our method is a constant times of the optimal. Simulation results demonstrate that our method can effectively exploit the available resources and perform much better than random and fixed deployment methods. In addition, the proposed method can also be extended to work with multi-channel and multi-radio mesh networks under different interference models.
124 citations
•
01 Oct 2014TL;DR: The historical context of the work to date on usable security and privacy is presented, a taxonomy for organizing that work is created, current research objectives are outlined, lessons learned are presented, and suggestions for future research are made.
Abstract: There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to date on usable security and privacy, creates a taxonomy for organizing that work, outlines current research objectives, presents lessons learned, and makes suggestions for future research. Table of Contents: Acknowledgments / Figure Credits / Introduction / A Brief History of Usable Privacy and Security Research / Major Themes in UPS Academic Research / Lessons Learned / Research Challenges / Conclusion: The Next Ten Years / Bibliography / Authors' Biographies
123 citations
••
TL;DR: By examining analysts' interaction logs, the authors identified the analysts' strategies, methods, and findings when using a financial VA tool.
Abstract: Understanding how analysts use visual-analytics (VA) tools can help reveal their reasoning processes when using these tools. By examining analysts' interaction logs, the authors identified the analysts' strategies, methods, and findings when using a financial VA tool.
123 citations
••
TL;DR: Information-search data refuted the idea that subjects represented hypotheses as Bayesian set, and three experiments were conducted to examine cognitive representations of hypothesis sets in the testing of multiple competing hypotheses.
Abstract: A well-documented phenomenon in opinion-revision literature is subjects' failure to revise probability estimates for an exhaustive set of mutually exclusive hypotheses in a complementary manner. However, prior research has not addressed the question of whether such behavior simply represents a misunderstanding of mathematical rules, or whether it is a consequence of a cognitive representation of hypotheses that is at odds with the Bayesian notion of a set relationship. Two alternatives to the Bayesian representation, a belief system (Shafer, 1976) and a system of independent hypotheses, were proposed, and three experiments were conducted to examine cognitive representations of hypothesis sets in the testing of multiple competing hypotheses. Subjects were given brief murder mysteries to solve and allowed to request various types of information about the suspects; after having received each new piece of information, subjects rated each suspect's probability of being the murderer. Presence and timing of suspect eliminations were varied in the first two experiments; the final experiment involved the varying of percentages of clues that referred to more than one suspect (for example, all of the female suspects). The noncomplementarity of opinion revisions remained a strong phenomenon in all conditions. Information-search data refuted the idea that subjects represented hypotheses as a Bayesian set; further study of the independent hypotheses theory and Shaferian belief functions as descriptive models is encouraged.
123 citations
Authors
Showing all 8936 results
Name | H-index | Papers | Citations |
---|---|---|---|
Chao Zhang | 127 | 3119 | 84711 |
E. Magnus Ohman | 124 | 622 | 68976 |
Staffan Kjelleberg | 114 | 425 | 44414 |
Kenneth L. Davis | 113 | 622 | 61120 |
David Wilson | 102 | 757 | 49388 |
Michael Bauer | 100 | 1052 | 56841 |
David A. B. Miller | 96 | 702 | 38717 |
Ashutosh Chilkoti | 95 | 414 | 32241 |
Chi-Wang Shu | 93 | 529 | 56205 |
Gang Li | 93 | 486 | 68181 |
Tiefu Zhao | 90 | 593 | 36856 |
Juan Carlos García-Pagán | 90 | 348 | 25573 |
Denise C. Park | 88 | 267 | 33158 |
Santosh Kumar | 80 | 1196 | 29391 |
Chen Chen | 76 | 853 | 24974 |