Search results for " Computer"

showing 10 items of 6910 documents

Scalable Hierarchical Clustering: Twister Tries with a Posteriori Trie Elimination

2015

Exact methods for Agglomerative Hierarchical Clustering (AHC) with average linkage do not scale well when the number of items to be clustered is large. The best known algorithms are characterized by quadratic complexity. This is a generally accepted fact and cannot be improved without using specifics of certain metric spaces. Twister tries is an algorithm that produces a dendrogram (i.e., Outcome of a hierarchical clustering) which resembles the one produced by AHC, while only needing linear space and time. However, twister tries are sensitive to rare, but still possible, hash evaluations. These might have a disastrous effect on the final outcome. We propose the use of a metaheuristic algor…

ta113Theoretical computer scienceBrown clusteringComputer scienceCorrelation clusteringSingle-linkage clusteringHierarchical clusteringCURE data clustering algorithmhierrchial clusteringCanopy clustering algorithmHierarchical clustering of networksCluster analysisclustering2015 IEEE Symposium Series on Computational Intelligence
researchProduct

Context–content systems of random variables : The Contextuality-by-Default theory

2016

Abstract This paper provides a systematic yet accessible presentation of the Contextuality-by-Default theory. The consideration is confined to finite systems of categorical random variables, which allows us to focus on the basics of the theory without using full-scale measure-theoretic language. Contextuality-by-Default is a theory of random variables identified by their contents and their contexts, so that two variables have a joint distribution if and only if they share a context. Intuitively, the content of a random variable is the entity the random variable measures or responds to, while the context is formed by the conditions under which these measurements or responses are obtained. A …

ta113Theoretical computer scienceComputer scienceApplied Mathematicscouplings05 social sciencesta111Probabilistic logicContext (language use)01 natural sciencesMeasure (mathematics)050105 experimental psychologyconnectednessKochen–Specker theoremrandom variablesJoint probability distribution0103 physical sciences0501 psychology and cognitive sciencescontextualityNegative number010306 general physicsCategorical variableRandom variableGeneral PsychologyJournal of Mathematical Psychology
researchProduct

Can back-projection fully resolve polarity indeterminacy of independent component analysis in study of event-related potential?

2011

a b s t r a c t In the study of event-related potentials (ERPs) using independent component analysis (ICA), it is a traditional way to project the extracted ERP component back to electrodes for correcting its scaling (magnitude and polarity) indeterminacy. However, ICA tends to be locally optimized in practice, and then, the back-projection of a component estimated by the ICA can possibly not fully correct its polarity at every electrode. We demonstrate this phenomenon from the view of the theoretical analysis and numerical simulations and suggest checking and modifying the abnormal polarity of the projected component in the electrode field before further analysis. Moreover, when several co…

ta113Theoretical computer scienceComputer sciencePolarity (physics)Parallel projectionHealth InformaticsIndependent component analysisComponent (UML)Signal ProcessingPoint (geometry)Projection (set theory)Global optimizationScalingAlgorithmBiomedical Signal Processing and Control
researchProduct

CSI with games and an emphasis on TDD and unit testing

2012

ta113Unit testingGeneral Computer ScienceGame programmingbusiness.industryComputer scienceEmphasis (telecommunications)ta516TelecommunicationsbusinessIndustrial engineeringEducationACM Inroads
researchProduct

The Reform of Vocational Education and Training in Finland: Insights from Twitter

2018

This paper aims to analyse and describe relationships and communication in Twitter in relation to vocational education and training reform in Finland. Data were collected during the early implementation phase of the reform from January 2018 to early June 2018. The data included 2400 tweets containing the hashtag #amisreformi (VET reform). Social network analysis was utilised to study the network and communities. The main themes of the tweets were analysed using thematic analysis, and automated sentiment analysis was used to examine the tones of the tweets and public opinion. The study showed that the official actors were central influencers in the network that lacked connectivity. Overall, …

ta113ammatillinen koulutussocial mediaTwittervocational educationsosiaalinen mediayleinen mielipide113 Computer and information sciencesammattikoulutuspublic opinionuudistukset516 Educational sciencesreform
researchProduct

Automatic dynamic texture segmentation using local descriptors and optical flow

2012

A dynamic texture (DT) is an extension of the texture to the temporal domain. How to segment a DT is a challenging problem. In this paper, we address the problem of segmenting a DT into disjoint regions. A DT might be different from its spatial mode (i.e., appearance) and/or temporal mode (i.e., motion field). To this end, we develop a framework based on the appearance and motion modes. For the appearance mode, we use a new local spatial texture descriptor to describe the spatial mode of the DT; for the motion mode, we use the optical flow and the local temporal texture descriptor to represent the temporal variations of the DT. In addition, for the optical flow, we use the histogram of orie…

ta113business.industrySegmentation-based object categorizationComputer scienceTexture DescriptorComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONOptical flowScale-space segmentationPattern recognitionImage segmentationComputer Graphics and Computer-Aided DesignImage textureMotion fieldRegion growingComputer Science::Computer Vision and Pattern RecognitionHistogramComputer visionSegmentationArtificial intelligencebusinessSoftwareIEEE Transactions on Image Processing
researchProduct

An Approach for Network Outage Detection from Drive-Testing Databases

2012

A data-mining framework for analyzing a cellular network drive testing database is described in this paper. The presented method is designed to detect sleeping base stations, network outage, and change of the dominance areas in a cognitive and self-organizing manner. The essence of the method is to find similarities between periodical network measurements and previously known outage data. For this purpose, diffusion maps dimensionality reduction and nearest neighbor data classification methods are utilized. The method is cognitive because it requires training data for the outage detection. In addition, the method is autonomous because it uses minimization of drive testing (MDT) functionalit…

ta113cellular network drive testing databaseDowntimeArticle SubjectDatabaseComputer Networks and CommunicationsComputer scienceDimensionality reductionData classificationDiffusion mapcomputer.software_genrelcsh:QA75.5-76.95Base stationHandoverCellular networklcsh:Electronic computers. Computer scienceData miningtiedonlouhintacomputerInformation SystemsTest dataJournal of Computer Networks and Communications
researchProduct

Fall Detection Using Location Sensors and Accelerometers

2015

The rapid aging of the world's population is driving the development of pervasive solutions for elder care. These solutions, which often involve fall detection with accelerometers, are accurate in laboratory conditions but can fail in some real-life situations. To overcome this, the authors present the Confidence system, which detects falls mainly with location sensors. A user wears one to four tags. By detecting tag locations with sensors, the system can recognize the user's activity, such as falling and then lying down afterward, as well as the context in terms of the location in the home. The authors used a scenario consisting of events difficult to recognize as falls or nonfalls to comp…

ta113education.field_of_studyContext modelUbiquitous computingaccelerometersaccuracyComputer sciencePopulationReal-time computingagingWearable computerContext (language use)ta3141accelerationAccelerometersensorsComputer Science ApplicationscontextComputational Theory and MathematicsFalling (sensation)educationLyingSoftwareSimulationsenior citizensIEEE Pervasive Computing
researchProduct

Elementary Math to Close the Digital Skills Gap

2018

All-encompassing digitalization and the digital skills gap pressure the current school system to change. Accordingly, to ’digi-jump’, the Finnish National Curriculum 2014 (FNC-2014) adds programming to K-12 math. However, we claim that the anticipated addition remains too vague and subtle. Instead, we should take into account education recommendations set by computer science organizations, such as ACM, and define clear learning targets for programming. Correspondingly, the whole math syllabus should be critically viewed in the light of these changes and the feedback collected from SW professionals and educators. These findings reveal an imbalance between supply and demand, i.e., what is ove…

ta113effectiveness of educationmatematiikkaComputer sciencetaidotDigital skillsdigital skills gaptietotekniikkaElementary mathematicscontinuous vs. discrete mathcomputing in math syllabusprofessional development of software professionalsMathematics educationammattitaitoK-12 computer science education
researchProduct

Feature Extractors for Describing Vehicle Routing Problem Instances

2016

The vehicle routing problem comes in varied forms. In addition to usual variants with diverse constraints and specialized objectives, the problem instances themselves – even from a single shared source - can be distinctly different. Heuristic, metaheuristic, and hybrid algorithms that are typically used to solve these problems are sensitive to this variation and can exhibit erratic performance when applied on new, previously unseen instances. To mitigate this, and to improve their applicability, algorithm developers often choose to expose parameters that allow customization of the algorithm behavior. Unfortunately, finding a good set of values for these parameters can be a tedious task that…

ta113metaheuristics000 Computer science knowledge general worksfeature extractionComputer Sciencevehicle routing problemautomatic algorithm configurationunsupervised learning
researchProduct