Search results for " Computer"
showing 10 items of 6910 documents
Scalable Hierarchical Clustering: Twister Tries with a Posteriori Trie Elimination
2015
Exact methods for Agglomerative Hierarchical Clustering (AHC) with average linkage do not scale well when the number of items to be clustered is large. The best known algorithms are characterized by quadratic complexity. This is a generally accepted fact and cannot be improved without using specifics of certain metric spaces. Twister tries is an algorithm that produces a dendrogram (i.e., Outcome of a hierarchical clustering) which resembles the one produced by AHC, while only needing linear space and time. However, twister tries are sensitive to rare, but still possible, hash evaluations. These might have a disastrous effect on the final outcome. We propose the use of a metaheuristic algor…
Context–content systems of random variables : The Contextuality-by-Default theory
2016
Abstract This paper provides a systematic yet accessible presentation of the Contextuality-by-Default theory. The consideration is confined to finite systems of categorical random variables, which allows us to focus on the basics of the theory without using full-scale measure-theoretic language. Contextuality-by-Default is a theory of random variables identified by their contents and their contexts, so that two variables have a joint distribution if and only if they share a context. Intuitively, the content of a random variable is the entity the random variable measures or responds to, while the context is formed by the conditions under which these measurements or responses are obtained. A …
Can back-projection fully resolve polarity indeterminacy of independent component analysis in study of event-related potential?
2011
a b s t r a c t In the study of event-related potentials (ERPs) using independent component analysis (ICA), it is a traditional way to project the extracted ERP component back to electrodes for correcting its scaling (magnitude and polarity) indeterminacy. However, ICA tends to be locally optimized in practice, and then, the back-projection of a component estimated by the ICA can possibly not fully correct its polarity at every electrode. We demonstrate this phenomenon from the view of the theoretical analysis and numerical simulations and suggest checking and modifying the abnormal polarity of the projected component in the electrode field before further analysis. Moreover, when several co…
CSI with games and an emphasis on TDD and unit testing
2012
The Reform of Vocational Education and Training in Finland: Insights from Twitter
2018
This paper aims to analyse and describe relationships and communication in Twitter in relation to vocational education and training reform in Finland. Data were collected during the early implementation phase of the reform from January 2018 to early June 2018. The data included 2400 tweets containing the hashtag #amisreformi (VET reform). Social network analysis was utilised to study the network and communities. The main themes of the tweets were analysed using thematic analysis, and automated sentiment analysis was used to examine the tones of the tweets and public opinion. The study showed that the official actors were central influencers in the network that lacked connectivity. Overall, …
Automatic dynamic texture segmentation using local descriptors and optical flow
2012
A dynamic texture (DT) is an extension of the texture to the temporal domain. How to segment a DT is a challenging problem. In this paper, we address the problem of segmenting a DT into disjoint regions. A DT might be different from its spatial mode (i.e., appearance) and/or temporal mode (i.e., motion field). To this end, we develop a framework based on the appearance and motion modes. For the appearance mode, we use a new local spatial texture descriptor to describe the spatial mode of the DT; for the motion mode, we use the optical flow and the local temporal texture descriptor to represent the temporal variations of the DT. In addition, for the optical flow, we use the histogram of orie…
An Approach for Network Outage Detection from Drive-Testing Databases
2012
A data-mining framework for analyzing a cellular network drive testing database is described in this paper. The presented method is designed to detect sleeping base stations, network outage, and change of the dominance areas in a cognitive and self-organizing manner. The essence of the method is to find similarities between periodical network measurements and previously known outage data. For this purpose, diffusion maps dimensionality reduction and nearest neighbor data classification methods are utilized. The method is cognitive because it requires training data for the outage detection. In addition, the method is autonomous because it uses minimization of drive testing (MDT) functionalit…
Fall Detection Using Location Sensors and Accelerometers
2015
The rapid aging of the world's population is driving the development of pervasive solutions for elder care. These solutions, which often involve fall detection with accelerometers, are accurate in laboratory conditions but can fail in some real-life situations. To overcome this, the authors present the Confidence system, which detects falls mainly with location sensors. A user wears one to four tags. By detecting tag locations with sensors, the system can recognize the user's activity, such as falling and then lying down afterward, as well as the context in terms of the location in the home. The authors used a scenario consisting of events difficult to recognize as falls or nonfalls to comp…
Elementary Math to Close the Digital Skills Gap
2018
All-encompassing digitalization and the digital skills gap pressure the current school system to change. Accordingly, to ’digi-jump’, the Finnish National Curriculum 2014 (FNC-2014) adds programming to K-12 math. However, we claim that the anticipated addition remains too vague and subtle. Instead, we should take into account education recommendations set by computer science organizations, such as ACM, and define clear learning targets for programming. Correspondingly, the whole math syllabus should be critically viewed in the light of these changes and the feedback collected from SW professionals and educators. These findings reveal an imbalance between supply and demand, i.e., what is ove…
Feature Extractors for Describing Vehicle Routing Problem Instances
2016
The vehicle routing problem comes in varied forms. In addition to usual variants with diverse constraints and specialized objectives, the problem instances themselves – even from a single shared source - can be distinctly different. Heuristic, metaheuristic, and hybrid algorithms that are typically used to solve these problems are sensitive to this variation and can exhibit erratic performance when applied on new, previously unseen instances. To mitigate this, and to improve their applicability, algorithm developers often choose to expose parameters that allow customization of the algorithm behavior. Unfortunately, finding a good set of values for these parameters can be a tedious task that…