Search results for " Network"

showing 10 items of 6428 documents

Evaluating the performance of artificial neural networks for the classification of freshwater benthic macroinvertebrates

2014

Abstract Macroinvertebrates form an important functional component of aquatic ecosystems. Their ability to indicate various types of anthropogenic stressors is widely recognized which has made them an integral component of freshwater biomonitoring. The use of macroinvertebrates in biomonitoring is dependent on manual taxa identification which is currently a time-consuming and cost-intensive process conducted by highly trained taxonomical experts. Automated taxa identification of macroinvertebrates is a relatively recent research development. Previous studies have displayed great potential for solutions to this demanding data mining application. In this research we have a collection of 1350 …

ta113Radial basis function networkEcologyArtificial neural networkComputer sciencebusiness.industryApplied MathematicsEcological Modelingta1172PerceptronMachine learningcomputer.software_genreBackpropagationComputer Science ApplicationsProbabilistic neural networkIdentification (information)Computational Theory and MathematicsModeling and SimulationMultilayer perceptronConjugate gradient methodta1181Artificial intelligencebusinesscomputerEcology Evolution Behavior and SystematicsEcological Informatics
researchProduct

Online activity traces around a "Boston bomber"

2013

This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.

ta113Social networkbusiness.industryInternet privacyTragedy (event)ComputingMilieux_LEGALASPECTSOFCOMPUTINGThe InternetSocial mediaSociologySuspectbusinessWeb crawlerDigital mediaProceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
researchProduct

Semi-automatic literature mapping of participatory design studies 2006--2016

2018

The paper presents a process of semi-automatic literature mapping of a comprehensive set of participatory design studies between 2006--2016. The data of 2939 abstracts were collected from 14 academic search engines and databases. With the presented method, we were able to identify six education-related clusters of PD articles. Furthermore, we point out that the identified clusters cover the majority of education-related words in the whole data. This is the first attempt to systematically map the participatory design literature. We argue that by continuing our work, we can help to perceive a coherent structure in the body of PD research.

ta113Structure (mathematical logic)Point (typography)Computer scienceProcess (engineering)tekstinlouhinta020206 networking & telecommunications02 engineering and technologyData scienceParticipatory design0202 electrical engineering electronic engineering information engineeringklusterianalyysi020201 artificial intelligence & image processingparticipatory designSemi automaticSet (psychology)Cluster analysisosallistava suunnittelusystematic literature mappingsystemaattiset kirjallisuuskatsauksetclusteringProceedings of the 15th Participatory Design Conference: Short Papers, Situated Actions, Workshops and Tutorial - Volume 2
researchProduct

Scalable Hierarchical Clustering: Twister Tries with a Posteriori Trie Elimination

2015

Exact methods for Agglomerative Hierarchical Clustering (AHC) with average linkage do not scale well when the number of items to be clustered is large. The best known algorithms are characterized by quadratic complexity. This is a generally accepted fact and cannot be improved without using specifics of certain metric spaces. Twister tries is an algorithm that produces a dendrogram (i.e., Outcome of a hierarchical clustering) which resembles the one produced by AHC, while only needing linear space and time. However, twister tries are sensitive to rare, but still possible, hash evaluations. These might have a disastrous effect on the final outcome. We propose the use of a metaheuristic algor…

ta113Theoretical computer scienceBrown clusteringComputer scienceCorrelation clusteringSingle-linkage clusteringHierarchical clusteringCURE data clustering algorithmhierrchial clusteringCanopy clustering algorithmHierarchical clustering of networksCluster analysisclustering2015 IEEE Symposium Series on Computational Intelligence
researchProduct

Convolutional neural networks in skin cancer detection using spatial and spectral domain

2019

Skin cancers are world wide deathly health problem, where significant life and cost savings could be achieved if detection of cancer can be done in early phase. Hypespectral imaging is prominent tool for non-invasive screening. In this study we compare how use of both spectral and spatial domain increase classification performance of convolutional neural networks. We compare five different neural network architectures for real patient data. Our models gain same or slightly better positive predictive value as clinicians. Towards more general and reliable model more data is needed and collection of training data should be systematic. peerReviewed

ta113Training setskin cancerArtificial neural networkComputer sciencebusiness.industryspektrikuvausHyperspectral imagingspectral imagingSpectral domainPattern recognitionneuroverkotmedicine.diseaseneural networksWorld wideConvolutional neural networkihosyöpämedicineArtificial intelligenceSkin cancerEarly phasebusinessta217
researchProduct

Online anomaly detection using dimensionality reduction techniques for HTTP log analysis

2015

Modern web services face an increasing number of new threats. Logs are collected from almost all web servers, and for this reason analyzing them is beneficial when trying to prevent intrusions. Intrusive behavior often differs from the normal web traffic. This paper proposes a framework to find abnormal behavior from these logs. We compare random projection, principal component analysis and diffusion map for anomaly detection. In addition, the framework has online capabilities. The first two methods have intuitive extensions while diffusion map uses the Nyström extension. This fast out-of-sample extension enables real-time analysis of web server traffic. The framework is demonstrated using …

ta113Web serverComputer Networks and Communicationsbusiness.industryComputer scienceRandom projectionDimensionality reductionRandom projectionPrincipal component analysisIntrusion detection systemAnomaly detectionMachine learningcomputer.software_genreCyber securityWeb trafficPrincipal component analysisDiffusion mapAnomaly detectionIntrusion detectionArtificial intelligenceData miningWeb servicebusinesskyberturvallisuuscomputer
researchProduct

On optimal relay placement for improved performance in non-coverage limited scenarios

2014

Low power nodes have been a hot topic in research, standardization, and industry communities, which is typically considered under an umbrella term called heterogeneous networking. In this paper we look at the problem of deploying optimally low power nodes in the context of relay networking, when an operator connects low power nodes (or small cells) via the wireless backhaul that uses the same spectrum and the same wireless access technology. We present an analytical model that can calculate optimal coordinates for low power nodes based on the input parameters, such as preferred number of nodes, their transmission power, parameters of the environment etc. The analytical calculations are comp…

ta113business.industryComputer sciencePreferred numberUmbrella termContext (language use)law.inventionPower (physics)Operator (computer programming)Transmission (telecommunications)RelaylawWirelessbusinessComputer network
researchProduct

An Approach for Network Outage Detection from Drive-Testing Databases

2012

A data-mining framework for analyzing a cellular network drive testing database is described in this paper. The presented method is designed to detect sleeping base stations, network outage, and change of the dominance areas in a cognitive and self-organizing manner. The essence of the method is to find similarities between periodical network measurements and previously known outage data. For this purpose, diffusion maps dimensionality reduction and nearest neighbor data classification methods are utilized. The method is cognitive because it requires training data for the outage detection. In addition, the method is autonomous because it uses minimization of drive testing (MDT) functionalit…

ta113cellular network drive testing databaseDowntimeArticle SubjectDatabaseComputer Networks and CommunicationsComputer scienceDimensionality reductionData classificationDiffusion mapcomputer.software_genrelcsh:QA75.5-76.95Base stationHandoverCellular networklcsh:Electronic computers. Computer scienceData miningtiedonlouhintacomputerInformation SystemsTest dataJournal of Computer Networks and Communications
researchProduct

Cognitive self-healing system for future mobile networks

2015

This paper introduces a framework and implementation of a cognitive self-healing system for fault detection and compensation in future mobile networks. Performance monitoring for failure identification is based on anomaly analysis, which is a combination of the nearest neighbor anomaly scoring and statistical profiling. Case-based reasoning algorithm is used for cognitive self-healing of the detected faulty cells. Validation environment is Long Term Evolution (LTE) mobile system simulated with Network Simulator 3 (ns-3) [1, 2]. Results demonstrate that cognitive approach is efficient for compensation of cell outages and is capable to improve network coverage. Anomaly analysis can be used fo…

ta113cognitionta213Performance managementComputer sciencebusiness.industryDistributed computingCognitiondata miningcomputer.software_genreAutomationanomaly detectionFault detection and isolation5G networksNetwork simulationcompensationcell outageRobustness (computer science)self-healingAnomaly detectionData miningbusinesscomputer5G2015 International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

Context-aware data caching for 5G heterogeneous small cells networks

2016

In this work, we investigate the problem of context-aware data caching in the heterogeneous small cell networks (HSCNs) to provide satisfactory to the end-users in reducing the service latency. In particular, we explore the storage capability of base stations (BSs) in HSCNs and propose a data caching model consists of edge caching elements (CAEs), small cell base stations (SBSs), and macro cell BS (MBS). Then, we concentrate on how to efficiently match the data contents to the different cache entities in order to minimize the overall system service latency. We model it as a distributed college admission (CA) stable matching problem and tackle this issue by utilizing contextual information t…

ta113context awareta213Computer sciencebusiness.industryQuality of servicematching05 social sciences050801 communication & media studies020206 networking & telecommunicationssmall cell networks02 engineering and technologycontent cachingSmart CacheBase station0508 media and communicationsServer0202 electrical engineering electronic engineering information engineeringLeverage (statistics)CacheSmall cellbusinessComputer network
researchProduct