Search results for "420"

showing 10 items of 422 documents

A new paradigm for pattern classification: Nearest Border Techniques

2013

Published version of a chapter in the book: AI 2013: Advances in Artificial Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-03680-9_44 There are many paradigms for pattern classification. As opposed to these, this paper introduces a paradigm that has not been reported in the literature earlier, which we shall refer to as the Nearest Border (NB) paradigm. The philosophy for developing such a NB strategy is as follows: Given the training data set for each class, we shall first attempt to create borders for each individual class. After that, we advocate that testing is accomplished by assigning the test sample to the class whose border it lies closest to…

Class (set theory)Training setPattern ClassificationComputer sciencebusiness.industrySVMVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422Centroid02 engineering and technology01 natural sciencesVDP::Mathematics and natural science: 400::Mathematics: 410::Analysis: 411Support vector machine010104 statistics & probabilityExperimental testingOutlier0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligence0101 mathematics10. No inequalitySet (psychology)businessTest sampleBorder Identification
researchProduct

Education Students’ Use of Collaborative Writing Tools in Collectively Reflective Essay Papers

2014

Published version of an article in the journal: Journal of Information Technology Education: Research. Also available from the publisher at: http://www.jite.org/documents/Vol13/JITEv13ResearchP091-120Brodahl0463.pdf Open Access Google Docs and EtherPad are Web 2.0 tools providing opportunity for multiple users to work online on the same document consecutively or simultaneously. Over the last few years a number of research papers on the use of these collaborative tools in a teaching and learning environment have been published. This work builds on that of Brodahl, Hadjerrouit, and Hansen (2011) expanding its case study. The theoretical framework is the same as the one underlying Brodahl et a…

Collaborative writingGeneral Computer ScienceComputer scienceTeaching methodGoogle DocsTechnological literacyEducationVDP::Mathematics and natural science: 400::Information and communication science: 420collaborative writingPedagogyLearning theoryGeneralLiterature_REFERENCE(e.g.dictionariesencyclopediasglossaries)lcsh:LC8-6691Age differenceslcsh:Special aspects of educationlcsh:T58.5-58.64business.industrylcsh:Information technologycollaborative toolsEtherPadGoogle DriveUsabilityInformation technology educationWeb 2.0 technologiesComputingMethodologies_DOCUMENTANDTEXTPROCESSINGbusinessQualitative researchJournal of Information Technology Education: Research
researchProduct

Collaborative writing with web 2.0 technologies: education students' perceptions

2011

Published version of an article from the journal: Journal of Information Technology Education. Also available from the publisher: http://jite.org/documents/Vol10/JITEv10IIPp073-103Brodahl948.pdf Executive Summary Web 2.0 technologies are becoming popular in teaching and learning environments. Among them several online collaborative writing tools, like wikis and blogs, have been integrated into educational settings. Research has been carried out on a wide range of subjects related to wikis, while other, comparable tools like Google Docs and EtherPad remain largely unexplored in the literature. This work presents a case study investigating education students' perceptions of collaborative writ…

Collaborative writingHigher educationWeb 2.0lcsh:T55.4-60.8Computer sciencemedia_common.quotation_subjectLibrary sciencelcsh:Technologylcsh:Education (General)EducationVDP::Mathematics and natural science: 400::Information and communication science: 420PerceptionPedagogylcsh:Technology (General)Computer Science (miscellaneous)lcsh:Industrial engineering. Management engineeringStatistical analysisGeneralLiterature_REFERENCE(e.g.dictionariesencyclopediasglossaries)media_commonVDP::Social science: 200::Education: 280::Subject didactics: 283lcsh:T58.5-58.64business.industrylcsh:Tlcsh:Information technologyInformation technology educationComputingMethodologies_DOCUMENTANDTEXTPROCESSINGlcsh:T1-995Electronic publishingComputer-mediated communicationbusinesslcsh:Llcsh:L7-991lcsh:Education
researchProduct

Enhancing Attention’s Explanation Using Interpretable Tsetlin Machine

2022

Explainability is one of the key factors in Natural Language Processing (NLP) specially for legal documents, medical diagnosis, and clinical text. Attention mechanism has been a popular choice for such explainability recently by estimating the relative importance of input units. Recent research has revealed, however, that such processes tend to misidentify irrelevant input units when explaining them. This is due to the fact that language representation layers are initialized by pre-trained word embedding that is not context-dependent. Such a lack of context-dependent knowledge in the initial layer makes it difficult for the model to concentrate on the important aspects of input. Usually, th…

Computational MathematicsNumerical AnalysisComputational Theory and MathematicsNLP; interpretability; explainability; Tsetlin Machine; Bi-GRUs; attentionVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420Theoretical Computer Science
researchProduct

Doppler Shift Characterization of Wideband Mobile Radio Channels

2019

The prevailing approach for characterizing the Doppler shift (DS) of mobile radio channels assumes the transmission of an unmodulated carrier. This consideration is valid for the analysis of narrowband channels, but its pertinence is questionable in regards to the modeling of wideband channels. In this correspondence, we redefine the DS from a time-frequency analysis perspective that does not depend on the aforementioned assumption. We systematically demonstrate that the DS can be characterized by the instantaneous frequency of the channel transfer function. This generic definition makes evident a fundamental aspect of the DS that is seldom acknowledged, namely, the DS is a frequency-varyin…

Computer Networks and CommunicationsComputer sciencePerspective (graphical)Aerospace EngineeringPropagation delayInstantaneous phaseVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420symbols.namesakeNarrowbandTransmission (telecommunications)Automotive EngineeringsymbolsElectronic engineeringElectrical and Electronic EngineeringWidebandDoppler effectVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Communication channel
researchProduct

Classes of sum-of-cisoids processes and their statistics for the modeling and simulation of mobile fading channels

2013

Published version of an article in the journal: EURASIP Journal on Wireless Communications and Networking. Also available from the publisher at: http://dx.doi.org/10.1186/1687-1499-2013-125 Open access In this paper, we present a fundamental study on the stationarity and ergodicity of eight classes of sum-of-cisoids (SOC) processes for the modeling and simulation of frequency-nonselective mobile Rayleigh fading channels. The purpose of this study is to determine which classes of SOC models enable the design of channel simulators that accurately reproduce the channel’s statistical properties without demanding information on the time origin or the time-consuming computation of an ensemble ave…

Computer Networks and CommunicationsComputer scienceStochastic processAutocorrelationEnsemble averageErgodicityVDP::Technology: 500::Information and communication technology: 550Computer Science ApplicationsModeling and simulationVDP::Mathematics and natural science: 400::Information and communication science: 420Signal ProcessingStatisticsErgodic theoryFadingCommunication channelRayleigh fadingEURASIP Journal on Wireless Communications and Networking
researchProduct

Exploring Lightweight Deep Learning Solution for Malware Detection in IoT Constraint Environment

2022

The present era is facing the industrial revolution. Machine-to-Machine (M2M) communication paradigm is becoming prevalent. Resultantly, the computational capabilities are being embedded in everyday objects called things. When connected to the internet, these things create an Internet of Things (IoT). However, the things are resource-constrained devices that have limited computational power. The connectivity of the things with the internet raises the challenges of the security. The user sensitive information processed by the things is also susceptible to the trusability issues. Therefore, the proliferation of cybersecurity risks and malware threat increases the need for enhanced security in…

Computer Networks and CommunicationsHardware and ArchitectureControl and Systems EngineeringSignal ProcessingElectrical and Electronic EngineeringInternet of Things; deep learning; natural language processing; RNN; LSTM; malware detectionVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420Electronics; Volume 11; Issue 24; Pages: 4147
researchProduct

Seeking Information on Social Commerce: An Examination of the Impact of User- and Marketer-generated Content Through an Eye-tracking Study

2021

Following the growing popularity of social commerce sites, there is an increased interest in understanding how consumers decide what products to purchase based on the available information. Consumers nowadays are confronted with the task of assessing marketer-generated (MGC) as well as user-generated information (UGC) in a range of different forms to make informed purchase-related decisions. This study examines the information types and forms that influence consumers in their decision-making process on social commerce. Building on uses and gratifications and dual-process theories, we distinguish between marketer and user generated content, and differentiate formats into informational and no…

Computer Networks and CommunicationsProcess (engineering)User-generated contentCognitionVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420PopularityTheoretical Computer ScienceTask (project management)Selection (linguistics)Eye trackingNormativeMarketingPsychologyVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550SoftwareInformation SystemsInformation Systems Frontiers
researchProduct

Evaluation of Deep Learning and Conventional Approaches for Image Recaptured Detection in Multimedia Forensics

2022

Image recaptured from a high-resolution LED screen or a good quality printer is difficult to distinguish from its original counterpart. The forensic community paid less attention to this type of forgery than to other image alterations such as splicing, copy-move, removal, or image retouching. It is significant to develop secure and automatic techniques to distinguish real and recaptured images without prior knowledge. Image manipulation traces can be hidden using recaptured images. For this reason, being able to detect recapture images becomes a hot research topic for a forensic analyst. The attacker can recapture the manipulated images to fool image forensic system. As far as we know, ther…

Computer Networks and CommunicationsVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420Computer Science ApplicationsMobile Information Systems
researchProduct

Real-time people counting system using a single video camera

2008

This is the copy of journal's version originally published in Proc. SPIE 6811. Reprinted with permission of SPIE: http://spie.org/x10.xml?WT.svl=tn7 There is growing interest in video-based solutions for people monitoring and counting in business and security applications. Compared to classic sensor-based solutions the video-based ones allow for more versatile functionalities, improved performance with lower costs. In this paper, we propose a real-time system for people counting based on single low-end non-calibrated video camera. The two main challenges addressed in this paper are: robust estimation of the scene background and the number of real persons in merge-split scenarios. The latter…

Computer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONVideo cameraImage processingKalman filterThresholdinglaw.inventionAdaptive filterlawVideo trackingSegmentationComputer visionArtificial intelligencebusiness:Mathematics and natural science: 400::Information and communication science: 420::Simulation visualization signal processing image processing: 429 [VDP]Block-matching algorithm
researchProduct