Search results for "Analysis"

showing 10 items of 26772 documents

Functional inequalities for generalized inverse trigonometric and hyperbolic functions

2014

Various miscellaneous functional inequalities are deduced for the so-called generalized inverse trigonometric and hyperbolic functions. For instance, functional inequalities for sums, difference and quotient of generalized inverse trigonometric and hyperbolic functions are given, as well as some Gr\"unbaum inequalities with the aid of the classical Bernoulli inequality. Moreover, by means of certain already derived bounds, bilateral bounding inequalities are obtained for the generalized hypergeometric ${}_3F_2$ Clausen function.

ta113Pure mathematicsGeneralized inverseBernoulli's inequalityGeneralized inverse trigonometric functions; Generalized inverse hyperbolic functions; Functional inequalities; Generalized hypergeometric 3F2 functionApplied MathematicsHyperbolic functionMathematics::Classical Analysis and ODEsHypergeometric distributionClausen functionMathematics - Classical Analysis and ODEsBounding overwatchClassical Analysis and ODEs (math.CA)FOS: MathematicsTrigonometry33B99 26D15 33C20 33C99AnalysisQuotientMathematicsJournal of Mathematical Analysis and Applications
researchProduct

Utilizing online serious games to facilitate distributed requirements elicitation

2015

Online serious games are used to facilitate distributed requirements elicitation.Interactive games enhance collaboration and communication between project members.Serious games raise individuals' confidence to engage in requirements elicitation.Using serious games can improve both quality and quantity of software requirements.Serious games specially enhance the performance of less-experienced stakeholders. Requirements elicitation is one of the most important and challenging activities in software development projects. A variety of challenges related to requirements elicitation are reported in the literature, of which the lack of proper communication and knowledge transfer between software …

ta113Requirements managementBusiness requirementsRequirementEngineeringserious gamesKnowledge managementbusiness.industryrequirements elicitationSoftware developmentRequirements elicitationpelitEmpirical researchhyötypelitHardware and Architecturesoftware developmentohjelmistokehitysbusinessRequirements analysisKnowledge transferSoftwaregamesInformation SystemsJournal of Systems and Software
researchProduct

BioImageXD: an open, general-purpose and high-throughput image-processing platform

2012

BioImageXD puts open-source computer science tools for three-dimensional visualization and analysis into the hands of all researchers, through a user-friendly graphical interface tuned to the needs of biologists. BioImageXD has no restrictive licenses or undisclosed algorithms and enables publication of precise, reproducible and modifiable workflows. It allows simple construction of processing pipelines and should enable biologists to perform challenging analyses of complex processes. We demonstrate its performance in a study of integrin clustering in response to selected inhibitors.

ta113SIMPLE (military communications protocol)Computer sciencebusiness.industryta1182Computational BiologyImage processingCell BiologyBioinformaticsBiochemistryVisualizationHigh-Throughput Screening AssaysUser-Computer InterfaceSoftwareWorkflowImaging Three-DimensionalHuman–computer interactionbusinessCluster analysisMolecular BiologyThroughput (business)AlgorithmsSoftwareBiotechnologyGraphical user interfaceNATURE METHODS
researchProduct

An efficient cluster-based outdoor user positioning using LTE and WLAN signal strengths

2015

In this paper we propose a novel cluster-based RF fingerprinting method for outdoor user-equipment (UE) positioning using both LTE and WLAN signals. It uses a simple cost effective agglomerative hierarchical clustering with Davies-Bouldin criterion to select the optimal cluster number. The positioning method does not require training signature formation prior to UE position estimation phase. It is capable of reducing the search space for clustering operation by using LTE cell-ID searching criteria. This enables the method to estimate UE positioning in short time with less computational expense. To validate the cluster-based positioning real-time field measurements were collected using readi…

ta113SIMPLE (military communications protocol)business.industryComputer scienceReal-time computingLTE cell-IDFingerprint recognitionGridminimization of drive testsDetermining the number of clusters in a data setEmbedded systemgrid-based RF fingerprintingRadio frequencybusinessCluster analysishierarchical clustering
researchProduct

Software Renting in the Era of Cloud Computing

2012

In the new era of computing, software can be sold and delivered as a cloud service, and software renting has become as a strategic tool to compete in the market. Software renting has several advantages from the customer's point of view. However, for software providers it is challenging to ensure a profitable revenue stream when a license fee is replaced by a periodic rental fee. In this study, software renting was found to help the case firms to differentiate themselves from competitors; it also increased their competitive advantage by making the software available for a larger customer group. However, the negotiating power of larger customers impacted on software pricing, rental agreements…

ta113Software rentingcompetitive strategybusiness.industryComputer scienceSoftware as a servicecloud computingCloud computingCompetitor analysisRevenue streamCompetitive advantageSaaSRentingSoftwareRevenue modelbusinessLicenseIndustrial organization2012 IEEE Fifth International Conference on Cloud Computing
researchProduct

LOCAL CONTROL OF SOUND IN STOCHASTIC DOMAINS BASED ON FINITE ELEMENT MODELS

2011

A numerical method for optimizing the local control of sound in a stochastic domain is developed. A three-dimensional enclosed acoustic space, for example, a cabin with acoustic actuators in given locations is modeled using the finite element method in the frequency domain. The optimal local noise control signals minimizing the least square of the pressure field in the silent region are given by the solution of a quadratic optimization problem. The developed method computes a robust local noise control in the presence of randomly varying parameters such as variations in the acoustic space. Numerical examples consider the noise experienced by a vehicle driver with a varying posture. In a mod…

ta113Stochastic domainAcoustics and UltrasonicsComputer scienceApplied MathematicsAcousticsNoise reductionNumerical analysisstokastinen aluekvadraattinen optimointipassenger carFinite element methodhenkilöautoelementtimenetelmäAcoustic spacequadratic optimizationNoiseFrequency domainNoise controlHelmholtz equationQuadratic programmingpaikallinen äänenhallintaäärellisten elementtien menetelmäHelmholtzin yhtälölocal sound controlJournal of Computational Acoustics
researchProduct

Semi-automatic literature mapping of participatory design studies 2006--2016

2018

The paper presents a process of semi-automatic literature mapping of a comprehensive set of participatory design studies between 2006--2016. The data of 2939 abstracts were collected from 14 academic search engines and databases. With the presented method, we were able to identify six education-related clusters of PD articles. Furthermore, we point out that the identified clusters cover the majority of education-related words in the whole data. This is the first attempt to systematically map the participatory design literature. We argue that by continuing our work, we can help to perceive a coherent structure in the body of PD research.

ta113Structure (mathematical logic)Point (typography)Computer scienceProcess (engineering)tekstinlouhinta020206 networking & telecommunications02 engineering and technologyData scienceParticipatory design0202 electrical engineering electronic engineering information engineeringklusterianalyysi020201 artificial intelligence & image processingparticipatory designSemi automaticSet (psychology)Cluster analysisosallistava suunnittelusystematic literature mappingsystemaattiset kirjallisuuskatsauksetclusteringProceedings of the 15th Participatory Design Conference: Short Papers, Situated Actions, Workshops and Tutorial - Volume 2
researchProduct

Scalable Hierarchical Clustering: Twister Tries with a Posteriori Trie Elimination

2015

Exact methods for Agglomerative Hierarchical Clustering (AHC) with average linkage do not scale well when the number of items to be clustered is large. The best known algorithms are characterized by quadratic complexity. This is a generally accepted fact and cannot be improved without using specifics of certain metric spaces. Twister tries is an algorithm that produces a dendrogram (i.e., Outcome of a hierarchical clustering) which resembles the one produced by AHC, while only needing linear space and time. However, twister tries are sensitive to rare, but still possible, hash evaluations. These might have a disastrous effect on the final outcome. We propose the use of a metaheuristic algor…

ta113Theoretical computer scienceBrown clusteringComputer scienceCorrelation clusteringSingle-linkage clusteringHierarchical clusteringCURE data clustering algorithmhierrchial clusteringCanopy clustering algorithmHierarchical clustering of networksCluster analysisclustering2015 IEEE Symposium Series on Computational Intelligence
researchProduct

Can back-projection fully resolve polarity indeterminacy of independent component analysis in study of event-related potential?

2011

a b s t r a c t In the study of event-related potentials (ERPs) using independent component analysis (ICA), it is a traditional way to project the extracted ERP component back to electrodes for correcting its scaling (magnitude and polarity) indeterminacy. However, ICA tends to be locally optimized in practice, and then, the back-projection of a component estimated by the ICA can possibly not fully correct its polarity at every electrode. We demonstrate this phenomenon from the view of the theoretical analysis and numerical simulations and suggest checking and modifying the abnormal polarity of the projected component in the electrode field before further analysis. Moreover, when several co…

ta113Theoretical computer scienceComputer sciencePolarity (physics)Parallel projectionHealth InformaticsIndependent component analysisComponent (UML)Signal ProcessingPoint (geometry)Projection (set theory)Global optimizationScalingAlgorithmBiomedical Signal Processing and Control
researchProduct

Social Collaborative Viewpoint Regression with Explainable Recommendations

2017

A recommendation is called explainable if it not only predicts a numerical rating for an item, but also generates explanations for users' preferences. Most existing methods for explainable recommendation apply topic models to analyze user reviews to provide descriptions along with the recommendations they produce. So far, such methods have neglected user opinions and influences from social relations as a source of information for recommendations, even though these are known to improve the rating prediction. In this paper, we propose a latent variable model, called social collaborative viewpoint regression (sCVR), for predicting item ratings based on user opinions and social relations. To th…

ta113Topic modelInformation retrievalComputer sciencetopic modeling02 engineering and technologyRecommender systemtrusted social relationsViewpointsSocial relationRegression020204 information systemsBenchmark (surveying)0202 electrical engineering electronic engineering information engineeringuser comment analysis020201 artificial intelligence & image processingrecommender systemsTupleLatent variable modelProceedings of the Tenth ACM International Conference on Web Search and Data Mining
researchProduct