Search results for "Computer network"
showing 10 items of 1634 documents
Enabling openness of valuable information resources: Curbing data subtractability and exclusion
2019
In this paper we investigate how data openness can be made possible in communal settings. We adopt a utility perspective that foregrounds the use value of data, conceptualizing them as “goods.” On the basis of this conceptualization we explore 2 key goods' attributes: subtractability and exclusion. Our theoretical basis is built upon concepts from the theory of the commons, power theorizing, and notions related to data and information. Empirically, we investigate openness in the genetics domain through a longitudinal study of the evolving communal infrastructure for data related to 2 genes influencing women's susceptibility to breast and ovarian cancer (BRCA1 and BRCA2). We follow the conti…
HIPPIE v2.0: Enhancing meaningfulness and reliability of protein-protein interaction networks
2016
The increasing number of experimentally detected interactions between proteins makes it difficult for researchers to extract the interactions relevant for specific biological processes or diseases. This makes it necessary to accompany the large-scale detection of protein-protein interactions (PPIs) with strategies and tools to generate meaningful PPI subnetworks. To this end, we generated the Human Integrated Protein-Protein Interaction rEference or HIPPIE (http://cbdm.uni-mainz.de/hippie/). HIPPIE is a one-stop resource for the generation and interpretation of PPI networks relevant to a specific research question. We provide means to generate highly reliable, context-specific PPI networks …
Coupling News Sentiment with Web Browsing Data Improves Prediction of Intra-Day Price Dynamics
2015
The new digital revolution of big data is deeply changing our capability of understanding society and forecasting the outcome of many social and economic systems. Unfortunately, information can be very heterogeneous in the importance, relevance, and surprise it conveys, affecting severely the predictive power of semantic and statistical methods. Here we show that the aggregation of web users' behavior can be elicited to overcome this problem in a hard to predict complex system, namely the financial market. Specifically, our in-sample analysis shows that the combined use of sentiment analysis of news and browsing activity of users of Yahoo! Finance greatly helps forecasting intra-day and dai…
Demo
2017
We present an innovative smartphone-centric tracking system for indoor and outdoor environments, based on the joint utilization of dead-reckoning and computer vision (CV) techniques. The system is explicitly designed for visually impaired people (although it could be easily generalized to other users) and it is built under the assumption that special reference signals, such as painted lines, colored tapes or tactile pavings are deployed in the environment for guiding visually impaired users along pre-defined paths. Thanks to highly optimized software, we are able to execute the CV and sensor-fusion algorithms in run-time on low power hardware such as a normal smartphone, precisely tracking …
Clustering of low-correlated spatial gene expression patterns in the mouse brain in the Allen Brain Atlas
2018
In this paper, clustering techniques are applied to spatial gene expression patterns with a low genomic correlation between the sagittal and coronal projections. The data analysed here are hosted on an available public DB named ABA (Allen Brain Atlas). The results are compared to those obtained by Bohland et al. on the complementary dataset (high correlation values). We prove that, by analysing a reduced dataset,hence reducing the computational burden, we get the same accuracy in highlighting different neuroanatomical region.
Decentralised trust-management inspired by ant pheromones
2017
Computational trust is increasingly utilised to select interaction partners in open technical systems consisting of heterogeneous, autonomous agents. Current approaches rely on centralised elements for managing trust ratings (i.e. control and provide access to aggregated ratings). Consider a grid computing application as illustrating example: agents share their computing resources and cooperate in terms of processing computing jobs. These agents are free to join and leave, and they decide on their own with whom to interact. The impact of malicious or uncooperative agents can be countered by only cooperating with agents that have shown to be benevolent: trust relationships are established. T…
A solution of the minimum-time velocity planning problem based on lattice theory
2018
For a vehicle on an assigned path, we find the minimum-time speed law that satisfies kinematic and dynamic constraints, related to maximum speed and maximum tangential and transversal acceleration. We present a necessary and sufficient condition for the feasibility of the problem and a simple operator, based on the solution of two ordinary differential equations, which computes the optimal solution. Theoretically, we show that the problem feasible set, if not empty, is a lattice, whose supremum element corresponds to the optimal solution.
Investigating the moderating effect of information sources on cruise tourist behaviour in a port of call
2015
The aim of the study is to examine how destination knowledge acquired by cruisers through different information sources (online versus others) can moderate destination image formation and the relationship of image–satisfaction–behavioural intentions in a port of call. A multiple group analysis with partial least square method was carried out using data collected from a major tourism destination in Spain: Valencia. The findings revealed knowledge acquired through different information sources is a moderator of the image–satisfaction and satisfaction–behavioural intention relationships. The destination image formation is also significantly different from one group to the other. The findings o…
A Clustering approach for profiling LoRaWAN IoT devices
2019
Internet of Things (IoT) devices are starting to play a predominant role in our everyday life. Application systems like Amazon Echo and Google Home allow IoT devices to answer human requests, or trigger some alarms and perform suitable actions. In this scenario, any data information, related device and human interaction are stored in databases and can be used for future analysis and improve the system functionality. Also, IoT information related to the network level (wireless or wired) may be stored in databases and can be processed to improve the technology operation and to detect network anomalies. Acquired data can be also used for profiling operation, in order to group devices according…
Drone arc routing problems
2018
[EN] In this article, we present some drone arc routing problems (Drone ARPs) and study their relation with well-known postman ARPs. Applications for Drone ARPs include traffic monitoring by flying over roadways, infrastructure inspection such as by flying along power transmission lines, pipelines or fences, and surveillance along linear features such as coastlines or territorial borders. Unlike the postmen in traditional ARPs, drones can travel directly between any two points in the plane without following the edges of the network. As a consequence, a drone route may service only part of an edge, with multiple routes being used to cover the entire edge. Thus the Drone ARPs are continuous o…