Search results for "Computer technology"

showing 10 items of 40 documents

EMI shielding effects of carbon nanotube cellulose nanocomposite

2010

Electromagnetic interference shielding is an important aspect of modern communication and computer technology. Carbon nanotube cellulose nanocomposite (CNTCNC) provides a novel material as an alternative to traditional metal-based shields for EMI shielding. Stratified structures containing CNTCNC layers combined with existing commercial lossy materials (like ferrite sheets) form effective EMI shields without lowering the signal integrity performance. Significant improvement in shielding effectiveness in stacked CNTCNC layers is noteworthy. CNTCNC is essentially like paper when it comes to flexibility and hence it can be easily conformed to the mechanical structure of the device in need of s…

Materials scienceNanocompositelawEMIElectromagnetic shieldingShieldsFerrite (magnet)Carbon nanotubeComposite materialElectromagnetic interferenceComputer technologylaw.invention2010 IEEE International Symposium on Electromagnetic Compatibility
researchProduct

The Dreaming Variational Autoencoder for Reinforcement Learning Environments

2018

Reinforcement learning has shown great potential in generalizing over raw sensory data using only a single neural network for value optimization. There are several challenges in the current state-of-the-art reinforcement learning algorithms that prevent them from converging towards the global optima. It is likely that the solution to these problems lies in short- and long-term planning, exploration and memory management for reinforcement learning algorithms. Games are often used to benchmark reinforcement learning algorithms as they provide a flexible, reproducible, and easy to control environment. Regardless, few games feature a state-space where results in exploration, memory, and plannin…

FOS: Computer and information sciencesMaskinlæringComputer Science - Machine LearningVDP::Computer technology: 551Artificial Intelligence (cs.AI)VDP::Datateknologi: 551Computer Science - Artificial IntelligenceMachine learningDeep learningMachine Learning (cs.LG)
researchProduct

Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks

2010

Published version of an article from the journal : Science in China, Series F: Information Sciences. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11432-010-0096-7 In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical or digest data (e.g., average temperature in a day), instead of real-time data, are of interest. The data are not instantly forwarded to a central sink upon sensing, thereby saving communication energy for transmission. Such a paradigm can also improve data survivability by m…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551General Computer Sciencebusiness.industryComputer scienceSecret sharingData integrityComputer data storageDistributed data storeDependabilityVerifiable secret sharingbusinessWireless sensor networkByzantine fault toleranceComputer networkScience China Information Sciences
researchProduct

Hvordan realisere effekter fra velferdsteknologi : erfaringer fra tre caser i norske kommuner

2014

Masteroppgave informasjonssystemer- Universitetet i Agder, 2014 Velferdsteknologi har blitt en viktig del for å løse utfordringene i helse- og omsorgssektoren. Dette er teknologi som bidrar til en tryggere og sikrere hverdag for eldre og andre med behov for tilrettelegging, uavhengig av bosted. Det kan være forskjellige teknologier, fra trygghetsalarm som den mest brukte løsningen i dag til moderne smarthusteknologier. Smarthusteknologi innebærer flere ulike velferdsteknologier og sensorer tilknyttet et system. Det er fortsatt mye usikkerhet knyttet til hvilke effekter som oppstår som følge av velferdsteknologi. Derfor er det vanskelig å måle og hente ut effekter, og det er et behov for å f…

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551IS 501
researchProduct

A two-armed bandit collective for hierarchical examplar based mining of frequent itemsets with applications to intrusion detection

2014

Published version of a chapter in the book: Transactions on Computational Collective Intelligence XIV. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-662-44509-9_1 In this paper we address the above problem by posing frequent item-set mining as a collection of interrelated two-armed bandit problems. We seek to find itemsets that frequently appear as subsets in a stream of itemsets, with the frequency being constrained to support granularity requirements. Starting from a randomly or manually selected examplar itemset, a collective of Tsetlin automata based two-armed bandit players - one automaton for each item in the examplar - learns which items should be included in …

Finite-state machineVDP::Technology: 500::Information and communication technology: 550::Computer technology: 551Computational complexity theoryData stream miningComputer scienceNearest neighbor searchSearch engine indexingInformationSystems_DATABASEMANAGEMENTIntrusion detection systemcomputer.software_genreCardinalityAnomaly detectionData miningcomputer
researchProduct

A two-armed bandit collective for examplar based mining of frequent itemsets with applications to intrusion detection

2011

Chapter from the book: Computational Collective Intelligence. Technologies and Applications. Also available from the publisher at SpringerLink: http://dx.doi.org/10.1007/978-3-642-23935-9_7 Over the last decades, frequent itemset mining has become a major area of research, with applications including indexing and similarity search, as well as mining of data streams, web, and software bugs. Although several efficient techniques for generating frequent itemsets with a minimum support (frequency) have been proposed, the number of itemsets produced is in many cases too large for effective usage in real-life applications. Indeed, the problem of deriving frequent itemsets that are both compact an…

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551VDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422InformationSystems_DATABASEMANAGEMENT
researchProduct

ERP-implementering: Shakedown-fasen : "hvilke faktorer ansees som viktige i shakedown-fasen ved implementering av ERP i norske virksomheter?"

2012

Masteroppgave i informasjonssystemer- Universitetet i Agder, 2012 Innføring av ES-systemer er et hett tema og å fokusere på hva som er viktig ved en slik implementasjon blir nødvendig. Min utredning fokuserer på Markus & Tanis (2000) sin shakedown-fase og viktigheten av de forskjellige faktorene i Norge. Det finnes forskjell på viktigheten mellom suksessfaktorene i shakedown-fasen i Norge. Mer spesifikt ble suksessfaktorene «Opplæring», «Endringsledelse», «Tilstrekkelig med ressurser», «Datapålitelighet» og «Støtte i toppledelsen» viktigere enn de andre. Dette passer godt med at litteraturgjennomgangen min fremviser disse som de fem som nevnes mest hyppig. Funnene mine tyder også på at bedr…

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551IS 501
researchProduct

Alliance success : a review of the literature with implications for researchand practice in SMEs

2010

Masteroppgave i informasjonssystemer- Universitetet i Agder 2010 The original idea of this thesis was to get an overview of the literature on alliance success and then add experiences SMEs on issues identified in the literature review. Unfortunately the organization pulled out in the last second making it impossible to add empirical findings from SMEs. Still, the literature review is important and revealed interesting findings that is ready to be tested empirically with new empirical data. The literature has analyzed articles from various researchers with different perspectives within different research streams, but with a focus on alliance success. It has been reported by several researche…

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551IS 501
researchProduct

Maritime data integration using standard ISO 15926

2010

Paper presented at the Twentieth (2010) International Offshore and Polar Engineering Conference. Also available on the Conference site: http://www.isope.org/publications/proceedings/ISOPE/ISOPE%202010/data/toc.htm The Oil & Gas industry is moving forward with Integrated Operations (IO). This includes a strong focus on data integration issues. There are different ways to achieve data integration, and ontology-based approaches have drawn much attention. For maritime data integration, the international standard ISO 15926 has been developed to integrate and represent the information in and across process plants. In this article, we follow the ontology-based approach and use the ISO 15926 standa…

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551
researchProduct

A two-armed bandit based scheme for accelerated decentralized learning

2011

Published version of a chapter from the book: Modern Approaches in Applied Intelligence. Also available at SpringerLink: http://dx.doi.org/10.1007/978-3-642-21827-9_54 The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, QoS control, game playing, and resource allocation, can be solved in a …

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551
researchProduct