Search results for "Computer technology"
showing 10 items of 40 documents
EMI shielding effects of carbon nanotube cellulose nanocomposite
2010
Electromagnetic interference shielding is an important aspect of modern communication and computer technology. Carbon nanotube cellulose nanocomposite (CNTCNC) provides a novel material as an alternative to traditional metal-based shields for EMI shielding. Stratified structures containing CNTCNC layers combined with existing commercial lossy materials (like ferrite sheets) form effective EMI shields without lowering the signal integrity performance. Significant improvement in shielding effectiveness in stacked CNTCNC layers is noteworthy. CNTCNC is essentially like paper when it comes to flexibility and hence it can be easily conformed to the mechanical structure of the device in need of s…
The Dreaming Variational Autoencoder for Reinforcement Learning Environments
2018
Reinforcement learning has shown great potential in generalizing over raw sensory data using only a single neural network for value optimization. There are several challenges in the current state-of-the-art reinforcement learning algorithms that prevent them from converging towards the global optima. It is likely that the solution to these problems lies in short- and long-term planning, exploration and memory management for reinforcement learning algorithms. Games are often used to benchmark reinforcement learning algorithms as they provide a flexible, reproducible, and easy to control environment. Regardless, few games feature a state-space where results in exploration, memory, and plannin…
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks
2010
Published version of an article from the journal : Science in China, Series F: Information Sciences. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11432-010-0096-7 In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical or digest data (e.g., average temperature in a day), instead of real-time data, are of interest. The data are not instantly forwarded to a central sink upon sensing, thereby saving communication energy for transmission. Such a paradigm can also improve data survivability by m…
Hvordan realisere effekter fra velferdsteknologi : erfaringer fra tre caser i norske kommuner
2014
Masteroppgave informasjonssystemer- Universitetet i Agder, 2014 Velferdsteknologi har blitt en viktig del for å løse utfordringene i helse- og omsorgssektoren. Dette er teknologi som bidrar til en tryggere og sikrere hverdag for eldre og andre med behov for tilrettelegging, uavhengig av bosted. Det kan være forskjellige teknologier, fra trygghetsalarm som den mest brukte løsningen i dag til moderne smarthusteknologier. Smarthusteknologi innebærer flere ulike velferdsteknologier og sensorer tilknyttet et system. Det er fortsatt mye usikkerhet knyttet til hvilke effekter som oppstår som følge av velferdsteknologi. Derfor er det vanskelig å måle og hente ut effekter, og det er et behov for å f…
A two-armed bandit collective for hierarchical examplar based mining of frequent itemsets with applications to intrusion detection
2014
Published version of a chapter in the book: Transactions on Computational Collective Intelligence XIV. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-662-44509-9_1 In this paper we address the above problem by posing frequent item-set mining as a collection of interrelated two-armed bandit problems. We seek to find itemsets that frequently appear as subsets in a stream of itemsets, with the frequency being constrained to support granularity requirements. Starting from a randomly or manually selected examplar itemset, a collective of Tsetlin automata based two-armed bandit players - one automaton for each item in the examplar - learns which items should be included in …
A two-armed bandit collective for examplar based mining of frequent itemsets with applications to intrusion detection
2011
Chapter from the book: Computational Collective Intelligence. Technologies and Applications. Also available from the publisher at SpringerLink: http://dx.doi.org/10.1007/978-3-642-23935-9_7 Over the last decades, frequent itemset mining has become a major area of research, with applications including indexing and similarity search, as well as mining of data streams, web, and software bugs. Although several efficient techniques for generating frequent itemsets with a minimum support (frequency) have been proposed, the number of itemsets produced is in many cases too large for effective usage in real-life applications. Indeed, the problem of deriving frequent itemsets that are both compact an…
ERP-implementering: Shakedown-fasen : "hvilke faktorer ansees som viktige i shakedown-fasen ved implementering av ERP i norske virksomheter?"
2012
Masteroppgave i informasjonssystemer- Universitetet i Agder, 2012 Innføring av ES-systemer er et hett tema og å fokusere på hva som er viktig ved en slik implementasjon blir nødvendig. Min utredning fokuserer på Markus & Tanis (2000) sin shakedown-fase og viktigheten av de forskjellige faktorene i Norge. Det finnes forskjell på viktigheten mellom suksessfaktorene i shakedown-fasen i Norge. Mer spesifikt ble suksessfaktorene «Opplæring», «Endringsledelse», «Tilstrekkelig med ressurser», «Datapålitelighet» og «Støtte i toppledelsen» viktigere enn de andre. Dette passer godt med at litteraturgjennomgangen min fremviser disse som de fem som nevnes mest hyppig. Funnene mine tyder også på at bedr…
Alliance success : a review of the literature with implications for researchand practice in SMEs
2010
Masteroppgave i informasjonssystemer- Universitetet i Agder 2010 The original idea of this thesis was to get an overview of the literature on alliance success and then add experiences SMEs on issues identified in the literature review. Unfortunately the organization pulled out in the last second making it impossible to add empirical findings from SMEs. Still, the literature review is important and revealed interesting findings that is ready to be tested empirically with new empirical data. The literature has analyzed articles from various researchers with different perspectives within different research streams, but with a focus on alliance success. It has been reported by several researche…
Maritime data integration using standard ISO 15926
2010
Paper presented at the Twentieth (2010) International Offshore and Polar Engineering Conference. Also available on the Conference site: http://www.isope.org/publications/proceedings/ISOPE/ISOPE%202010/data/toc.htm The Oil & Gas industry is moving forward with Integrated Operations (IO). This includes a strong focus on data integration issues. There are different ways to achieve data integration, and ontology-based approaches have drawn much attention. For maritime data integration, the international standard ISO 15926 has been developed to integrate and represent the information in and across process plants. In this article, we follow the ontology-based approach and use the ISO 15926 standa…
A two-armed bandit based scheme for accelerated decentralized learning
2011
Published version of a chapter from the book: Modern Approaches in Applied Intelligence. Also available at SpringerLink: http://dx.doi.org/10.1007/978-3-642-21827-9_54 The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, QoS control, game playing, and resource allocation, can be solved in a …