Search results for "Fusion"

showing 10 items of 4513 documents

A Hybrid Multigroup Coclustering Recommendation Framework Based on Information Fusion

2015

Collaborative Filtering (CF) is one of the most successful algorithms in recommender systems. However, it suffers from data sparsity and scalability problems. Although many clustering techniques have been incorporated to alleviate these two problems, most of them fail to achieve further significant improvement in recommendation accuracy. First of all, most of them assume each user or item belongs to a single cluster. Since usually users can hold multiple interests and items may belong to multiple categories, it is more reasonable to assume that users and items can join multiple clusters (groups), where each cluster is a subset of like-minded users and items they prefer. Furthermore, most of…

ta113Information retrievalComputer sciencebusiness.industrydata miningRecommender systemcomputer.software_genreTheoretical Computer ScienceInformation fusionKnowledge baseArtificial IntelligenceCollaborative FilteringScalabilityCluster (physics)Collaborative filteringLearning to rankData miningrecommender systemsCluster analysisbusinesscomputercluster analysisACM Transactions on Intelligent Systems and Technology
researchProduct

Linear fusion of interrupted reports in cooperative spectrum sensing for cognitive radio networks

2015

Interrupted reporting has recently been introduced as an effective method to increase the energy efficiency of cooperative spectrum sensing schemes in cognitive radio networks. In this paper, joint optimization of the reporting and fusion phases in a cooperative sensing with interrupted reporting is considered. This optimization aims at finding the best weights used at the fusion center to construct a linear fusion of the received interrupted reports, jointly with Bernoulli distributions governing the statistical behavior of the interruptions. The problem is formulated by using the deflection criterion and as a nonconvex quadratic program which is then solved for a suboptimal solution, in a…

ta113Mathematical optimizationFusionta213Artificial neural networkComputer sciencedecision fusioncooperative spectrum sensingBernoulli's principleCognitive radionon-ideal reporting channelscorrelationcognitive radio (CR)Quadratic programmingEfficient energy use2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
researchProduct

Reduced Order Models for Pricing European and American Options under Stochastic Volatility and Jump-Diffusion Models

2017

Abstract European options can be priced by solving parabolic partial(-integro) differential equations under stochastic volatility and jump-diffusion models like the Heston, Merton, and Bates models. American option prices can be obtained by solving linear complementary problems (LCPs) with the same operators. A finite difference discretization leads to a so-called full order model (FOM). Reduced order models (ROMs) are derived employing proper orthogonal decomposition (POD). The early exercise constraint of American options is enforced by a penalty on subset of grid points. The presented numerical experiments demonstrate that pricing with ROMs can be orders of magnitude faster within a give…

ta113Mathematical optimizationGeneral Computer ScienceStochastic volatilityDifferential equationEuropean optionMonte Carlo methods for option pricingJump diffusion010103 numerical & computational mathematics01 natural sciencesTheoretical Computer Science010101 applied mathematicsValuation of optionsModeling and Simulationlinear complementary problemRange (statistics)Asian optionreduced order modelFinite difference methods for option pricing0101 mathematicsAmerican optionoption pricingMathematicsJournal of Computational Science
researchProduct

Reduced Order Models for Pricing American Options under Stochastic Volatility and Jump-diffusion Models

2016

American options can be priced by solving linear complementary problems (LCPs) with parabolic partial(-integro) differential operators under stochastic volatility and jump-diffusion models like Heston, Merton, and Bates models. These operators are discretized using finite difference methods leading to a so-called full order model (FOM). Here reduced order models (ROMs) are derived employing proper orthogonal decomposition (POD) and non negative matrix factorization (NNMF) in order to make pricing much faster within a given model parameter variation range. The numerical experiments demonstrate orders of magnitude faster pricing with ROMs. peerReviewed

ta113Mathematical optimizationStochastic volatilityDiscretizationComputer scienceJump diffusionFinite difference method010103 numerical & computational mathematics01 natural sciencesNon-negative matrix factorization010101 applied mathematicsValuation of optionslinear complementary problemRange (statistics)General Earth and Planetary SciencesApplied mathematicsreduced order modelFinite difference methods for option pricing0101 mathematicsAmerican optionoption pricingGeneral Environmental ScienceProcedia Computer Science
researchProduct

IMEX schemes for pricing options under jump–diffusion models

2014

We propose families of IMEX time discretization schemes for the partial integro-differential equation derived for the pricing of options under a jump-diffusion process. The schemes include the families of IMEX-midpoint, IMEX-CNAB and IMEX-BDF2 schemes. Each family is defined by a convex combination parameter [email protected]?[0,1], which divides the zeroth-order term due to the jumps between the implicit and explicit parts in the time discretization. These IMEX schemes lead to tridiagonal systems, which can be solved extremely efficiently. The schemes are studied through Fourier stability analysis and numerical experiments. It is found that, under suitable assumptions and time step restric…

ta113Numerical AnalysisMathematical optimizationTridiagonal matrixDiscretizationApplied MathematicsJump diffusionStability (probability)Term (time)Computational MathematicsValuation of optionsConvex combinationLinear multistep methodMathematicsApplied Numerical Mathematics
researchProduct

Online anomaly detection using dimensionality reduction techniques for HTTP log analysis

2015

Modern web services face an increasing number of new threats. Logs are collected from almost all web servers, and for this reason analyzing them is beneficial when trying to prevent intrusions. Intrusive behavior often differs from the normal web traffic. This paper proposes a framework to find abnormal behavior from these logs. We compare random projection, principal component analysis and diffusion map for anomaly detection. In addition, the framework has online capabilities. The first two methods have intuitive extensions while diffusion map uses the Nyström extension. This fast out-of-sample extension enables real-time analysis of web server traffic. The framework is demonstrated using …

ta113Web serverComputer Networks and Communicationsbusiness.industryComputer scienceRandom projectionDimensionality reductionRandom projectionPrincipal component analysisIntrusion detection systemAnomaly detectionMachine learningcomputer.software_genreCyber securityWeb trafficPrincipal component analysisDiffusion mapAnomaly detectionIntrusion detectionArtificial intelligenceData miningWeb servicebusinesskyberturvallisuuscomputer
researchProduct

An Approach for Network Outage Detection from Drive-Testing Databases

2012

A data-mining framework for analyzing a cellular network drive testing database is described in this paper. The presented method is designed to detect sleeping base stations, network outage, and change of the dominance areas in a cognitive and self-organizing manner. The essence of the method is to find similarities between periodical network measurements and previously known outage data. For this purpose, diffusion maps dimensionality reduction and nearest neighbor data classification methods are utilized. The method is cognitive because it requires training data for the outage detection. In addition, the method is autonomous because it uses minimization of drive testing (MDT) functionalit…

ta113cellular network drive testing databaseDowntimeArticle SubjectDatabaseComputer Networks and CommunicationsComputer scienceDimensionality reductionData classificationDiffusion mapcomputer.software_genrelcsh:QA75.5-76.95Base stationHandoverCellular networklcsh:Electronic computers. Computer scienceData miningtiedonlouhintacomputerInformation SystemsTest dataJournal of Computer Networks and Communications
researchProduct

Research literature clustering using diffusion maps

2013

We apply the knowledge discovery process to the mapping of current topics in a particular field of science. We are interested in how articles form clusters and what are the contents of the found clusters. A framework involving web scraping, keyword extraction, dimensionality reduction and clustering using the diffusion map algorithm is presented. We use publicly available information about articles in high-impact journals. The method should be of use to practitioners or scientists who want to overview recent research in a field of science. As a case study, we map the topics in data mining literature in the year 2011. peerReviewed

ta113kirjallisuuskatsausklusterointiComputer scienceProcess (engineering)Dimensionality reductiondiffuusiokuvausta111Diffusion mapKeyword extractionliterature mappingdiffusion mapKnowledge discovery processLibrary and Information Sciencescomputer.software_genreData scienceField (geography)Computer Science ApplicationsKnowledge extractionTiedonhavaitsemisprosessitiedonlouhintaCluster analysiscomputerWeb scrapingclustering
researchProduct

Digital generations, but not as we know them

2019

The aim of this article is to see whether or not adolescents were the real leaders of the digital ‘revolution’ in the 1990s and whether they have sustained or even improved their position in the 2000s. The analysis is based on two surveys carried out in Italy, France, the United Kingdom, Germany, and Spain in 1996 ( N = 6609) and in 2009 ( N = 7255). The results show that the adolescents belonging to the first digital generation in 1996 were the most equipped with new technologies, although not the most intensive users. In 2009, the adolescents lost their position as the leading adopters and lagged behind youth and young adults regarding the use of new technologies and computer skills.

ta520young adultsEmerging technologies050801 communication & media studiesdigital native generation0508 media and communicationsdigital native generationsdigital technology diffusionnuoretArts and Humanities (miscellaneous)Computer literacydigital generationsdigital technology useadolescentsSociologydigital generationdigital technologiesta113nuoret aikuisetyouthCommunication05 social sciencesAdvertisingyouthsdigitaalitekniikkaadolescents youths young adults digital generations digital native generations digital technologies050903 gender studiesEU5nuoruusPosition (finance)digital technologydiginatiivit0509 other social sciencesConvergence: The International Journal of Research into New Media Technologies
researchProduct

Exploring User Acceptance of Free Wireless Fidelity Public Hot Spots : An Empirical Study

2008

Research regarding commercial and free wireless fidelity (Wi-Fi) public hot spots acceptance and adoption is sketchy. Therefore, it has become imperative to understand the critical factors that affect their acceptance. The focus of this study is free Wi-Fi public hot spot users, with the objective to better understand their user acceptance. In doing so, this study integrated two well-established initial acceptance models, specifically, the technology acceptance model and the diffusion of innovation theory. This study was conducted using an on-line survey that collected data from 129 users. It uses the Partial Least Square (PLS) technique to examine the relationship between variables. The re…

technology acceptance modelpartial least squarediffusion of innovationfree Wi-Fiwireless fidelitypublic hot spots
researchProduct