Search results for "INFORMATION"
showing 10 items of 14916 documents
An Approach for Network Outage Detection from Drive-Testing Databases
2012
A data-mining framework for analyzing a cellular network drive testing database is described in this paper. The presented method is designed to detect sleeping base stations, network outage, and change of the dominance areas in a cognitive and self-organizing manner. The essence of the method is to find similarities between periodical network measurements and previously known outage data. For this purpose, diffusion maps dimensionality reduction and nearest neighbor data classification methods are utilized. The method is cognitive because it requires training data for the outage detection. In addition, the method is autonomous because it uses minimization of drive testing (MDT) functionalit…
Appraisal and Mental Contents in Human-Technology Interaction
2015
User experience has become a key concept in investigating human-technology interaction. Therefore it has become essential to consider how user experience can be explicated using psychological concepts. Emotion has been widely considered to be an important dimension of user experience, and one obvious link between modern psychology and the analysis of user experience assumes the analysis of emotion in interaction processes. In this paper, the focus is on the relationship between action types and elicited emotional patterns. In three experiments including N = 40 participants each, it is demonstrated that the types of emotions experienced when people evaluate and use technical artefacts differ…
Turing's error-revised
2016
Many important lines of argumentation have been presented during the last decades claiming that machines cannot think like people. Yet, it has been possible to construct devices and information systems, which replace people in tasks which have previously been occupied by people as the tasks require intelligence. The long and versatile discourse over, what machine intelligence is, suggests that there is something unclear in the foundations of the discourse itself. Therefore, we critically studied the foundations of used theory languages. By looking critically some of the main arguments of machine thinking, one can find unifying factors. Most of them are based on the fact that computers canno…
Context-aware data caching for 5G heterogeneous small cells networks
2016
In this work, we investigate the problem of context-aware data caching in the heterogeneous small cell networks (HSCNs) to provide satisfactory to the end-users in reducing the service latency. In particular, we explore the storage capability of base stations (BSs) in HSCNs and propose a data caching model consists of edge caching elements (CAEs), small cell base stations (SBSs), and macro cell BS (MBS). Then, we concentrate on how to efficiently match the data contents to the different cache entities in order to minimize the overall system service latency. We model it as a distributed college admission (CA) stable matching problem and tackle this issue by utilizing contextual information t…
Towards the cyber security paradigm of ehealth: Resilience and design aspects
2017
Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain…
Design science research genres : introduction to the special issue on exemplars and criteria for applicable design science research
2018
We propose the definition of genres in IS design science research (DSR). In recent years DSR has become a well-accepted research paradigm within IS; however, now the diversity of purpose, methodology, and mental models has increased to a point where reviewers and editors are unsure about which standards to apply to particular research submissions. For some researchers an artefact of value is a system or system component, while for others artefacts ought to be theories or theory components. Such differences are hard to reconcile and researchers often face criticism from diverse corners of the paradigm, where beliefs and standards are very different. We observed this diversity of views among …
Biased graph walks for RDF graph embeddings
2017
Knowledge Graphs have been recognized as a valuable source for background information in many data mining, information retrieval, natural language processing, and knowledge extraction tasks. However, obtaining a suitable feature vector representation from RDF graphs is a challenging task. In this paper, we extend the RDF2Vec approach, which leverages language modeling techniques for unsupervised feature extraction from sequences of entities. We generate sequences by exploiting local information from graph substructures, harvested by graph walks, and learn latent numerical representations of entities in RDF graphs. We extend the way we compute feature vector representations by comparing twel…
An intelligent learning support system
2017
Fast-growing technologies are shaping many aspects of societies. Educational systems, in general, are still rather traditional: learner applies for school or university, chooses the subject, takes the courses, and finally graduates. The problem is that labor markets are constantly changing and the needed professional skills might not match with the curriculum of the educational program. It might be that it is not even possible to learn a combination of desired skills within one educational organization. For example, there are only a few universities that can provide high-quality teaching in several different areas. Therefore, learners may have to study specific modules and units somewhere e…
Research literature clustering using diffusion maps
2013
We apply the knowledge discovery process to the mapping of current topics in a particular field of science. We are interested in how articles form clusters and what are the contents of the found clusters. A framework involving web scraping, keyword extraction, dimensionality reduction and clustering using the diffusion map algorithm is presented. We use publicly available information about articles in high-impact journals. The method should be of use to practitioners or scientists who want to overview recent research in a field of science. As a case study, we map the topics in data mining literature in the year 2011. peerReviewed
Semantic Portal as a Tool for Structural Reform of the Ukrainian Educational System
2014
Education is recognized as a fundamental enabler of human development. The adoption of information and communications technologies (ICTs) by education (especially in developing countries) contributes to educational system reforms, in addition to the traditional advantages, such as social openness and accessibility. Yet the academic community has not studied sufficiently the challenging context in which ICTs are used as instruments for the reform of inefficient, and sometimes even corrupted, educational systems rather than just as means for smarter classrooms, remote access, or content management. The object of this study is Ukrainian higher education (HE) and its quality assurance (QA) syst…