Search results for "User"
showing 10 items of 1060 documents
Data mining framework for random access failure detection in LTE networks
2014
Sleeping cell problem is a particular type of cell degradation. There are various software and hardware reasons that might cause such kind of cell outage. In this study a cell becomes sleeping because of Random Access Channel (RACH) failure. This kind of network problem can appear due to misconfiguration, excessive load or software/firmware problem at the Base Station (BS). In practice such failure might cause network performance degradation, which is hardly traceable by an operator. In this paper we present a data mining based framework for the detection of problematic cells. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving BS. The choice of N i…
Towards proactive context-aware self-healing for 5G networks
2017
In this paper, we suggest a new research direction and a future vision for Self-Healing (SH) in Self-Organizing Networks (SONs). The problem we wish to solve is that traditional SH solutions may not be sufficient for the future needs of cellular network management because of their reactive nature, i.e., they start recovering after detecting already occurred faults instead of preparing for possible future faults in a pre-emptive manner. The detection delays are especially problematic with regard to the zero latency requirements of 5G networks. To address this problem, existing SONs need to be upgraded from reactive to proactive response. One of the dimensions in SH research is to employ more…
End-users Co-create Shared Information for a More Complete Real-time Maritime Picture
2017
European Union Member States are working towards an integrated maritime surveillance and deeper information sharing and implementation of Common Information Sharing Environment. Value networks aiming at co-creation, need active facilitation, and relevant platforms for open cooperation. This study analysed scenario analytics, and narrative documents from projects CoopP, CISE, and MARISA by using a Data Extraction Table to classify both objects and phenomenon relevant to European maritime information sharing systems. The object and phenomenon rows are grouped under a European Coast Guard Functions, CGFs framework, to better understand their occurrence and interdependencies. This paper finds t…
Evaluer un dispositif de formation à distance : Principes et retour d'expérience
2008
The multiplication of distance learning platforms and the complexity of some of those used within the university system raise questions. First of all, the stabilization of writing practices of digital documents. Secondly, the evaluation of these devices. We want to address this last point in this article. What is it possible to assess in this field? There are many dimensions of evaluation, depending on the angle chosen. We limit ourselves to an approach focused on evaluating the human-computer interface. The chosen testing ground is a website for law studies, developed by the University of Burgundy's further education section.
Children's involvement in the design of game-based learning environments
2008
Osallistuminen teknologian suunnitteluun tarjoaa lapsille arvokkaita kokemuksia. Tilaisuus päästä ottamaan osaa todellisen sovelluksen kehittämiseen kiinnostaa ja motivoi lapsia sekä toimii myös monenlaisten taitojen oppimistilanteena, Tuula Nousiainen kertoo. Lasten osallistuminen osoittautui tärkeäksi myös kehittäjille, jotka paitsi saivat lapsilta runsaasti ideoita, myös kokivat lasten kanssa toimimisen motivoineen työskentelyään.Nousiainen tutki kahta oppimispelisovelluksen suunnitteluprojektia, jotka toteutettiin yhdessä koululuokkien kanssa. Tavoitteena oli tutkia ja kehittää toimintatapoja lapsilähtöiseen teknologian suunnitteluun. Tutkimuksessa muodostettiin monitieteinen lapsilähtö…
User expectations, use experiences and continued adoption of a mobile secure communication application
2018
The importance of secure communication between employees in enterprises and governmental organizations as well as technologies to support that has increased tremendously over the past years. This study examines the user expectations before and the use experiences during the implementation phase of a mobile secure communication application together with expectation–confirmation and its influence on continued adoption. The study is explorative in nature and empirically based on thematic analysis of qualitative data collected from pilot users of a mobile secure communication application who work in a governmental organization in Finland. The theoretical basis of the study draws from two well-e…
The effect of a failure and submaximal blood flow restriction resistance exercise protocol on changes in muscle size, strength and swelling
2016
Masteroppgave i idrettsvitenskap - Universitetet i Agder 2016 Introduction: Blood flow restricted resistance exercise (BFRRE) can induce rapid increases in muscle size, strength and swelling. No previous research has investigated the importance of conducting BFRRE to voluntary failure and few studies has been carried out to investigate associations between swelling and muscle size. Therefore, the aim of the present study was twofold (1) compare changes in muscle size and strength between a failure (FA) and submaximal (SU) BFRRE protocol (2) investigate associations between swelling and muscle size. Methods: Seventeen untrained men had their legs randomized to FA and SU protocols. The interv…
Valoración de las necesidades de información de los médicos: publicaciones en el periodo 1990-1998 y estudio de un caso
2000
Los estudios de necesidades de información aportan una metodología con lo cual investigar, de manera sistemática, las características de los usuarios con relación a la información que necesitan para el desarrollo de su trabajo. Igualmente proporcionan criterios objetivos para tomar decisiones a la hora de planificar nuevos sistemas de información o adecuar los ya existentes. Esta tesis ha profundizado en los estudios de necesidades de información en el entorno hospitalario desde dos puntos de vista. Por una parte, se ha establecido un marco teórico de referencia que guíe las investigaciones en este campo. Para ello se ha buscado exhaustivamente la información publicada sobre la materia apor…
Application of the Information Bottleneck method to discover user profiles in a Web store
2018
The paper deals with the problem of discovering groups of Web users with similar behavioral patterns on an e-commerce site. We introduce a novel approach to the unsupervised classification of user sessions, based on session attributes related to the user click-stream behavior, to gain insight into characteristics of various user profiles. The approach uses the agglomerative Information Bottleneck (IB) algorithm. Based on log data for a real online store, efficiency of the approach in terms of its ability to differentiate between buying and non-buying sessions was validated, indicating some possible practical applications of the our method. Experiments performed for a number of session sampl…
Unges egne erfaringer med frafall fra videregående opplæring : en kvalitativ intervjustudie med ungdom i frafallsforebyggende tiltak
2016
Masteroppgave psykisk helsearbeid - Universitetet i Agder 2016 Konfidensiell til / confidential until 01.01.2022