Search results for "communication technology"
showing 10 items of 360 documents
On the Problems of Symbol-Spaced Tapped-Delay-Line Models for WSSUS Channels
2007
Article from the journal: Wireless Communications and Mobile Computing The deposited fulltext is a preprint of the definitive article at Wiley Interscience http://dx.doi.org/10.1002/wcm.683 This paper analyzes the validity and statistical behavior of symbol-spaced tapped-delay-line (SSTDL) models for wide-sense stationary uncorrelated scattering (WSSUS) mobile radio channels. SSTDL models are obtained by sampling the channel impulse response (CIR) in delay domain at a rate equal to the reciprocal of the symbol duration. They were proposed more than four decades ago as canonical channel models for band-limited timevariant linear (TVL) systems, and are nowadays widely in use for assessing the…
A two-armed bandit collective for hierarchical examplar based mining of frequent itemsets with applications to intrusion detection
2014
Published version of a chapter in the book: Transactions on Computational Collective Intelligence XIV. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-662-44509-9_1 In this paper we address the above problem by posing frequent item-set mining as a collection of interrelated two-armed bandit problems. We seek to find itemsets that frequently appear as subsets in a stream of itemsets, with the frequency being constrained to support granularity requirements. Starting from a randomly or manually selected examplar itemset, a collective of Tsetlin automata based two-armed bandit players - one automaton for each item in the examplar - learns which items should be included in …
Deep Learning for Classifying Physical Activities from Accelerometer Data
2021
Physical inactivity increases the risk of many adverse health conditions, including the world’s major non-communicable diseases, such as coronary heart disease, type 2 diabetes, and breast and colon cancers, shortening life expectancy. There are minimal medical care and personal trainers’ methods to monitor a patient’s actual physical activity types. To improve activity monitoring, we propose an artificial-intelligence-based approach to classify the physical movement activity patterns. In more detail, we employ two deep learning (DL) methods, namely a deep feed-forward neural network (DNN) and a deep recurrent neural network (RNN) for this purpose. We evaluate the proposed models on two phy…
Managing information security risks during new technology adoption
2012
Author's version of an article in the journal: Computers and Security. Also available from the publisher at: http://dx.doi.org/10.1016/j.cose.2012.09.001 In the present study, we draw on previous system dynamics research on operational transition and change of vulnerability to investigate the role of incident response capability in controlling the severity of incidents during the adoption of new technology. Toward this end, we build a system dynamics model using the Norwegian Oil and Gas Industry as the context. The Norwegian Oil and Gas Industry has started to adopt new information communication technology to connect its offshore platforms, onshore control centers, and suppliers. In oil co…
Supporting fine-grained generative model-driven evolution
2010
Published version of an article in the journal: Software and Systems Modeling. Also available on SpringerLink:http://dx.doi.org/10.1007/s10270-009-0144-1 In the standard generative Model-driven Architecture (MDA), adapting the models of an existing system requires re-generation and restarting of that system. This is due to a strong separation between the modeling environment and the runtime environment. Certain current approaches remove this separation, allowing a system to be changed smoothly when the model changes. These approaches are, however, based on interpretation of modeling information rather than on generation, as in MDA. This paper describes an architecture that supports fine-gra…
Robust H∞ Filtering for a Class of Complex Networks with Stochastic Packet Dropouts and Time Delays
2013
Published version of an article in the journal: The Scientific World Journal. Also available from the publisher at: http://dx.doi.org/10.1155/2014/560234 Open Access The robust H∞ filtering problem is investigated for a class of complex network systems which has stochastic packet dropouts and time delays, combined with disturbance inputs. The packet dropout phenomenon occurs in a random way and the occurrence probability for each measurement output node is governed by an individual random variable. Besides, the time delay phenomenon is assumed to occur in a nonlinear vector-valued function. We aim to design a filter such that the estimation error converges to zero exponentially in the mean …
The “I” between G and C: E-Government intermediaries in developing countries
2011
Published version of an article from the journal: The Electronic Journal of Information Systems in Developing Countries. Also available from the publisher: http://www.ejisdc.org/Ojs2/index.php/ejisdc/article/viewFile/826/371 While there has been a rapid growth in e-Government initiatives in developing countries, whether it has led to providing effective government services to the citizens has remained a question of concern. Evidence suggests that this objective is far from being met. The main hurdle has been that an overwhelming part of the citizens in these countries do not have the capability to either access government information physically or to use it effectively even when they can ac…
Teaching computer language handling - From compiler theory to meta-modelling
2011
Published version of a chapter in the book: Generative and Transformational Techniques in Software Engineering III. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-18023-1_14 Most universities teach computer language handling by mainly focussing on compiler theory, although MDA (model-driven architecture) and meta-modelling are increasingly important in the software industry as well as in computer science. In this article, we investigate how traditional compiler theory compares to meta-modelling with regard to formally defining the different aspects of a language, and how we can expand the focus in computer language handling courses to also include meta-model-based…
Hvordan kan kvalitetsindikatorer benyttes og synliggjøres ved bruk av IT-løsning for å forbedre kvaliteten på overgangen fra spesialisthelsetjenesten…
2015
Masteroppgave helse- og sosialinformatikk- Universitetet i Agder, 2015 Introduksjon: Det er gjennomført en undersøkelse med tre måleinstrumenter (CTM-15, “Kommunens sjekkliste” og “PasOpp”) for å se på kvaliteten på overgangen ved utskrivelse fra spesialisthelsetjenesten til kommune og/eller hjemmet. Dette fordi kvalitet og pasientsikkerhet er truet for pasienter som gjennomgår overganger. Pasientene ble bedt om å oppgi hvordan de opplevde overgangen og hvor viktig de synes hvert enkelt måleparameterer. Det presenteres en kravspesifikasjon for IT-løsning for innsamling av pasienterfaringer og presentasjon av dataene. Metode: Tverrsnittsundersøkelse med kvantitativ spørreundersøkelse hvor ut…
Elektronisk "Legemidler i bruk" - et blikk inn i framtiden. Evaluering av pilotprosjektet "Legemidler i bruk" i "Reseptformidleren" inkludert elektro…
2015
Masteroppgave helse- og sosialinformatikk- Universitetet i Agder, 2015 Utvidelsen av elektronisk forskrivning øker raskt og nye eRx-løsninger innføres fortløpende i den norske primær helsetjenesten. Den aktuelle oppgaven hadde som målsetning å belyse hvordan legene ved kommunalhelsetjenesten vurderte LIB i RF, inkludert elektronisk multidose i e-resept. Det er en ny funksjonalitet i e-resept innført i regi av Helsedirektortoratets pilotprosjekt med samme tittel. Det var 58 leger som deltok i LIB i RF-pilotprosjektet fra fem kommuner. Pilotlegene ble invitert til å delta i en elektronisk survey. Spørreskjemaundersøkelsen inneholdt 42 spørsmål, operasjonalisert i forhold til DeLone & McLean I…