Search results for "computer"

showing 10 items of 30657 documents

E-NAUTILUS: A decision support system for complex multiobjective optimization problems based on the NAUTILUS method

2015

Interactive multiobjective optimization methods cannot necessarily be easily used when (industrial) multiobjective optimization problems are involved. There are at least two important factors to be considered with any interactive method: computationally expensive functions and aspects of human behavior. In this paper, we propose a method based on the existing NAUTILUS method and call it the Enhanced NAUTILUS (E-NAUTILUS) method. This method borrows the motivation of NAUTILUS along with the human aspects related to avoiding trading-off and anchoring bias and extends its applicability for computationally expensive multiobjective optimization problems. In the E-NAUTILUS method, a set of Pareto…

ta113Decision support systemMathematical optimizationInformation Systems and ManagementOptimization problemMultiple criteria optimizationGeneral Computer ScienceComputer sciencePareto principleTrading-offManagement Science and Operations ResearchSpace (commercial competition)Multiple objective programmingMulti-objective optimizationIndustrial and Manufacturing EngineeringSet (abstract data type)Modeling and SimulationPoint (geometry)Computational costInteractive methodsEuropean Journal of Operational Research
researchProduct

A novel heuristic memetic clustering algorithm

2013

In this paper we introduce a novel clustering algorithm based on the Memetic Algorithm meta-heuristic wherein clusters are iteratively evolved using a novel single operator employing a combination of heuristics. Several heuristics are described and employed for the three types of selections used in the operator. The algorithm was exhaustively tested on three benchmark problems and compared to a classical clustering algorithm (k-Medoids) using the same performance metrics. The results show that our clustering algorithm consistently provides better clustering solutions with less computational effort.

ta113Determining the number of clusters in a data setBiclusteringClustering high-dimensional dataDBSCANComputingMethodologies_PATTERNRECOGNITIONTheoretical computer scienceCURE data clustering algorithmCorrelation clusteringCanopy clustering algorithmCluster analysisAlgorithmMathematics2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP)
researchProduct

Gear classification and fault detection using a diffusion map framework

2015

This article proposes a system health monitoring approach that detects abnormal behavior of machines. Diffusion map is used to reduce the dimensionality of training data, which facilitates the classification of newly arriving measurements. The new measurements are handled with Nyström extension. The method is trained and tested with real gear monitoring data from several windmill parks. A machine health index is proposed, showing that data recordings can be classified as working or failing using dimensionality reduction and warning levels in the low dimensional space. The proposed approach can be used with any system that produces high-dimensional measurement data. peerReviewed

ta113Diffusion (acoustics)Training setta214Computer scienceDimensionality reductiondiffusion mapExtension (predicate logic)computer.software_genreFault detection and isolationfault detectionsystem health monitoringArtificial IntelligenceSignal ProcessingComputer Vision and Pattern RecognitionData miningCluster analysiscomputerSoftwareCurse of dimensionalityclustering
researchProduct

Two-phase routing in three-dimensional blocked optical tori

2014

The contribution of this paper is an all-optical 3D network architecture. We describe scheduled, two-phase routing for it. The three-dimensional blocked optical torus BOT of block size b consists of b2 × b2 × b2 nodes for the first phase routing. Processors are evenly deployed at the underlying torus so that every bth node consists of a processor. Additionally, a BOT consists of b3 blocks of b × b × b subnetworks for the second phase routing. Routing of each packet is done in two phases. Firstly, packets are routed from source processor to an intermediate target node at the target block. Secondly, packets are routed from the intermediate targets at the target block to the target processor (…

ta113Dynamic Source Routingta213Computer sciencebusiness.industryNetwork packetNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSLink-state routing protocolDestination-Sequenced Distance Vector routingRouting (electronic design automation)businessBlock sizeComputer networkBlock (data storage)Proceedings of the 15th International Conference on Computer Systems and Technologies
researchProduct

Interactive map interface for controlling bridge crane automation A cognitive-affective approach

2016

This study outlines the development process of a new touch screen based user interface for controlling bridge crane automation in industrial environments. A user study of existing situation (n1 = 11) was used to develop an understanding of the cognitive and emotional design goals for crane operation. Conceptualization of these goals in the context of automation produced a set of requirements, which were used to develop a map-based touch screen user interface. Two field tests (n2 = 5, n3 = 5) revealed how bridge crane operators cognise and emotionally experience the increasing automation and how the user interface should be designed to support the operator’s spatial mental representation as …

ta113EngineeringConceptualizationta213business.industrymedia_common.quotation_subjectCognitionemotional designMobile mapAutomationEmotional designUser interface designAutomationautomaatioFeelingHuman–computer interactionMental representationInterface designUser interfacebusinessCompetence (human resources)interface designmobile mapmedia_common
researchProduct

Replacing Project Managers in Information Technology Projects

2015

According to anecdotal evidence, project managers working on information technology (IT) projects are occasionally replaced, although the literature on information systems (IS) and project management (PM) makes little mention of it. With a view to narrowing this knowledge gap the authors examined the reasons behind the practice. The authors took an interpretive approach to the data gathering and analysis, and collected descriptions about replacing project managers (RPM) from interviews and questionnaires (n=43). The concept of contradiction served as a lens through which to identify the underlying reasons. Contradiction refers to statements asserting or expressing the opposite of another st…

ta113EngineeringKnowledge managementData collectionbusiness.industryIT project managementmedia_common.quotation_subjectContradictionsReplacementProject managerInformation technologyContext (language use)Public relationsTurnoverManagement of Technology and InnovationPhenomenonComputer Science (miscellaneous)Information systemContradictionProject managementbusinessta512Anecdotal evidencemedia_commonInternational Journal of Human Capital and Information Technology Professionals
researchProduct

Enhancing the experience of online users of open education

2014

The limited adoption of Open Educational Resources (OER) has kicked off the launch of several projects to search for possible solutions. One of these projects is “Open Educational Ideas and Innovations” (OEI2). The goal of this project is to find alternatives for increasing the uptake of OER and facilitating the collaborative development of OER. To enhance the experience of the users of open education, we interviewed twelve educators and researchers from different higher education institutions across Europe focusing on gathering insights about idea sharing experiences. In this paper, we present our key findings based on these interviews and outline some recommendations for our next open edu…

ta113EngineeringKnowledge managementHigher educationbusiness.industryInteraction Design FoundationOpen EducationFace (sociological concept)Context (language use)Open learningOpen educational resourcesCollaborationOpen educationOpen Educational ResourcesComputingMilieux_COMPUTERSANDEDUCATIONKey (cryptography)OERta516business
researchProduct

Towards a scenario of virtual mental health environments for school-aged children

2017

This study explores student teachers’ future design scenarios focusing on promoting children’s mental health literacy through virtual reality (VR) environments. VR use is on the verge of many breakthroughs in several areas of lived experience. One such area pertains to educational contexts. Student teachers were chosen as the subjects of this study due to the likelihood that they will be the primary users and disseminators of these emerging technologies in educational contexts. The students created five types of future scenarios that contained different environments and activity modes, including those that are still not yet feasible to realize with current technological capabilities. The ai…

ta113Engineeringbusiness.industryEmerging technologiesschool-aged childrenStudent teacherVirtual realityMental healthscenarioCurriculum frameworkmielenterveysPedagogyMathematics educationComputingMilieux_COMPUTERSANDEDUCATIONdigital literacySet (psychology)businessMental health literacystudent teachermental healthvirtual reality (VR)Digital literacy
researchProduct

Quantile index for gradual and abrupt change detection from CFB boiler sensor data in online settings

2012

In this paper we consider the problem of online detection of gradual and abrupt changes in sensor data having high levels of noise and outliers. We propose a simple heuristic method based on the Quantile Index (QI) and study how robust this method is for detecting both gradual and abrupt changes with such data. We evaluate the performance of our method on the artificially generated and real datasets that represent different operational settings of a pilot circulating fluidized bed (CFB) reactor and CFB cold model. Our experiments suggest that QI can be used for designing very simple yet effective methods for gradual change detection in the noisy sensor data. It can be also used for detectin…

ta113Engineeringbusiness.industryOutlierBoiler (power generation)Data miningbusinesscomputer.software_genrecomputerChange detectionQuantile
researchProduct

The Quest for Underpinning Theory of Enterprise Architecture - General Systems Theory

2017

Enterprise architecture originates from the 1980’s. It emerged among ICT practitioners to solve complex problems related to information systems. Currently EA is also utilised to solve business problems, although the focus is still in ICT and its alignment with business. EA can be defined as a description of the current and future states of the enterprise, and as a change between these states to meet stakeholder’s goals. Despite its popularity and 30 years of age, the literature review conducted on top information and management science journals revealed that EA is still lacking the sound theoretical foundation. In this conceptual paper, we propose General Systems Theory (GST) for underpinni…

ta113Enterprise architecture frameworkUnderpinningComputer science05 social sciencesEnterprise architecture02 engineering and technologygeneral systems theoryManagementEngineering managementSystems theoryEnterprise architecture management020204 information systemsenterprise architecture0502 economics and businessBusiness architecture0202 electrical engineering electronic engineering information engineeringkokonaisarkkitehtuuriView model050203 business & managementProceedings of the 19th International Conference on Enterprise Information Systems
researchProduct