Search results for "hinta"
showing 10 items of 114 documents
Kansainvälisten koulutusarvioiden vertailu koulutuksellisen tiedonlouhinnan keinoin
2016
Koulutusta ja eri ikäisten lasten akateemista suorituskykyä mittaavat tutkimustulokset ovat kiinnostavaa tarkasteltavaa monien alojen työntekijöille ja tutkijoille. Nykyään monet organisaatiot, kuten OECD (Organisation for Economic Co-operation and Development) ja IEA (International Association for the Evaluation of Educational Achievement), järjestävät tietyin aikavälein kansainvälisiä mittauksia, joissa mitataan tietyn ikäisten lasten akateemisia kykyjä ja kysellään heidän elämästään koulussa ja kotona. Näistä mittauksista syntyvät tietokannat ovat suuria ja ne tarjoavat monipuolista tietoa koulutuksesta ja lasten oppimiseen vaikuttavista tekijöistä. Kaiken tämän lisäksi, nämä tietokannat…
Dependence between renewable energy related critical metal futures and producer equity markets across varying market conditions
2022
We study the dependence of renewable energy production-related critical metal futures and producer equity returns, compared to the non-renewable energy (oil and natural gas) and some other globally relevant commodity markets. We find different asymmetric and symmetric dependencies in these commodity markets. The dependence is asymmetric in the most important critical metal markets, i.e., of silver, copper, and platinum. Still, surprisingly, for example, in the oil market, the relationship is symmetric, and no relationship is found in the natural gas market. Furthermore, the oil and agricultural markets have homogenous dependence structures in most market conditions, so the information trans…
Semantic annotation and big data techniques for patent information processing
2017
This thesis analyzes approaches to generate semantic annotations on patent records, as well as on other structured data, by relying on the structure and semantic representation of documents. Information in patent records reflects how real-world technologies evolve, and the approximately 3 million annual new patent applications capture the global inventive frontier. The volume of this information is too big to be effectively analyzed purely with human effort, necessitating Big data approaches to analyze it with computer aided tools and techniques. Big data is a term that describes a massive volume of structured, semi structured and unstructured data that is so large to the point that it is d…
Transición en el cine juvenil japonés 1956-1960: del fenómeno taiyozoku a la nueva ola.
2009
El presente trabajo pretende abordar el tema de la constitución de la nueva ola japonesa, en una de sus primeras variantes temático-formales: la de “juventud y ruptura generacional” en el periodo de transición de 1956 a 1960. En estos años ocurren una serie de fenómenos cinematográficos y extra-cinematográficos que serán la causa de la ruptura con el periodo de los humanistas anterior, dando origen a un nuevo paradigma, la nueva ola o nuberu bagu japonesa. Un nuevo cine que a lo largo de las décadas de los sesenta y setenta se irá desarrollando en múltiples dimensiones. De este periodo de transición (entre 1956 a 1960) hemos seleccionado para el análisis tres películas en las que se materia…
Susumu Hani (1950-1960): la aportación teórico-práctica al documental y al cine juvenil japonés. Una aproximación al caso de Hani como precursor de l…
2015
RESUMEN La tesis reúne por primera vez una antología del director japonés Susumu Hani. En ella, se saca a la luz diecisiete de sus documentales realizados en los estudios Iwanami Eiga entre 1950 y 1960 para cine y televisión, en su mayoría desconocidos en Occidente. El análisis de estas obras se acompaña con las lecturas de los ensayos originales escritos por Hani, que se ponen en el contexto de las discusiones teóricas que tuvieron lugar en el Japón de la época. La PARTE 1 trata de la aportación teórico-práctica de Hani al cine de no ficción. El Apartado 1.1 es un recorrido por los debates en los que participó respecto al documental de vanguardia, el realismo (recuperando el enfrentamiento…
Anomaly Detection from Network Logs Using Diffusion Maps
2011
The goal of this study is to detect anomalous queries from network logs using a dimensionality reduction framework. The fequencies of 2-grams in queries are extracted to a feature matrix. Dimensionality reduction is done by applying diffusion maps. The method is adaptive and thus does not need training before analysis. We tested the method with data that includes normal and intrusive traffic to a web server. This approach finds all intrusions in the dataset. peerReviewed
Mining road traffic accidents
2009
Explaining information technology users’ ways of mitigating technostress
2017
Technostress refers to the inability of an individual to deal with information technology (IT) in a healthy manner. Researchers, practitioners, and medical professionals have emphasized the omnipresence of technostress and its severe outcomes, including poor well-being and burnout. Despite the importance of the phenomenon, prior research has paid limited attention to how technostress can be mitigated. The few existing studies examine organizational mitigation mechanisms, but we could not find any studies that focus on individual IT users’ own ways of mitigating technostress outside of work. To address the research gap, we conducted a qualitative study to uncover users’ ways of mitigating te…
The Effect of Textual Producer-Generated Descriptions on Demand of Mobile Applications
2017
We analyze the impact of different app description characteristics on app demand on the basis of panel data for six months and 1081 distinct apps. We use several text mining techniques in order to operationalize the descriptions’ textual characteristics. The extracted variables are then used in an econometric investigation to examine their impact on apps’ downloads. Our results provide evidence that app descriptions have an effect on demand. Apps with upfront price should be described in a neutral tone. Apps without an upfront price but with in-app purchase option should be offered with rather short descriptions that are written in a formal and subjective style. peerReviewed
Data Mining for the Security of Cyber Physical Systems Using Deep-Learning Methods
2022
Cyber Physical Systems (CPSs) have become widely popular in recent years, and their applicability have been growing exponentially. A CPS is an advanced system that incorporates a computation unit along with a hardware unit, allowing for computing processes to interact with the physical world. However, this increased usage has also led to the security concerns in them, as they allow potential attack vendors to exploit the possibilities of committing misconduct for their own benefit. It is of paramount importance that these systems have comprehensive security mechanisms to mitigate these security threats. A typical attack vector for a CPS is malicious data supplied by compromised sensors that…