Search results for "nlo"

showing 10 items of 285 documents

Eettiset ongelmat massadatan ja tiedonlouhinnan hyödyntämisessä

2016

Niin julkiset kuin yksityisetkin organisaatiot keräävät ja hyödyntävät yhä enemmän dataa osana toimintaansa. Big data eli massadata on keskeinen teknologia suurten datamäärien hallitsemiseksi. Massadataa analysoidaan puolestaan usein tiedonlouhinnan menetelmin. Molempien innovaatioiden suosio on kasvanut trendinomaisesti ja niiden käytön ennustetaan yleistyvän jatkossakin. Massadataa ja tiedonlouhintaa on hyödynnetty myös arveluttaviin tarkoituksiin. Julkisuudessa on ollut esillä tapauksia, joissa yritykset ovat kohdentaneet markkinointiaan selvittämällä arkaluonteista tietoa asiakkaistaan. Tämä yhdistettynä ajatukseen uusiin teknologioihin liittyvistä käytäntötyhjiöistä toimii motiivina ai…

big datatiedonlouhintaetiikka
researchProduct

Incentive Mechanism for Edge-Computing-Based Blockchain

2020

Blockchain has been gradually applied to different Internet of Things (IoT) platforms. As the efficiency of the blockchain mainly depends on the network computing capability, how to make sure the acquisition of the computational resources and participation of the devices would be the driving force. In this work, we focus on investigating incentive mechanism for rational miners to purchase the computational resources. A edge computing-based blockchain network is considered, where the edge service provider (ESP) can provide computational resources for the miners. Accordingly, we formulate a two-stage Stackelberg game between the miners and ESP. The aim is to investigate Stackelberg equilibriu…

blockchainBlockchainComputer scienceDistributed computingCloud computing02 engineering and technologymininglohkoketjutNash equilibriumcomputingoptimointiOrder (exchange)hash power0202 electrical engineering electronic engineering information engineeringStackelberg competitionpeliteoriaElectrical and Electronic EngineeringEdge computingrewardreportingbusiness.industry020208 electrical & electronic engineeringService provideroptimal incentiveComputer Science ApplicationsIncentiveControl and Systems EngineeringEnhanced Data Rates for GSM EvolutiontiedonlouhintabusinessInformation Systems
researchProduct

Declaration and Handling of Conflicts of Interest in Guidelines

2015

Clinical guidelines are developed in order to support physicians and patients in specific clinical situations when decisions concerning diagnosis and treatment are made. Recommendations provided in guidelines are based on the findings of clinical studies and on expert opinion. Identical study findings may be evaluated differently depending on whether or not guideline authors have conflicts of interest (1). A conflict of interest is defined as a circumstance that gives rise to a risk that professional judgement or actions concerning a primary interest may be inappropriately influenced by a secondary interest (2, 3). A conflict of interest is therefore a state of affairs, not a biased evaluat…

business.industryDownloadmedia_common.quotation_subjectDeclarationConflict of interestGeneral MedicineGuidelinePublic relationsSchool of thoughtScientific evidenceConvictionMedicinebusinessDutymedia_commonDeutsches Ärzteblatt international
researchProduct

Halogen bonding enhances nonlinear optical response in poled supramolecular polymers

2015

We demonstrate that halogen bonding strongly enhances the nonlinear optical response of poled supramolecular polymer systems. We compare three nonlinear optical chromophores with similar electronic structures but different bond-donating units, and show that both the type and the strength of the noncovalent interaction between the chromophores and the polymer matrix play their own distinctive roles in the optical nonlinearity of the systems. acceptedVersion Peer reviewed

chemistry.chemical_classificationPhysics::Biological PhysicsQuantitative Biology::BiomoleculesMaterials scienceHalogen bond116 Chemical sciencesGeneral ChemistryPolymerChromophorePolymers Supramolecular Chemistry Halogen Bonding Nonlinear Optical ResponseHalogen bonding; NLO; supramolecular polymers114 Physical sciencesSupramolecular polymersCondensed Matter::Soft Condensed MatterOptical nonlinearityNonlinear opticalchemistryChemical physicsPolymer chemistryMaterials ChemistrySettore CHIM/07 - Fondamenti Chimici Delle TecnologiePhysics::Chemical Physics
researchProduct

Semantic place recognition for context aware services

2012

Extracting the meaning of the most significant places, which are frequently visited by a mobile user, is a relevant problem in mobile computing. Predicting semantic meaning of such places is useful in many areas. The problem of place semantic annotation of a user location can be challenging for service providers. Awareness of user activities is very important for development of personalized applications, which can be used in health care systems, living systems, etc. Predicting location of mobile users not only enables development of high quality location-based services and applications, but also improves resource reservation in wireless networks. In this research several solutions for seman…

classificationsemantic place predictionlocation-based servicespaikkatiedotmobile computingdata mininglangaton tekniikkasemantic locationtiedonlouhintaluokitus
researchProduct

Incentive Mechanism for Edge Computing-Based Blockchain: A Sequential Game Approach

2022

The development of the blockchain framework is able to provide feasible solutions for a wide range of Industrial Internet of Things (IIoT) applications. While the IIoT devices are usually resource-limited, how to make sure the acquisition of computational resources and participation of the devices will be the driving force to realize blockchain. In this work, an edge computing-based blockchain framework is considered, where multiple edge service providers (ESPs) can provide computational resources to the IIoT devices. We focus on investigating the trading between the devices and ESPs, where ESPs are the sellers and devices are the buyers. A sequential game is formulated and by exploring the…

computational modelingblockchainsInternet of ThingsmininglohkoketjutComputer Science Applicationsedge computingreunalaskentaControl and Systems Engineeringtask analysispricinginformaticsincentive mechanismpeliteoriaesineiden internettiedonlouhintaElectrical and Electronic EngineeringgamesInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

Crystal structure of 4-{2-[4-(di­methyl­amino)­phen­yl]diazen-1-yl}-1-methyl­pyridinium iodide

2015

The molecular geometry of the ionic title compound, C14H17N4+·I−or DAZOP+·I−, is essentially featureless. Regarding the crystal structure, in addition to the obvious cation–anion Coulombic interactions, the packing is mostly directed by non-covalent interactions involving both ring systems, as well as the iodide anion. It consists of cationic molecules aligned along [101] and disposed in an antiparallel fashion while linked into π-bonded dimeric entities by a stacking contact involving symmetry-related phenyl rings, with a centroid–centroid distance of 3.468 (3) Å and a slippage of 0.951 Å. The dimers are, in addition, sustained by a number of C—H...I and I...π (I...centroid = 3.876 Å) inte…

crystal structureC—H⋯ π inter­actionsIodideStackingIonic bondingNanotechnologyCrystal structureRing (chemistry)NLOlcsh:Chemistrychemistry.chemical_compoundGeneral Materials SciencePi interactionI⋯π inter­action[DAZOP+][I−]chemistry.chemical_classificationdyeChemistryCrystal structureCationic polymerizationGeneral ChemistryCondensed Matter PhysicsC—H... π interactionsData ReportsI...π interactionCrystallographyπ–π inter­actionlcsh:QD1-999π–π interactionPyridinium
researchProduct

Dimensionality reduction framework for detecting anomalies from network logs

2012

Dynamic web services are vulnerable to multitude of intrusions that could be previously unknown. Server logs contain vast amounts of information about network traffic, and finding attacks from these logs improves the security of the services. In this research features are extracted from HTTP query parameters using 2-grams. We propose a framework that uses dimensionality reduction and clustering to identify anomalous behavior. The framework detects intrusions from log data gathered from a real network service. This approach is adaptive, works on the application layer and reduces the number of log lines that needs to be inspected. Furthermore, the traffic can be visualized. peerReviewed

diffuusiokarttakoneoppiminenintrusion detectiontunkeutumisen havaitseminendiffusion maptiedonlouhintan-grammitanomaly detectionn-gramspoikkeavuuden havaitseminen
researchProduct

Mining Maximal Frequent Patterns in Transactional Databases and Dynamic Data Streams: A Spark-based Approach

2018

Mining maximal frequent patterns (MFPs) in transactional databases (TDBs) and dynamic data streams (DDSs) is substantially important for business intelligence. MFPs, as the smallest set of patterns, help to reveal customers’ purchase rules and market basket analysis (MBA). Although, numerous studies have been carried out in this area, most of them extend the main-memory based Apriori or FP-growth algorithms. Therefore, these approaches are not only unscalable but also lack parallelism. Consequently, ever increasing big data sources requirements cannot be met. In addition, mining performance in some existing approaches degrade drastically due to the presence of null transactions. We, therefo…

dynamic data streamsprime number theorybig datatransactional databasesnull transactionsapache sparkmaximal frequent patternstiedonlouhinta
researchProduct

Anomaly-based online intrusion detection system as a sensor for cyber security situational awareness system

2016

Almost all the organisations and even individuals rely on complex structures of data networks and networked computer systems. That complex data ensemble, the cyber domain, provides great opportunities, but at the same time it offers many possible attack vectors that can be abused for cyber vandalism, cyber crime, cyber espionage or cyber terrorism. Those threats produce requirements for cyber security situational awareness and intrusion detection capability. This dissertation concentrates on research and development of anomaly-based network intrusion detection system as a sensor for a situational awareness system. In this dissertation, several models of intrusion detection systems are devel…

early warningpääsynvalvontatunkeilijan havaitsemisjärjestelmätcyber securityvalvontajärjestelmättilannekuvaanomaly detectionsituational awarenessinformation sharingnetwork securityintrusion detection systemklusterianalyysitiedonlouhintakyberturvallisuustietoverkotclustering
researchProduct