Search results for "processing."

showing 10 items of 8323 documents

Recommending Serendipitous Items using Transfer Learning

2018

Most recommender algorithms are designed to suggest relevant items, but suggesting these items does not always result in user satisfaction. Therefore, the efforts in recommender systems recently shifted towards serendipity, but generating serendipitous recommendations is difficult due to the lack of training data. To the best of our knowledge, there are many large datasets containing relevance scores (relevance oriented) and only one publicly available dataset containing a relatively small number of serendipity scores (serendipity oriented). This limits the learning capabilities of serendipity oriented algorithms. Therefore, in the absence of any known deep learning algorithms for recommend…

ta113recommender systemInformation retrievalTraining setArtificial neural networkComputer sciencebusiness.industrySerendipityDeep learningsuosittelujärjestelmätdeep learning020207 software engineeringserendipity02 engineering and technologyRecommender systemtransfer learningalgorithmskoneoppiminenalgoritmit0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRelevance (information retrieval)Artificial intelligenceTransfer of learningbusiness
researchProduct

Scalable implementation of dependence clustering in Apache Spark

2017

This article proposes a scalable version of the Dependence Clustering algorithm which belongs to the class of spectral clustering methods. The method is implemented in Apache Spark using GraphX API primitives. Moreover, a fast approximate diffusion procedure that enables algorithms of spectral clustering type in Spark environment is introduced. In addition, the proposed algorithm is benchmarked against Spectral clustering. Results of applying the method to real-life data allow concluding that the implementation scales well, yet demonstrating good performance for densely connected graphs. peerReviewed

ta113ta213Apache SparkComputer sciencedatasetsCorrelation clusteringdata miningcomputer.software_genrealgorithmsSpectral clusteringComputational sciencedependence clusteringData stream clusteringCURE data clustering algorithmScalabilitySpark (mathematics)algoritmitCanopy clustering algorithmData miningtiedonlouhintaCluster analysisclustering algorithmscomputerdata processingtietojenkäsittely
researchProduct

Are they different? affect, feeling, emotion, sentiment, and opinion detection in text

2014

A major limitation in the automatic detection of affect, feelings, emotions, sentiments, and opinions in text is the lack of proper differentiation between these subjective terms and understanding of how they relate to one another. This lack of differentiation not only leads to inconsistency in terminology usage but also makes the subtleties and nuances expressed by the five terms difficult to understand, resulting in subpar detection of the terms in text. In light of such limitation, this paper clarifies the differences between these five subjective terms and reveals significant concepts to the computational linguistics community for their effective detection and processing in text.

ta113ta520business.industrymedia_common.quotation_subjectAffect (psychology)Electronic mailTerminologyHuman-Computer InteractionText miningText processingFeelingCultural diversityComputational linguisticsPsychologybusinessSocial psychologySoftwaremedia_commonCognitive psychologyIEEE transactions on affective computing
researchProduct

Bilevel heat exchanger network synthesis with an interactive multi-objective optimization method

2012

Abstract Heat exchanger network synthesis (HENS) has been an active research area for more than 40 years because well-designed heat exchanger networks enable heat recovery in process industries in an energy- and cost-efficient manner. Due to ever increasing global competition and need to decrease the harmful effects done on the environment, there still is a continuous need to improve the heat exchanger networks and their synthesizing methods. In this work we present a HENS method that combines an interactive multi-objective optimization method with a simultaneous bilevel HENS method, where the bilevel part of the method is based on grouping of process streams and building aggregate streams …

ta212MINLPNUMBUSPareto optimalityEngineeringMathematical optimizationEngineering drawingta214business.industryta111Aggregate (data warehouse)Synheat modelProcess (computing)Energy Engineering and Power TechnologyWork in processMulti-objective optimizationIndustrial and Manufacturing EngineeringWeightingGrouping of processHeat recovery ventilationHeat exchangerbusinessta218Energy (signal processing)Applied Thermal Engineering
researchProduct

Towards proactive context-aware self-healing for 5G networks

2017

In this paper, we suggest a new research direction and a future vision for Self-Healing (SH) in Self-Organizing Networks (SONs). The problem we wish to solve is that traditional SH solutions may not be sufficient for the future needs of cellular network management because of their reactive nature, i.e., they start recovering after detecting already occurred faults instead of preparing for possible future faults in a pre-emptive manner. The detection delays are especially problematic with regard to the zero latency requirements of 5G networks. To address this problem, existing SONs need to be upgraded from reactive to proactive response. One of the dimensions in SH research is to employ more…

ta213Computer Networks and CommunicationsComputer science020206 networking & telecommunicationsSelf-organizing network02 engineering and technologyuser contextcontext aware systemComputer securitycomputer.software_genre5G networksSelf-healing0202 electrical engineering electronic engineering information engineeringCellular networkself-organizing networkself-healing020201 artificial intelligence & image processingcomputer5G
researchProduct

Design of a Cleaning Program for a PV Plant Based on Analysis of Energy Losses

2015

Solar photovoltaic (PV) energy has grown significantly over the past few years. However, despite the increase in installed capacity, this energy source still raises important concerns related to the variability of power production. The short-term effects such as cloud shadowing and supply interruptions, as well as long-term effects such as dust accumulation, seasonal variation, and ageing of PV modules, can cause variability of power production. Therefore, the analysis of all the variability sources in order to provide statistically consistent power production data is an important challenge. This study presents a methodology to analyze data from a PV plant in order to have an independent ev…

ta213digital signal processingta1172Photovoltaic systemEnvironmental engineeringSeasonalityCondensed Matter Physicsmedicine.diseaseElectronic Optical and Magnetic MaterialsPower (physics)Nameplate capacityenvironmental factorsphotovoltaic systemsmedicineGrid-connected photovoltaic power systemEnvironmental scienceProduction (economics)Electrical and Electronic EngineeringEnergy sourceta218Energy (signal processing)IEEE Journal of Photovoltaics
researchProduct

Tatouage des Images Médicales en Vue d'Intégrité et de Confidentialité des Données

2010

International audience; Dans l'objectif de contribuer à la sécurité de partage et de transfert des images médicales, nous présentons dans ce travail la méthode de tatouage multicouche. Cette dernière consiste à insérer dans l'image médicale les informations qui concernent la signature de centre hospitalier et les données du patient. Elle doit permettre d'assuré l'intégrité, la confidentialité des données lors de leur partage, et la robustesse aux différents types d'attaques (compression JPEG, Copier-coller, transformations géométriques, etc).

tatouage[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV]méthode multicouche[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][ INFO.INFO-TI ] Computer Science [cs]/Image Processingimages médicalesfonctions de hachage MD5télémédecine
researchProduct

Analysis of the perceived self-­‐efficacy in the use of ICT of pre-­‐ service primary and preschool teachers

2017

La formación del profesorado en el uso de las TIC es un aspecto importante para conseguir una verdadera integración de las TIC en la educación. Según el modelo TPACK, esta formación no debe limitarse a contemplar de manera separada los aspectos relacionados con las TIC, el contenido curricular y la metodología. En el presente estudio se explora la percepción de autoeficacia en cuanto al uso de las TIC en el aula de una muestra de 107 estudiantes de los grados de Maestro/a en Educación Infantil y en Educación Primaria. Para ello se emplea una traducción del cuestionario para la autoevaluación de las competencias TIC elaborado por Tondeur et al. (2016). Los resultados del estudio muestran que…

tecnología de la informaciónpercepción de sí mismoTPACK model02 engineering and technologylcsh:Education (General)Educationformación de profesoresModelo TPACKPedagogynuevas tecnologías0202 electrical engineering electronic engineering information engineeringAutoeficacia percibidaCurriculumTICPerceived self-­‐efficacyFormación del profesorado05 social sciences050301 education:3 - Ciencias sociales::37 - Educación. Enseñanza. Formación. Tiempo libre [CDU]Teacher trainingInformation and Communications TechnologyICT020201 artificial intelligence & image processinglcsh:L7-991Psychology0503 education
researchProduct

"Last Signification Bits" Method for Watermarking of Medical Image

2011

International audience; In this paper, we present a new approach for watermarking of medical image that we are trying to adapt to telemedicine. This approach is intended to insert a set of data in a medical image. These data should be imperceptible and robust to various attacks. It's containing the signature of the original image, the data specific to the patient and his diagnostic. The purpose of the watermarking method is to check the integrity and preservation of the confidentiality of patient data in a network sharing. This approach is based on the use the LSB (least significant bits) of the image and tools borrowed from cryptography.

telemedicine.[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV]LSBsMedical[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][ INFO.INFO-TI ] Computer Science [cs]/Image ProcessingtelemedicineWatermarkingConfidentiality
researchProduct

Indistinguishability of Elementary Systems as a Resource for Quantum Information Processing.

2017

Typical elements of quantum networks are made by identical systems, which are the basic particles constituting a resource for quantum information processing. Whether the indistinguishability due to particle identity is an exploitable quantum resource remains an open issue. Here we study independently prepared identical particles showing that, when they spatially overlap, an operational entanglement exists which can be made manifest by means of separated localized measurements. We prove this entanglement is physical in that it can be directly exploited to activate quantum information protocols, such as teleportation. These results establish that particle indistinguishability is a utilizable …

teleportationQuantum PhysicsQuantum networkComputer scienceIdentical particles: Quantum EntanglementFOS: Physical sciencesGeneral Physics and AstronomyQuantum entanglement01 natural sciencesTeleportationSettore FIS/03 - Fisica Della Materia010305 fluids & plasmas0103 physical sciencesQuantum information processingIdentity (object-oriented programming)ParticleStatistical physicsQuantum informationQuantum Physics (quant-ph)010306 general physicsQuantumIdentical particlesPhysical review letters
researchProduct