Search results for "ta113"

showing 10 items of 530 documents

An efficient cluster-based outdoor user positioning using LTE and WLAN signal strengths

2015

In this paper we propose a novel cluster-based RF fingerprinting method for outdoor user-equipment (UE) positioning using both LTE and WLAN signals. It uses a simple cost effective agglomerative hierarchical clustering with Davies-Bouldin criterion to select the optimal cluster number. The positioning method does not require training signature formation prior to UE position estimation phase. It is capable of reducing the search space for clustering operation by using LTE cell-ID searching criteria. This enables the method to estimate UE positioning in short time with less computational expense. To validate the cluster-based positioning real-time field measurements were collected using readi…

ta113SIMPLE (military communications protocol)business.industryComputer scienceReal-time computingLTE cell-IDFingerprint recognitionGridminimization of drive testsDetermining the number of clusters in a data setEmbedded systemgrid-based RF fingerprintingRadio frequencybusinessCluster analysishierarchical clustering
researchProduct

Using Video Conferencing and Video Recordings for Upper Secondary Distance Teaching: Teachers' View Points

2016

In Finland the “Isoverstas” (formely ISOverkosto) network of schools coordinates the development of upper secondary distance learning services. The community actually is quite extensive with 65 member schools. In this paper we introduce the results related using synchronous and asynchronous online video resources for distance teaching. The topic is approached broadly at the level of schools and different support services as well as the pedagogical practices of individual teachers. The research data consists of wiki stories written by teachers, the interviews of selected teachers, and an online survey. Data-based content analysis was chosen as the main analysis method with the aim of highlig…

ta113Secondary levelpedagogyMultimediabusiness.industryComputer scienceDistance teachingtoisen asteen koulutuscomputer.software_genrepedagogiikkaVideoconferencingICTdistance educationsecondary educationComputingMilieux_COMPUTERSANDEDUCATIONta516Computer visionArtificial intelligencebusinessdevelopment communitycomputer
researchProduct

A Serendipity-Oriented Greedy Algorithm for Recommendations

2017

Most recommender systems suggest items to a user that are popular among all users and similar to items the user usually consumes. As a result, a user receives recommendations that she/he is already familiar with or would find anyway, leading to low satisfaction. To overcome this problem, a recommender system should suggest novel, relevant and unexpected, i.e. serendipitous items. In this paper, we propose a serendipity-oriented algorithm, which improves serendipity through feature diversification and helps overcome the overspecialization problem. To evaluate our algorithm and compare it with others, we employ a serendipity metric that captures each component of serendipity, unlike the most …

ta113SerendipityComputer sciencebusiness.industrysuosittelujärjestelmät020207 software engineeringserendipity02 engineering and technologyalgorithmsunexpectednessnoveltyalgoritmit0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencerecommender systemsGreedy algorithmbusinessGreedy randomized adaptive search procedure
researchProduct

An Information System Design Product Theory for Integrated Order, Transportation and Warehouse Management Systems

2013

Globalization, lead time reduction and cost pressures, and other factors make it nontrivial for most companies to devise and manage effective logistics services to meet client requirements. They are better off using the services of specialized third party logistics service providers. These providers compete fiercely and need to develop and improve their services continuously to gain competitive advantage. Integrating the logistics process for improving communication and coordination is the most feasible way for third party logistics providers to deal with these pressures. Yet, the extant literature provides little theoretical guidance for integrating the logistics life-cycle, including orde…

ta113Service (business)Humanitarian LogisticsProcess managementKnowledge managementbusiness.industryComputer scienceService providerCompetitive advantageOutsourcingGlobalizationInformation systemOrder processingIntegrated logistics supportbusinessLead time2013 46th Hawaii International Conference on System Sciences
researchProduct

Consumers’ adoption of information services

2013

This paper reports on a design science research study that seeks to investigate how information service components affect consumers’ potential adoption of such services. More specifically, the paper develops a conceptual model that uses the theory of organizational information services (TOIS) and the unified theory of acceptance and use of technology (UTAUT) as a basis. The results indicate that individual constructs can be linked to service components. In turn, this result can potentially be instrumental in progress toward a deeper understanding of consumers’ adoption of information services and how this affects the development of such services and systems that support them.

ta113Service (business)Information Systems and ManagementKnowledge managementbusiness.industrymedia_common.quotation_subjectServices computingUnified theory of acceptance and use of technologyAffect (psychology)Management Information SystemsConceptual modelInformation systemDesign science researchBusinessMarketingInformation Systemsmedia_commonInformation & Management
researchProduct

Conceptualizing the Value Co-Destruction Process for Service Systems: Literature Review and Synthesis

2017

This study conceptualizes the notion of value co-destruction by reviewing and synthesizing the scattered and scarce value co-destruction literature in interdisciplinary fields. Building on our synthesis, we outline a conceptual framework for the value co-destruction process consisting of three interrelated categories of key concepts. Our framework helps in identifying, analyzing and rectifying unwanted outcomes of a service process and highlighting the dynamic nature of value co-destruction in service systems. peerReviewed

ta113Service (business)Knowledge managementProcess (engineering)business.industry05 social sciencesvalue co-destructionpalvelujärjestelmät0502 economics and businessValue (economics)service systemsCo-creation050211 marketingbusiness050203 business & managementProceedings of the 50th Hawaii International Conference on System Sciences (2017)
researchProduct

Consumer Acceptance and Use of Instagram

2016

This study extends the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model to investigate factors affecting the acceptance and use of a social networking service (SNS) called Instagram. The UTAUT2 model is modified to better suit the context of SNSs by replacing the price value construct with self-congruence. Furthermore, we explore the effects of behavioral intention and use behavior on "user indegree" defined as the number of people who follow an SNS user. The results of the survey study largely support the hypothesized model in the context of Instagram. The findings contribute to previous knowledge by demonstrating the important roles of hedonic motivation and habit in co…

ta113Service (business)Value (ethics)Context modelHedonic motivationsocial media05 social sciencesSurvey researchContext (language use)AdvertisingUnified theory of acceptance and use of technology0502 economics and businessInstagram050211 marketingConstruct (philosophy)Psychologyta512consumer acceptance050203 business & management2016 49th Hawaii International Conference on System Sciences (HICSS)
researchProduct

Domain Specific Case Tool for ICT-Enabled Service Design

2014

One major problem in service design is the limited availability of information gathered during the development process. In particular, information on end-user requirements is difficult for designers, developers, and maintainers to access. Here, we provide a mechanism that supports the gathering and modeling of various types of information throughout the service and software development life cycle. As various existing tools focus on a particular part of the life cycle, essential information is not available, or it is more difficult to obtain in later stages. The linkage between information collected in the different stages is often lost. The implemented tool support enables the modeling of r…

ta113Service (systems architecture)Computer sciencebusiness.industryService designDomain (software engineering)SoftwareUnified Modeling LanguageInformation and Communications TechnologySystems development life cycleComponent (UML)Component-based software engineeringSoftware engineeringbusinessComputer-aided software engineeringcomputercomputer.programming_language2014 47th Hawaii International Conference on System Sciences
researchProduct

Flexible entity search on surfaces

2016

Surface computing allows flexible search interaction where users can manipulate the representation of entities recommended for them to create new queries or augment existing queries by taking advantage of increased screen estate and almost physical tactile interaction. We demonstrate a search system based on 1) Direct Manipulation of Entity Representation on Surfaces and 2) Entity Recommendation and Document Retrieval. Entities are modeled as a knowledge-graph and the relevances of entities are computed using the graph structure. Users can manipulate the representation of entities via spatial grouping and assigning preferences on entities. Our contribution can help to design effective infor…

ta113Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniInformation retrievalSettore INF/01 - InformaticaComputer science020207 software engineering02 engineering and technologyEntity searchSurface computing020204 information systems0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)Information explorationDocument retrievalInformation explorationSurface computing
researchProduct

A two-step, user-centered approach to personalized tourist recommendations

2017

Geo-localized, mobile applications can simplify a tourist visit, making the relevant Point of Interests more easily and promptly discernible to users. At the same time, such solutions must avoid creating unfitting or rigid user profiles that impoverish the users' options instead of refining them. Currently, user profiles in recommender systems rely on dimensions whose relevance to the user is more often presumed than empirically defined. To avoid this drawback, we build our recommendation system in a two-step process, where profile parameters are evaluated preliminarily and separately from the recommendations themselves. We describe this two-step evaluation process including an initial surv…

ta113Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniTourist applicationEngineeringUser profileSettore INF/01 - InformaticaPoint (typography)Process (engineering)Computer Applicationsbusiness.industry02 engineering and technologyRecommender systemWorld Wide WebTourist applicationsUser validationHuman–computer interaction020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingGeneralizability theoryRelevance (information retrieval)businessDrawbackProceedings of the 12th Biannual Conference on Italian SIGCHI Chapter
researchProduct