Search results for "ta113"

showing 10 items of 530 documents

Emotional user experience and feeling of control

2015

Current research on emotional user experience lacks a clear exposition on the relationship between feeling of control and the emotion response. The appraisal theory of emotion posits that perceived control over an event is an important factor in determining the emotional response to the event. It is therefore hypothesised, that the relationship between emotional experiences and interaction events is mediated by feeling of control. In an experiment (N = 38), participants used a joystick to control game objects, and gave self-reports of their emotional states and feeling of control. Pathway analyses predicting the factors of emotional experience with event logs reveal that feeling of control …

ta113business.industrymedia_common.quotation_subjectemotionEmotion workAppraisal theoryfeeling of controlPAD emotional state modelFeelingUser experience designuser experienceEmotional expressionPsychologybusinessEmotional exhaustionSocial psychologyCompetence (human resources)ta515media_common
researchProduct

Innovation as a driver of internationalization in the software industry

2013

Innovation and internationalization are two important factors for growth. This study analyzes whether innovativeness has an effect on the internationalization of software firms, and if so, how strong this effect is. Innovation and internationalization have rarely been studied together, with research tending to focus more on the relationship between innovations and growth. However, internationalization is a key prerequisite for growth for companies operating in small domestic markets. This paper analyzes the innovativeness and internationalization of firms, using data from the Software Industry Survey conducted in Finland. Since the speed of firm growth and internationalization are dependent…

ta113business.industrysoftware firmsInnovation managementkasvuDomestic marketInternationalizationSoftwareRevenue growthMarketinginternationalizationbusinessIndustrial organizationinnovatiivisuus2013 International Conference on Research and Innovation in Information Systems (ICRIIS)
researchProduct

An Approach for Network Outage Detection from Drive-Testing Databases

2012

A data-mining framework for analyzing a cellular network drive testing database is described in this paper. The presented method is designed to detect sleeping base stations, network outage, and change of the dominance areas in a cognitive and self-organizing manner. The essence of the method is to find similarities between periodical network measurements and previously known outage data. For this purpose, diffusion maps dimensionality reduction and nearest neighbor data classification methods are utilized. The method is cognitive because it requires training data for the outage detection. In addition, the method is autonomous because it uses minimization of drive testing (MDT) functionalit…

ta113cellular network drive testing databaseDowntimeArticle SubjectDatabaseComputer Networks and CommunicationsComputer scienceDimensionality reductionData classificationDiffusion mapcomputer.software_genrelcsh:QA75.5-76.95Base stationHandoverCellular networklcsh:Electronic computers. Computer scienceData miningtiedonlouhintacomputerInformation SystemsTest dataJournal of Computer Networks and Communications
researchProduct

Appraisal and Mental Contents in Human-Technology Interaction

2015

User experience has become a key concept in investigating human-technology interaction. Therefore it has become essential to consider how user experience can be explicated using psychological concepts. Emotion has been widely considered to be an important dimension of user experience, and one obvious link between modern psychology and the analysis of user experience assumes the analysis of emotion in interaction processes. In this paper, the focus is on the relationship between action types and elicited emotional patterns. In three experiments including N = 40 participants each, it is demonstrated that the types of emotions experienced when people evaluate and use technical artefacts differ…

ta113cognitionbusiness.industryfrustrationcompetenceemotionCognitionhuman-technology interactionuser psychologyHuman-Computer InteractionUser experience designuser experienceactionPsychologybusinessCompetence (human resources)Social psychologyta515Information SystemsCognitive psychologyInternational Journal of Technology and Human Interaction
researchProduct

Cognitive self-healing system for future mobile networks

2015

This paper introduces a framework and implementation of a cognitive self-healing system for fault detection and compensation in future mobile networks. Performance monitoring for failure identification is based on anomaly analysis, which is a combination of the nearest neighbor anomaly scoring and statistical profiling. Case-based reasoning algorithm is used for cognitive self-healing of the detected faulty cells. Validation environment is Long Term Evolution (LTE) mobile system simulated with Network Simulator 3 (ns-3) [1, 2]. Results demonstrate that cognitive approach is efficient for compensation of cell outages and is capable to improve network coverage. Anomaly analysis can be used fo…

ta113cognitionta213Performance managementComputer sciencebusiness.industryDistributed computingCognitiondata miningcomputer.software_genreAutomationanomaly detectionFault detection and isolation5G networksNetwork simulationcompensationcell outageRobustness (computer science)self-healingAnomaly detectionData miningbusinesscomputer5G2015 International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

Turing's error-revised

2016

Many important lines of argumentation have been presented during the last decades claiming that machines cannot think like people. Yet, it has been possible to construct devices and information systems, which replace people in tasks which have previously been occupied by people as the tasks require intelligence. The long and versatile discourse over, what machine intelligence is, suggests that there is something unclear in the foundations of the discourse itself. Therefore, we critically studied the foundations of used theory languages. By looking critically some of the main arguments of machine thinking, one can find unifying factors. Most of them are based on the fact that computers canno…

ta113computationClass (set theory)modelformal language02 engineering and technologyconsciousnessArgumentation theoryEpistemologyTuring machineTuring machinesymbols.namesake020204 information systemsFormal language0202 electrical engineering electronic engineering information engineeringsymbolsSelection (linguistics)020201 artificial intelligence & image processingSociologyConstruct (philosophy)TuringcomputermindNatural languagecomputer.programming_languageInternational Journal of Philosophy Study
researchProduct

Context-aware data caching for 5G heterogeneous small cells networks

2016

In this work, we investigate the problem of context-aware data caching in the heterogeneous small cell networks (HSCNs) to provide satisfactory to the end-users in reducing the service latency. In particular, we explore the storage capability of base stations (BSs) in HSCNs and propose a data caching model consists of edge caching elements (CAEs), small cell base stations (SBSs), and macro cell BS (MBS). Then, we concentrate on how to efficiently match the data contents to the different cache entities in order to minimize the overall system service latency. We model it as a distributed college admission (CA) stable matching problem and tackle this issue by utilizing contextual information t…

ta113context awareta213Computer sciencebusiness.industryQuality of servicematching05 social sciences050801 communication & media studies020206 networking & telecommunicationssmall cell networks02 engineering and technologycontent cachingSmart CacheBase station0508 media and communicationsServer0202 electrical engineering electronic engineering information engineeringLeverage (statistics)CacheSmall cellbusinessComputer network
researchProduct

Health care and cyber threats

2019

ta113critical infrastructurecyber threatkyberuhkaterveydenhuoltocyber securitykyberturvallisuushealth carekriittinen infrastruktuuriFinnish Journal of eHealth and eWelfare
researchProduct

Efficient Time Integration of Maxwell's Equations with Generalized Finite Differences

2015

We consider the computationally efficient time integration of Maxwell’s equations using discrete exterior calculus (DEC) as the computational framework. With the theory of DEC, we associate the degrees of freedom of the electric and magnetic fields with primal and dual mesh structures, respectively. We concentrate on mesh constructions that imitate the geometry of the close packing in crystal lattices that is typical of elemental metals and intermetallic compounds. This class of computational grids has not been used previously in electromagnetics. For the simulation of wave propagation driven by time-harmonic source terms, we provide an optimized Hodge operator and a novel time discretizati…

ta113crystal structureElectromagneticsDiscretizationApplied Mathematicsta111Mathematical analysisFinite differenceFinite-difference time-domain methodDegrees of freedom (statistics)harmonic Hodge operatordiscrete exterior calculusmesh generationComputational Mathematicssymbols.namesakeDiscrete exterior calculusMaxwell's equationsMaxwell's equationsMesh generationnonuniform time discretizationsymbolsMathematicsSIAM Journal on Scientific Computing
researchProduct

Towards the cyber security paradigm of ehealth: Resilience and design aspects

2017

Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain…

ta113e-healthcareEmerging technologiesbusiness.industrycyber securityComputer securitycomputer.software_genreAnticipation (artificial intelligence)Critical information infrastructureHealth careSystemic riskeHealthBusinessteleterveydenhuoltoResilience (network)kyberturvallisuuscomputerHealthcare system
researchProduct