Search results for "ta113"
showing 10 items of 530 documents
Emotional user experience and feeling of control
2015
Current research on emotional user experience lacks a clear exposition on the relationship between feeling of control and the emotion response. The appraisal theory of emotion posits that perceived control over an event is an important factor in determining the emotional response to the event. It is therefore hypothesised, that the relationship between emotional experiences and interaction events is mediated by feeling of control. In an experiment (N = 38), participants used a joystick to control game objects, and gave self-reports of their emotional states and feeling of control. Pathway analyses predicting the factors of emotional experience with event logs reveal that feeling of control …
Innovation as a driver of internationalization in the software industry
2013
Innovation and internationalization are two important factors for growth. This study analyzes whether innovativeness has an effect on the internationalization of software firms, and if so, how strong this effect is. Innovation and internationalization have rarely been studied together, with research tending to focus more on the relationship between innovations and growth. However, internationalization is a key prerequisite for growth for companies operating in small domestic markets. This paper analyzes the innovativeness and internationalization of firms, using data from the Software Industry Survey conducted in Finland. Since the speed of firm growth and internationalization are dependent…
An Approach for Network Outage Detection from Drive-Testing Databases
2012
A data-mining framework for analyzing a cellular network drive testing database is described in this paper. The presented method is designed to detect sleeping base stations, network outage, and change of the dominance areas in a cognitive and self-organizing manner. The essence of the method is to find similarities between periodical network measurements and previously known outage data. For this purpose, diffusion maps dimensionality reduction and nearest neighbor data classification methods are utilized. The method is cognitive because it requires training data for the outage detection. In addition, the method is autonomous because it uses minimization of drive testing (MDT) functionalit…
Appraisal and Mental Contents in Human-Technology Interaction
2015
User experience has become a key concept in investigating human-technology interaction. Therefore it has become essential to consider how user experience can be explicated using psychological concepts. Emotion has been widely considered to be an important dimension of user experience, and one obvious link between modern psychology and the analysis of user experience assumes the analysis of emotion in interaction processes. In this paper, the focus is on the relationship between action types and elicited emotional patterns. In three experiments including N = 40 participants each, it is demonstrated that the types of emotions experienced when people evaluate and use technical artefacts differ…
Cognitive self-healing system for future mobile networks
2015
This paper introduces a framework and implementation of a cognitive self-healing system for fault detection and compensation in future mobile networks. Performance monitoring for failure identification is based on anomaly analysis, which is a combination of the nearest neighbor anomaly scoring and statistical profiling. Case-based reasoning algorithm is used for cognitive self-healing of the detected faulty cells. Validation environment is Long Term Evolution (LTE) mobile system simulated with Network Simulator 3 (ns-3) [1, 2]. Results demonstrate that cognitive approach is efficient for compensation of cell outages and is capable to improve network coverage. Anomaly analysis can be used fo…
Turing's error-revised
2016
Many important lines of argumentation have been presented during the last decades claiming that machines cannot think like people. Yet, it has been possible to construct devices and information systems, which replace people in tasks which have previously been occupied by people as the tasks require intelligence. The long and versatile discourse over, what machine intelligence is, suggests that there is something unclear in the foundations of the discourse itself. Therefore, we critically studied the foundations of used theory languages. By looking critically some of the main arguments of machine thinking, one can find unifying factors. Most of them are based on the fact that computers canno…
Context-aware data caching for 5G heterogeneous small cells networks
2016
In this work, we investigate the problem of context-aware data caching in the heterogeneous small cell networks (HSCNs) to provide satisfactory to the end-users in reducing the service latency. In particular, we explore the storage capability of base stations (BSs) in HSCNs and propose a data caching model consists of edge caching elements (CAEs), small cell base stations (SBSs), and macro cell BS (MBS). Then, we concentrate on how to efficiently match the data contents to the different cache entities in order to minimize the overall system service latency. We model it as a distributed college admission (CA) stable matching problem and tackle this issue by utilizing contextual information t…
Health care and cyber threats
2019
Efficient Time Integration of Maxwell's Equations with Generalized Finite Differences
2015
We consider the computationally efficient time integration of Maxwell’s equations using discrete exterior calculus (DEC) as the computational framework. With the theory of DEC, we associate the degrees of freedom of the electric and magnetic fields with primal and dual mesh structures, respectively. We concentrate on mesh constructions that imitate the geometry of the close packing in crystal lattices that is typical of elemental metals and intermetallic compounds. This class of computational grids has not been used previously in electromagnetics. For the simulation of wave propagation driven by time-harmonic source terms, we provide an optimized Hodge operator and a novel time discretizati…
Towards the cyber security paradigm of ehealth: Resilience and design aspects
2017
Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain…