Search results for "work"

showing 10 items of 14511 documents

Recommending Serendipitous Items using Transfer Learning

2018

Most recommender algorithms are designed to suggest relevant items, but suggesting these items does not always result in user satisfaction. Therefore, the efforts in recommender systems recently shifted towards serendipity, but generating serendipitous recommendations is difficult due to the lack of training data. To the best of our knowledge, there are many large datasets containing relevance scores (relevance oriented) and only one publicly available dataset containing a relatively small number of serendipity scores (serendipity oriented). This limits the learning capabilities of serendipity oriented algorithms. Therefore, in the absence of any known deep learning algorithms for recommend…

ta113recommender systemInformation retrievalTraining setArtificial neural networkComputer sciencebusiness.industrySerendipityDeep learningsuosittelujärjestelmätdeep learning020207 software engineeringserendipity02 engineering and technologyRecommender systemtransfer learningalgorithmskoneoppiminenalgoritmit0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRelevance (information retrieval)Artificial intelligenceTransfer of learningbusiness
researchProduct

Data mining framework for random access failure detection in LTE networks

2014

Sleeping cell problem is a particular type of cell degradation. There are various software and hardware reasons that might cause such kind of cell outage. In this study a cell becomes sleeping because of Random Access Channel (RACH) failure. This kind of network problem can appear due to misconfiguration, excessive load or software/firmware problem at the Base Station (BS). In practice such failure might cause network performance degradation, which is hardly traceable by an operator. In this paper we present a data mining based framework for the detection of problematic cells. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving BS. The choice of N i…

ta113sleeping cell problembusiness.industryComputer scienceFirmwareHeuristic (computer science)Event (computing)Reliability (computer networking)data miningLTE networkscomputer.software_genreBase stationRandom-access channelUser equipmentData miningbusinessrandom access channelcomputerRandom accessComputer network2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC)
researchProduct

Towards enabling privacy preserving smart city apps

2016

Smart city applications are increasingly relying on personally identifiable data. A disclosure of such a data to a platform provider and possible 3rd parties represents a risk to the privacy of the application users. To mitigate the privacy risk, two-layer privacy-preserving platform architecture is introduced, wherein the personally identifiable information is dealt with at the inner layer (executed in a trusted environment), whereas only generic and personally unidentifiable information is made available to the apps at the outer layer of the architecture — e.g., in a form of app-specific events. The essential requirements for the platform are described, and the architectural implications …

ta113smart city application platformInformation privacyPrivacy by DesignComputer sciencebusiness.industryPrivacy softwareMultitier architectureInternet privacy020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreprivacylayered architecture020204 information systemsSmart city0202 electrical engineering electronic engineering information engineeringLayer (object-oriented design)ArchitecturebusinessPersonally identifiable informationcomputerpersonally identifiable information
researchProduct

Essence : Reference Architecture for Software Engineering - Representing Essence in Archimate Notation

2018

Essence is a standard for working with methods in software engineering. As such, it can be seen as the reference architecture for software engineering. The Essence consists of the Kernel, and a notation called the Language. This representation is not widely known and likely hinders the adoption of the Essence. This paper represents the work-in-progress of representing the Essence using ArchiMate, the de facto notation for enterprise architecture. Our purpose is to help organisations to adopt Essence by representing it in the language already understood by different stakeholders. peerReviewed

ta113software development methodbusiness.industryComputer scienceSEMAT020206 networking & telecommunications020207 software engineering02 engineering and technologyNotationessenceArchiMatekernel0202 electrical engineering electronic engineering information engineeringReference architectureSoftware engineeringbusinessohjelmistokehitys
researchProduct

Operator Revenue Analysis for Device-to-Device Communications Overlaying Cellular Network

2018

Device-to-device (D2D) communications has recently gathered significant research interest due to its efficient utilization of already depleting wireless spectrum. In this article, we considered a scenario where D2D users communicate in the presence of cellular users in an overlay network setup. In order to analyze the revenue of service providers in monetary terms, the paper provides exact expressions of operator profit for both D2D and cellular users. More specifically, we take into account different network parameters including user density, transmit power and channel variations to understand their impact on the total revenue of the operator. Finally, we derive the balancing value of freq…

ta113ta112Computer sciencebusiness.industryTotal revenueOverlay network020206 networking & telecommunications020302 automobile design & engineeringoperator gain02 engineering and technologyService providerTransmitter power outputdevice-to-device communicationsCellular communication0203 mechanical engineeringD2D communicationsfrequency partioning partioning factor0202 electrical engineering electronic engineering information engineeringCellular networkRevenueWirelessbusinessComputer network
researchProduct

Lattice Boltzmann Simulations at Petascale on Multi-GPU Systems with Asynchronous Data Transfer and Strictly Enforced Memory Read Alignment

2015

The lattice Boltzmann method is a well-established numerical approach for complex fluid flow simulations. Recently general-purpose graphics processing units have become accessible as high-performance computing resources at large-scale. We report on implementing a lattice Boltzmann solver for multi-GPU systems that achieves 0.69 PFLOPS performance on 16384 GPUs. In addition to optimizing the data layout on the GPUs and eliminating the halo sites, we make use of the possibility to overlap data transfer between the host CPU and the device GPU with computing on the GPU. We simulate flow in porous media and measure both strong and weak scaling performance with the emphasis being on a large scale…

ta113ta114Computer scienceLattice Boltzmann methodsGPUParallel computingSolverLattice Boltzmannmemory alignmentComputational sciencePetascale computingAsynchronous communicationData structure alignmentGraphicsasynchronous communicationTitanHost (network)ComputingMethodologies_COMPUTERGRAPHICSData transmissionEuromicro international conference on parallel, distributed and network-based processing
researchProduct

The influence of dataset size on the performance of cell outage detection approach in LTE-A networks

2015

The configuration and maintenance of constantly evolving mobile cellular networks are getting more and more complex and hence expensive. Self-Organizing Networks (SON) concept is an umbrella term for the set of automated solutions for network operations proposed by 3rd Generation Partnership Project (3GPP) group. Automated cell outage detection is one of the components of SON functionality. In early studies our research group developed data-driven approach for the detection of malfunctioning cells. In this paper we investigate the performance of the proposed solution as a function of the density of active users and the size of observation interval. The evaluation is conducted in Long Term E…

ta113ta213Computer sciencebusiness.industrydatasetsReal-time computingLTE-A networkssizeMaintenance engineeringNetwork operations centerTerm (time)LTE AdvancedHandoverCellular networkMobile telephonybusinessRandom accessComputer network
researchProduct

Effects of Temperature and Humidity on Radio Signal Strength in Outdoor Wireless Sensor Networks

2015

Many wireless sensor networks operating outdoors are exposed to changing weather conditions, which may cause severe degradation in system performance. Therefore, it is essential to explore the factors affecting radio link quality in order to mitigate their impact and to adapt to varying conditions. In this paper, we study the effects of temperature and humidity on radio signal strength in outdoor wireless sensor networks. Experimental measurements were performed using Atmel ZigBit 2.4GHz wireless modules, both in summer and wintertime. We employed all the radio channels specified by IEEE 802.15.4 for 2.4GHz ISM frequency band with two transmit power levels. The results show that changes in …

ta113ta213radio signal strengthComputer scienceFrequency bandbusiness.industryRadio Link ProtocolhumiditytemperatureTransmitter power outputTemperature measurementlaw.inventionlawMobile wireless sensor networkElectronic engineeringWirelesslämpötilaTelecommunicationsbusinesswireless sensor networksWireless sensor networkDiversity scheme
researchProduct

Effect of Ion Escape Velocity and Conversion Surface Material on H- Production

2011

According to generally accepted models surface production of negative ions depends on ion escape velocity and work function of the surface. We have conducted an experimental study addressing the role of the ion escape velocity on H− production. A converter‐type ion source at Los Alamos Neutron Science Center was employed for the experiment. The ion escape velocity was affected by varying the bias voltage of the converter electrode. It was observed that due to enhanced stripping of H− no direct gain of extracted beam current can be achieved by increasing the converter voltage. The conversion efficiency of H− was observed to vary with converter voltage and follow the existing theories in qual…

ta114ChemistryEnergy conversion efficiencyBiasingWork functionEscape velocityPlasmaAtomic physicsCharged particleIon sourceIon
researchProduct

Bilevel heat exchanger network synthesis with an interactive multi-objective optimization method

2012

Abstract Heat exchanger network synthesis (HENS) has been an active research area for more than 40 years because well-designed heat exchanger networks enable heat recovery in process industries in an energy- and cost-efficient manner. Due to ever increasing global competition and need to decrease the harmful effects done on the environment, there still is a continuous need to improve the heat exchanger networks and their synthesizing methods. In this work we present a HENS method that combines an interactive multi-objective optimization method with a simultaneous bilevel HENS method, where the bilevel part of the method is based on grouping of process streams and building aggregate streams …

ta212MINLPNUMBUSPareto optimalityEngineeringMathematical optimizationEngineering drawingta214business.industryta111Aggregate (data warehouse)Synheat modelProcess (computing)Energy Engineering and Power TechnologyWork in processMulti-objective optimizationIndustrial and Manufacturing EngineeringWeightingGrouping of processHeat recovery ventilationHeat exchangerbusinessta218Energy (signal processing)Applied Thermal Engineering
researchProduct