10 resultados para Path Analysis

em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper explores behavioral patterns of web users on an online magazine web-site. The goal of the study is to first find and visualize user paths within the data generated during collection, and to identify some generic behavioral typologies of user behavior. To form a theoretical foundation for processing data and identifying behavioral ar-chetypes, the study relies on established consumer behavior literature to propose typologies of behavior. For data processing, the study utilizes methodologies of ap-plied cluster analysis and sequential path analysis. Utilizing a dataset of click stream data generated from the real-life clicks of 250 ran-domly selected website visitors over a period of six weeks. Based on the data collect-ed, an exploratory method is followed in order to find and visualize generally occur-ring paths of users on the website. Six distinct behavioral typologies were recog-nized, with the dominant user consuming mainly blog content, as opposed to editori-al content. Most importantly, it was observed that approximately 80% of clicks were of the blog content category, meaning that the majority of web traffic occurring in the site takes place in content other than the desired editorial content pages. The out-come of the study is a set of managerial recommendations for each identified behavioral archetype.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Tämän tutkielman tarkoituksena on selittää asiakasomistajien asiakaskäyttäy-tymiseen vaikuttavia asenteellisia ja psykologisia tekijöitä taloudellisten kan-nustimien läsnä ollessa. Asiakaskäyttäytyminen jaetaan tutkielmassa kolmeen eri muotoon, word-of-mouth - käyttäytymiseen, ostojen suhteelliseen keskittämiseen sekä vaihtohalukkuuteen. Asiakaskäyttäytymisen eri aspekteja selitetään organisationaalisen identifioitumisen, sitoutumisen kolmen komponentin, organisaation imagon sekä psykologisen omistajuuden käsitteiden avulla. Samalla tarkastellaan käsitteiden muodostumismekanismeja asiakaskontekstissa. Tutkielma on luonteeltaan kvantitatiivinen tutkimus, jossa kerättyä survey -aineistoa analysoidaan käsitteiden välisten suhteiden ja vaikutusten löytämiseksi polkuanalyysiä käyttäen. Tuloksina havaittiin useiden asiakasomistajien kokemien psykologisten tilojen vaikuttavan asiakaskäyttäytymisen elementteihin taloudellisten kannustimien lisäksi. Tutkielmassa havaittiin myös psykologisen omistajuuden sekä organisationaalisen identifioitumisen olevan relevantteja käsitteitä osuustoiminnallisen yrityksen jäsenien asiakaskäyttäytymistä tutkittaessa, vaikkei niitä aiemmin ole juurikaan tutkittu tämäntyyppisissä konteksteissa. Tutkielman käsitteiden muodostumismekanismien havaittiin noudattavan pääosin kirjallisuudessa esitettyjä näkemyksiä.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Simulation has traditionally been used for analyzing the behavior of complex real world problems. Even though only some features of the problems are considered, simulation time tends to become quite high even for common simulation problems. Parallel and distributed simulation is a viable technique for accelerating the simulations. The success of parallel simulation depends heavily on the combination of the simulation application, algorithm and message population in the simulation is sufficient, no additional delay is caused by this environment. In this thesis a conservative, parallel simulation algorithm is applied to the simulation of a cellular network application in a distributed workstation environment. This thesis presents a distributed simulation environment, Diworse, which is based on the use of networked workstations. The distributed environment is considered especially hard for conservative simulation algorithms due to the high cost of communication. In this thesis, however, the distributed environment is shown to be a viable alternative if the amount of communication is kept reasonable. Novel ideas of multiple message simulation and channel reduction enable efficient use of this environment for the simulation of a cellular network application. The distribution of the simulation is based on a modification of the well known Chandy-Misra deadlock avoidance algorithm with null messages. The basic Chandy Misra algorithm is modified by using the null message cancellation and multiple message simulation techniques. The modifications reduce the amount of null messages and the time required for their execution, thus reducing the simulation time required. The null message cancellation technique reduces the processing time of null messages as the arriving null message cancels other non processed null messages. The multiple message simulation forms groups of messages as it simulates several messages before it releases the new created messages. If the message population in the simulation is suffiecient, no additional delay is caused by this operation A new technique for considering the simulation application is also presented. The performance is improved by establishing a neighborhood for the simulation elements. The neighborhood concept is based on a channel reduction technique, where the properties of the application exclusively determine which connections are necessary when a certain accuracy for simulation results is required. Distributed simulation is also analyzed in order to find out the effect of the different elements in the implemented simulation environment. This analysis is performed by using critical path analysis. Critical path analysis allows determination of a lower bound for the simulation time. In this thesis critical times are computed for sequential and parallel traces. The analysis based on sequential traces reveals the parallel properties of the application whereas the analysis based on parallel traces reveals the properties of the environment and the distribution.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Riskit ja riskittömyys uhkaavat yksilöitä, käsityötä ja yhteiskuntaa. Käsityökasvatukselleon haaste toimia kulttuurissa, joka tavoittelee täyttä riskittömyyttä. Käsityössä kasvatetaan kekseliäisyyteen ja varautumaan sen aiheuttaman riskin kohtaamiseen sekä ottamaan siitä vastuuta. Tämän tutkimuksen tehtävänä on riskivastuullisuuden mallin rakentamiseksi selvittää, kuinka oppilaiden vastuullisuus selittää riskirajaa käsityön turvallisuuskasvatuksen kulttuurissa. Välinearvojen saavuttamiseksi on siedettävä välineriskiä, joka ei ylitä turvallisuuskulttuurin riskirajaa. Välinearvot ovat välineiden laatua lisääviä ominaisuuksia, joilla pyritään peittämään välineriskejä. Siedettävän riskin rajan ratkaisemiseen tarvitaan tietoa käsityön tuottamisesta ja todellisuutta havainnoivien tiedonalojen tietoa. Viime kädessä ratkaisu tehdään rakentavalla ajattelulla, johon kuuluu välinearvojen tavoittelua ohjaava käsityötaju ja välineriskeihin varautumista ohjaava turvallisuustaju. Käsityössä onnistuminen kannustaa kohti uusia haasteita ja epäonnistumisen riski asettuu mittasuhteisiinsa. Kekseliäässä käsityön kulttuurissa kokeillaan omia ja ympäröivän todellisuuden mahdollisuuksia ottamalla oivaltaen riskejä, jotka saavat aikaan rakentavan kokemuksen riskistä. Käsityö on riskioivallusten oppiaine. Tutkimustehtävän toteuttamiseksi tässä tutkimuksessa rakennetaan uusi riskivastuullisuuden malli, jossa vastuullisuus selittää riskirajaa. Mallin vastaavuutta selvitetään valtakunnallisesti peruskoulun käsityön 6. ja 9. luokan käsityön opetuksessa (n = 393). Aineisto on analysoitu rakenneyhtälöanalyysein konfirmatorisella faktorianalyysilla ja polkumallinnuksella. Tutkimusaineisto ja riskivastuullisuuden malli vastaavat toisiaan. Vastuullisuuden selitysosuus turvallisuustajun ja käsityötajun ratkaisemasta riskirajasta on mallin mukaan 35 %. Oppilaat osoittivat tuntevansa oman tuottamisensa vaikutuksia ja vastuuta niistä. Vastuullisuus osoittautui tärkeäksi riskirajan selittäjäksi, joten käsityön turvallisuuskasvatuksen kulttuuri voi kohota uudelle tasolle riskivastuulliseksi. Käsityön turvallisuuskasvatus on kokonaisvaltaista turvallisuustajun kasvatusta. Riskivastuullisuus luo turvallisuuskulttuuriin yhteisen käsityksen siedettävän riskin rajasta. Oppilaiden mahdollisuuksia kekseliääseen tutkivaan tuottamiseen on vahvistettava eikä rajoitettava. Riskivastuullisessa käsityön turvallisuuskasvatuksen kulttuurissa opettajan tehtävänä ei ole estää mitään tapahtumasta vaan saada mahdollisimman paljon tapahtumaan, sillä vastuullisuus kasvaa vastuuta ottamalla. Se on kasvatuksen – käsityökasvatuksen – keino turvallisuustyössä.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The aim of this study was to examine community and individual approaches in responses to mass violence after the school shooting incidents in Jokela (November 2007) and Kauhajoki (September 2008), Finland. In considering the community approach, responses to any shocking criminal event may have integrative, as well as disintegrative effects, within the neighborhood. The integration perspective argues that a heinous criminal event within one’s community is a matter of offence to collectively held feelings and beliefs, and increases perceived solidarity; whereas the disintegration perspective suggests that a criminal event weakens the social fabric of community life by increasing fear of crime and mistrust among locals. In considering the individual approach, socio-demographic factors, such as one’s gender, are typically significant indicators, which explain variation in fear of crime. Beyond this, people are not equally exposed to violent crime and therefore prior victimization and event related experiences may further explain why people differ in their sensitivity to risk from mass violence. Finally, factors related to subjective mental health, such as depressed mood, are also likely to moderate individual differences in responses to mass violence. This study is based on the correlational design of four independent cross-sectional postal surveys. The sampling frames (N=700) for the surveys were the Finnish speaking adult population aged 18–74-years. The first mail survey in Jokela (n=330) was conducted between May and June 2008, approximately six months from the shooting incident at the local high-school. The second Jokela survey (n=278) was conducted in May–June of 2009, 18 months removed from the incident. The first survey in Kauhajoki (n=319) was collected six months after the incident at the local University of Applied Sciences, March– April 2009, and the second (n=339) in March–April 2010, approximately 18 months after the event. Linear and ordinal regression and path analysis are used as methods of analyses. The school shootings in Jokela and Kauhajoki were extremely disturbing events, which deeply affected the communities involved. However, based on the results collected, community responses to mass violence between the two localities were different. An increase in social solidarity appears to apply in the case of the Jokela community, but not in the case of the Kauhajoki community. Thus a criminal event does not necessarily impact the wider community. Every empirical finding is most likely related to different contextual and event-specific factors. Beyond this, community responses to mass violence in Jokela also indicated that the incident was related to a more general sense of insecurity and was also associating with perceived community deterioration and further suggests that responses to mass violence may have both integrating and disintegrating effects. Moreover, community responses to mass violence should also be examined in relation to broader social anxieties and as a proxy for generalized insecurity. Community response is an emotive process and incident related feelings are perhaps projected onto other identifiable concerns. However, this may open the door for social errors and, despite integrative effects, this may also have negative consequences within the neighborhood. The individual approach suggests that women are more fearful than men when a threat refers to violent crime. Young women (aged 18–34) were the most worried age and gender group as concerns perception of threat from mass violence at schools compared to young men (aged 18–34), who were also the least worried age and gender group when compared to older men. It was also found that concerns about mass violence were stronger among respondents with the lowest level of monthly household income compared to financially better-off respondents. Perhaps more importantly, responses to mass violence were affected by the emotional proximity to the event; and worry about the recurrence of school shootings was stronger among respondents who either were a parent of a school-aged child, or knew a victim. Finally, results indicate that psychological wellbeing is an important individual level factor. Respondents who expressed depressed mood consistently expressed their concerns about mass violence and community deterioration. Systematic assessments of the impact of school shooting events on communities are therefore needed. This requires the consolidation of community and individual approaches. Comparative study designs would further benefit from international collaboration across disciplines. Extreme school violence has also become a national concern and deeper understanding of crime related anxieties in contemporary Finland also requires community-based surveys.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This work is devoted to the problem of reconstructing the basis weight structure at paper web with black{box techniques. The data that is analyzed comes from a real paper machine and is collected by an o®-line scanner. The principal mathematical tool used in this work is Autoregressive Moving Average (ARMA) modelling. When coupled with the Discrete Fourier Transform (DFT), it gives a very flexible and interesting tool for analyzing properties of the paper web. Both ARMA and DFT are independently used to represent the given signal in a simplified version of our algorithm, but the final goal is to combine the two together. Ljung-Box Q-statistic lack-of-fit test combined with the Root Mean Squared Error coefficient gives a tool to separate significant signals from noise.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

1. Introduction "The one that has compiled ... a database, the collection, securing the validity or presentation of which has required an essential investment, has the sole right to control the content over the whole work or over either a qualitatively or quantitatively substantial part of the work both by means of reproduction and by making them available to the public", Finnish Copyright Act, section 49.1 These are the laconic words that implemented the much-awaited and hotly debated European Community Directive on the legal protection of databases,2 the EDD, into Finnish Copyright legislation in 1998. Now in the year 2005, after more than half a decade of the domestic implementation it is yet uncertain as to the proper meaning and construction of the convoluted qualitative criteria the current legislation employs as a prerequisite for the database protection both in Finland and within the European Union. Further, this opaque Pan-European instrument has the potential of bringing about a number of far-reaching economic and cultural ramifications, which have remained largely uncharted or unobserved. Thus the task of understanding this particular and currently peculiarly European new intellectual property regime is twofold: first, to understand the mechanics and functioning of the EDD and second, to realise the potential and risks inherent in the new legislation in economic, cultural and societal dimensions. 2. Subject-matter of the study: basic issues The first part of the task mentioned above is straightforward: questions such as what is meant by the key concepts triggering the functioning of the EDD such as presentation of independent information, what constitutes an essential investment in acquiring data and when the reproduction of a given database reaches either qualitatively or quantitatively the threshold of substantiality before the right-holder of a database can avail himself of the remedies provided by the statutory framework remain unclear and call for a careful analysis. As for second task, it is already obvious that the practical importance of the legal protection providedby the database right is in the rapid increase. The accelerating transformationof information into digital form is an existing fact, not merely a reflection of a shape of things to come in the future. To take a simple example, the digitisation of a map, traditionally in paper format and protected by copyright, can provide the consumer a markedly easier and faster access to the wanted material and the price can be, depending on the current state of the marketplace, cheaper than that of the traditional form or even free by means of public lending libraries providing access to the information online. This also renders it possible for authors and publishers to make available and sell their products to markedly larger, international markets while the production and distribution costs can be kept at minimum due to the new electronic production, marketing and distributionmechanisms to mention a few. The troublesome side is for authors and publishers the vastly enhanced potential for illegal copying by electronic means, producing numerous virtually identical copies at speed. The fear of illegal copying canlead to stark technical protection that in turn can dampen down the demand for information goods and services and furthermore, efficiently hamper the right of access to the materials available lawfully in electronic form and thus weaken the possibility of access to information, education and the cultural heritage of anation or nations, a condition precedent for a functioning democracy. 3. Particular issues in Digital Economy and Information Networks All what is said above applies a fortiori to the databases. As a result of the ubiquity of the Internet and the pending breakthrough of Mobile Internet, peer-to-peer Networks, Localand Wide Local Area Networks, a rapidly increasing amount of information not protected by traditional copyright, such as various lists, catalogues and tables,3previously protected partially by the old section 49 of the Finnish Copyright act are available free or for consideration in the Internet, and by the same token importantly, numerous databases are collected in order to enable the marketing, tendering and selling products and services in above mentioned networks. Databases and the information embedded therein constitutes a pivotal element in virtually any commercial operation including product and service development, scientific research and education. A poignant but not instantaneously an obvious example of this is a database consisting of physical coordinates of a certain selected group of customers for marketing purposes through cellular phones, laptops and several handheld or vehicle-based devices connected online. These practical needs call for answer to a plethora of questions already outlined above: Has thecollection and securing the validity of this information required an essential input? What qualifies as a quantitatively or qualitatively significant investment? According to the Directive, the database comprises works, information and other independent materials, which are arranged in systematic or methodical way andare individually accessible by electronic or other means. Under what circumstances then, are the materials regarded as arranged in systematic or methodical way? Only when the protected elements of a database are established, the question concerning the scope of protection becomes acute. In digital context, the traditional notions of reproduction and making available to the public of digital materials seem to fit ill or lead into interpretations that are at variance with analogous domain as regards the lawful and illegal uses of information. This may well interfere with or rework the way in which the commercial and other operators have to establish themselves and function in the existing value networks of information products and services. 4. International sphere After the expiry of the implementation period for the European Community Directive on legal protection of databases, the goals of the Directive must have been consolidated into the domestic legislations of the current twenty-five Member States within the European Union. On one hand, these fundamental questions readily imply that the problemsrelated to correct construction of the Directive underlying the domestic legislation transpire the national boundaries. On the other hand, the disputes arisingon account of the implementation and interpretation of the Directive on the European level attract significance domestically. Consequently, the guidelines on correct interpretation of the Directive importing the practical, business-oriented solutions may well have application on European level. This underlines the exigency for a thorough analysis on the implications of the meaning and potential scope of Database protection in Finland and the European Union. This position hasto be contrasted with the larger, international sphere, which in early 2005 does differ markedly from European Union stance, directly having a negative effect on international trade particularly in digital content. A particular case in point is the USA, a database producer primus inter pares, not at least yet having aSui Generis database regime or its kin, while both the political and academic discourse on the matter abounds. 5. The objectives of the study The above mentioned background with its several open issues calls for the detailed study of thefollowing questions: -What is a database-at-law and when is a database protected by intellectual property rights, particularly by the European database regime?What is the international situation? -How is a database protected and what is its relation with other intellectual property regimes, particularly in the Digital context? -The opportunities and threats provided by current protection to creators, users and the society as a whole, including the commercial and cultural implications? -The difficult question on relation of the Database protection and protection of factual information as such. 6. Dsiposition The Study, in purporting to analyse and cast light on the questions above, is divided into three mainparts. The first part has the purpose of introducing the political and rationalbackground and subsequent legislative evolution path of the European database protection, reflected against the international backdrop on the issue. An introduction to databases, originally a vehicle of modern computing and information andcommunication technology, is also incorporated. The second part sets out the chosen and existing two-tier model of the database protection, reviewing both itscopyright and Sui Generis right facets in detail together with the emergent application of the machinery in real-life societal and particularly commercial context. Furthermore, a general outline of copyright, relevant in context of copyright databases is provided. For purposes of further comparison, a chapter on the precursor of Sui Generi, database right, the Nordic catalogue rule also ensues. The third and final part analyses the positive and negative impact of the database protection system and attempts to scrutinize the implications further in the future with some caveats and tentative recommendations, in particular as regards the convoluted issue concerning the IPR protection of information per se, a new tenet in the domain of copyright and related rights.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Online paper web analysis relies on traversing scanners that criss-cross on top of a rapidly moving paper web. The sensors embedded in the scanners measure many important quality variables of paper, such as basis weight, caliper and porosity. Most of these quantities are varying a lot and the measurements are noisy at many different scales. The zigzagging nature of scanning makes it difficult to separate machine direction (MD) and cross direction (CD) variability from one another. For improving the 2D resolution of the quality variables above, the paper quality control team at the Department of Mathematics and Physics at LUT has implemented efficient Kalman filtering based methods that currently use 2D Fourier series. Fourier series are global and therefore resolve local spatial detail on the paper web rather poorly. The target of the current thesis is to study alternative wavelet based representations as candidates to replace the Fourier basis for a higher resolution spatial reconstruction of these quality variables. The accuracy of wavelet compressed 2D web fields will be compared with corresponding truncated Fourier series based fields.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Broadcasting systems are networks where the transmission is received by several terminals. Generally broadcast receivers are passive devices in the network, meaning that they do not interact with the transmitter. Providing a certain Quality of Service (QoS) for the receivers in heterogeneous reception environment with no feedback is not an easy task. Forward error control coding can be used for protection against transmission errors to enhance the QoS for broadcast services. For good performance in terrestrial wireless networks, diversity should be utilized. The diversity is utilized by application of interleaving together with the forward error correction codes. In this dissertation the design and analysis of forward error control and control signalling for providing QoS in wireless broadcasting systems are studied. Control signaling is used in broadcasting networks to give the receiver necessary information on how to connect to the network itself and how to receive the services that are being transmitted. Usually control signalling is considered to be transmitted through a dedicated path in the systems. Therefore, the relationship of the signaling and service data paths should be considered early in the design phase. Modeling and simulations are used in the case studies of this dissertation to study this relationship. This dissertation begins with a survey on the broadcasting environment and mechanisms for providing QoS therein. Then case studies present analysis and design of such mechanisms in real systems. The mechanisms for providing QoS considering signaling and service data paths and their relationship at the DVB-H link layer are analyzed as the first case study. In particular the performance of different service data decoding mechanisms and optimal signaling transmission parameter selection are presented. The second case study investigates the design of signaling and service data paths for the more modern DVB-T2 physical layer. Furthermore, by comparing the performances of the signaling and service data paths by simulations, configuration guidelines for the DVB-T2 physical layer signaling are given. The presented guidelines can prove useful when configuring DVB-T2 transmission networks. Finally, recommendations for the design of data and signalling paths are given based on findings from the case studies. The requirements for the signaling design should be derived from the requirements for the main services. Generally, these requirements for signaling should be more demanding as the signaling is the enabler for service reception.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Energy efficiency is one of the major objectives which should be achieved in order to implement the limited energy resources of the world in a sustainable way. Since radiative heat transfer is the dominant heat transfer mechanism in most of fossil fuel combustion systems, more accurate insight and models may cause improvement in the energy efficiency of the new designed combustion systems. The radiative properties of combustion gases are highly wavelength dependent. Better models for calculating the radiative properties of combustion gases are highly required in the modeling of large scale industrial combustion systems. With detailed knowledge of spectral radiative properties of gases, the modeling of combustion processes in the different applications can be more accurate. In order to propose a new method for effective non gray modeling of radiative heat transfer in combustion systems, different models for the spectral properties of gases including SNBM, EWBM, and WSGGM have been studied in this research. Using this detailed analysis of different approaches, the thesis presents new methods for gray and non gray radiative heat transfer modeling in homogeneous and inhomogeneous H2O–CO2 mixtures at atmospheric pressure. The proposed method is able to support the modeling of a wide range of combustion systems including the oxy-fired combustion scenario. The new methods are based on implementing some pre-obtained correlations for the total emissivity and band absorption coefficient of H2O–CO2 mixtures in different temperatures, gas compositions, and optical path lengths. They can be easily used within any commercial CFD software for radiative heat transfer modeling resulting in more accurate, simple, and fast calculations. The new methods were successfully used in CFD modeling by applying them to industrial scale backpass channel under oxy-fired conditions. The developed approaches are more accurate compared with other methods; moreover, they can provide complete explanation and detailed analysis of the radiation heat transfer in different systems under different combustion conditions. The methods were verified by applying them to some benchmarks, and they showed a good level of accuracy and computational speed compared to other methods. Furthermore, the implementation of the suggested banded approach in CFD software is very easy and straightforward.