Search results for " engineering"

showing 10 items of 38291 documents

Surrogate-assisted evolutionary multiobjective shape optimization of an air intake ventilation system

2017

We tackle three different challenges in solving a real-world industrial problem: formulating the optimization problem, connecting different simulation tools and dealing with computationally expensive objective functions. The problem to be optimized is an air intake ventilation system of a tractor and consists of three computationally expensive objective functions. We describe the modeling of the system and its numerical evaluation with a commercial software. To obtain solutions in few function evaluations, a recently proposed surrogate-assisted evolutionary algorithm K-RVEA is applied. The diameters of four different outlets of the ventilation system are considered as decision variables. Fr…

ta1130209 industrial biotechnologyMathematical optimizationnumerical modelsOptimization problemlineaarinen optimointiLinear programmingComputer sciencesoftwarehydraulijärjestelmätventilationEvolutionary algorithmlinear programming02 engineering and technologyFunction (mathematics)Set (abstract data type)resistance020901 industrial engineering & automationhydraulic systemsilmanvaihto0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingShape optimizationoptimization
researchProduct

Supporting Cyber Resilience with Semantic Wiki

2016

Cyber resilient organizations, their functions and computing infrastructures, should be tolerant towards rapid and unexpected changes in the environment. Information security is an organization-wide common mission; whose success strongly depends on efficient knowledge sharing. For this purpose, semantic wikis have proved their strength as a flexible collaboration and knowledge sharing platforms. However, there has not been notable academic research on how semantic wikis could be used as information security management platform in organizations for improved cyber resilience. In this paper, we propose to use semantic wiki as an agile information security management platform. More precisely, t…

ta113021110 strategic defence & security studiesEngineeringKnowledge managementCloud computing securitybusiness.industryStandard of Good Practiceinformation security management0211 other engineering and technologies02 engineering and technologyInformation securitycyber resiliencesemantic wikiSecurity information and event managementrisk managementSecurity controlsResilience (organizational)World Wide WebITIL security managementInformation security management020204 information systems0202 electrical engineering electronic engineering information engineeringbusiness
researchProduct

Generalizability and Simplicity as Criteria in Feature Selection: Application to Mood Classification in Music

2011

Classification of musical audio signals according to expressed mood or emotion has evident applications to content-based music retrieval in large databases. Wrapper selection is a dimension reduction method that has been proposed for improving classification performance. However, the technique is prone to lead to overfitting of the training data, which decreases the generalizability of the obtained results. We claim that previous attempts to apply wrapper selection in the field of music information retrieval (MIR) have led to disputable conclusions about the used methods due to inadequate analysis frameworks, indicative of overfitting, and biased results. This paper presents a framework bas…

ta113Acoustics and UltrasonicsComputer sciencebusiness.industryDimensionality reductionEmotion classificationFeature selectionOverfittingMachine learningcomputer.software_genreNaive Bayes classifierFeature (machine learning)Music information retrievalGeneralizability theoryArtificial intelligenceElectrical and Electronic EngineeringbusinesscomputerIEEE Transactions on Audio, Speech, and Language Processing
researchProduct

Seeking Technical Debt in Critical Software Development Projects : An Exploratory Field Study

2016

In recent years, the metaphor of technical debt has received considerable attention, especially from the agile community. Still, despite the fact that agile practices are increasingly used in critical domains, to the best of our knowledge, there are no studies investigating the occurrence of technical debt in critical software development projects. The results of an exploratory field study conducted across several projects reveal that a variety of business and environmental factors cause the occurrence of technical debt in critical domains. Using Grounded Theory method, these factors are categorized as ambiguity of requirement, diversity of projects, inadequate knowledge management, and res…

ta113Agile usability engineeringKnowledge managementbusiness.industryEmpirical process (process control model)Agile Unified Process020207 software engineering02 engineering and technologySoftware peer reviewcomputer.software_genreExtreme programming practicestechnical debtTechnical debt020204 information systemssoftware development0202 electrical engineering electronic engineering information engineeringLean software developmentbusinessohjelmistokehityscomputerAgile software development
researchProduct

Supporting Agile Development by Facilitating Natural User Interaction with Executable Formal Specifications

2011

Agile development benefits from fast feedback from various stakeholders. If implemented in a suitable way, formal methods can enhance the agile development process. With an executable formal specification, it is possible to analyse and simulate the behaviour of the target system before it is being built. However, for the users' and developers' natural participation in the development process, it is necessary to use a real end-user interface and bind it to the execution environment being used in the simulations and animations. This requires, though, that the execution model used to simulate the specification is appropriately changed to facilitate the use of these user interfaces. The authors…

ta113Agile usability engineeringbusiness.industryComputer scienceProgramming languageAgile Unified ProcessGeneral Medicinecomputer.file_formatFormal methodscomputer.software_genreFormal specificationExecutableUser interfacebusinessSoftware engineeringcomputerExecution modelAgile software developmentACM SIGSOFT Software Engineering Notes
researchProduct

Anomaly detection approach to keystroke dynamics based user authentication

2017

Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…

ta113AuthenticationpääsynvalvontaComputer scienceaccess control02 engineering and technologycomputer.software_genreKeystroke dynamicstodentaminen020204 information systems0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Unsupervised learningauthentication020201 artificial intelligence & image processingAnomaly detectionData miningtietoturvadata securitycomputer
researchProduct

Why Do Users Switch Mobile Applications? : Trialing Behavior as a Predecessor of Switching Behavior

2018

Mobile application providers face high user losses because users can easily and often switch to an alternative application. Researchers have recently started to study information technology (IT) switching. However, no studies have concentrated on the unique context of mobile applications. Mobile application switching differs from the switching behavior related to many other IT products and services because of the highlighted role of alternatives, beta versions, updates, reviews, and users’ spontaneous behavior. To address this gap, we develop a mobile-specific model by using a qualitative research approach. As a theoretical contribution, we introduce trialing behavior as a predecessor of sw…

ta113Computer science020204 information systems0502 economics and business05 social sciences0202 electrical engineering electronic engineering information engineeringswitching behavior02 engineering and technology050203 business & managementmobile applicationsInformation Systems
researchProduct

SearchBot: Supporting voice conversations with proactive search

2018

Searching during conversations and social interactions is becoming increasingly common. Although searching could be helpful for solving arguments, building common ground, and reinforcing mutual assumptions, it can also cause inter-actional problems. Proactive search approaches can enrich conversations with additional information without neglecting the shared and established social norms of being attentive to ongoing interaction. This demo showcases SearchBot, a tool that minimizes the issues associated with the practice of searching during conversations. It accomplishes this by tracking conversational background speech and then providing continuous recommendations of related documents and e…

ta113Computer science05 social sciencesCommon ground020207 software engineering02 engineering and technologyVoice user interfaceHuman–computer interaction0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesProactive searchTracking (education)Background speechSpoken conversation support050107 human factorsVoice user interface
researchProduct

How Students Get Going : Triggers for Students’ Learning in Project-Based Education

2018

Repeatedly documented positive student responses to project-based learning during its decades-long tradition in CS attest to the effectiveness of learning by doing. Support for reflective learning nevertheless continues to be a topic worth studying because the intensity of project work together with a high technical orientation among CS students often complicate reflective practice. A critical incident-inspired assignment was added to a project-based course to support reflective practice in spring 2017. In a previous study, the authors analyzed how students approached the assignment and whether they found it supportive for learning. The present study content-analyses the situations that tri…

ta113Computer sciencegovernment.form_of_governmentReflective practice05 social sciences0211 other engineering and technologiesprojektioppiminen050301 education02 engineering and technologyProject-based learningLearning-by-doing (economics)Work (electrical)Project basedproject-based learningMathematics educationgovernmentlearning triggersStudent learning0503 educationCritical Incident Techniquereflektio021106 design practice & managementIncident reportreflection
researchProduct

Enterprise Architecture - To Business or Not to Business? That Is The Question!

2018

ta113Computer sciencetieto- ja viestintätekniikka05 social sciences0211 other engineering and technologiesEnterprise architecture02 engineering and technologyEngineering managementICTliiketoimintaenterprise architecture021105 building & construction0502 economics and businessscopekokonaisarkkitehtuuribusiness050203 business & managementProceedings of the 20th International Conference on Enterprise Information Systems
researchProduct