Search results for "A1"

showing 10 items of 6089 documents

Does the Learning Channel Really Matter? - Insights from Commercial Online ICT-training

2017

Evolving ICT has provided new options to participate to training. Online participation has been found to be cost effective, helping people to deal with the time and cost pressures they are facing on their jobs. Previous studies conducted in higher education sector indicates that student satisfaction or learning outcomes does not differ between online and classroom participants. However, little is known what is the situation in commercial ICT-training. This paper studied course feedbacks from courses having both online and classroom participants of a commercial ICT-training provider. Results revealed that the learning channel has no effect on satisfaction, perceived teacher’s substance and t…

ta113online trainingMultimediaComputer scienceonline learningverkko-oppiminencomputer.software_genreTraining (civil)learning channelsverkko-opiskeluInformation and Communications TechnologyComputingMilieux_COMPUTERSANDEDUCATIONta516verkko-opetuscomputerCommunication channelProceedings of the 9th International Conference on Computer Supported Education
researchProduct

Habituating Students to IPR Questions During Creative Project Work

2017

ta113opiskelijatstudentscopyrightprojektioppiminenopen dataintellectual property lawCreative projecttekijänoikeusWork (electrical)project learningimmateriaalioikeusEngineering ethicsta516Sociologyavoin tieto
researchProduct

CONSIDERING VARIOUS STAKEHOLDERS’ VIEWS IN THE DESIGN OF A HYBRID STEM LEARNING ENVIRONMENT - PERCEPTIONS FROM FINLAND AND GREECE

2017

Raising young people’s interest in studies and careers related to science, technology, engineering, and mathematics (i.e., STEM) is an important societal concern both at European and global level. We argue that the creation of attractive and engaging STEM learning environments necessitates involvement of learners, educators, parents, and STEM professionals in their design. In this paper, we will present a study in which primary, lower and upper secondary school students, teachers, school directors, parents, and STEM professionals in Finland (n = 27) and Greece (n = 24) were invited in the participatory co-design of a hybrid (virtual, physical, formal, and informal) STEM learning environment…

ta113oppimisympäristöbusiness.industry4. Educationmedia_common.quotation_subjectEnvironmental resource managementGeographyPerceptionlearning environmentStem learningta516hybrid steam learningbusinessEnvironmental planningmedia_common
researchProduct

Methods for estimating forest stem volumes by tree species using digital surface model and CIR images taken from light UAS

2012

In this paper we consider methods for estimating forest tree stem volumes by species using images taken from light unmanned aircraft systems (UAS). Instead of using LiDAR and additional multiband imagery a color infrared camera mounted to a light UAS is used to acquire both imagery and the DSM of target area. The goal of this study is to accurately estimate tree stem volumes in three classes. The status of the ongoing work is described and an initial method for delineating and classifying treetops is presented.

ta113precision agriculturebusiness.industryComputer scienceUAVtarget detectionPiezo actuatorsmedical imagingairborneFabry-Perot Interferometerimaging spectrometerTree (data structure)Hyperspectral sensorsLidarRemote sensing (archaeology)Computer visionArtificial intelligencemultispectral image sensorsDigital surfacebusinessTree speciesRemote sensingProceedings of SPIE
researchProduct

An Efficient Network Log Anomaly Detection System Using Random Projection Dimensionality Reduction

2014

Network traffic is increasing all the time and network services are becoming more complex and vulnerable. To protect these networks, intrusion detection systems are used. Signature-based intrusion detection cannot find previously unknown attacks, which is why anomaly detection is needed. However, many new systems are slow and complicated. We propose a log anomaly detection framework which aims to facilitate quick anomaly detection and also provide visualizations of the network traffic structure. The system preprocesses network logs into a numerical data matrix, reduces the dimensionality of this matrix using random projection and uses Mahalanobis distance to find outliers and calculate an a…

ta113random projectionMahalanobis distanceComputer sciencebusiness.industryAnomaly-based intrusion detection systemintrusion detectionDimensionality reductionRandom projectionPattern recognitionIntrusion detection systemcomputer.software_genrekoneoppiminenAnomaly detectionData miningArtificial intelligencetiedonlouhintaAnomaly (physics)mahalanobis distancebusinesscomputerCurse of dimensionality2014 6th International Conference on New Technologies, Mobility and Security (NTMS)
researchProduct

Recommending Serendipitous Items using Transfer Learning

2018

Most recommender algorithms are designed to suggest relevant items, but suggesting these items does not always result in user satisfaction. Therefore, the efforts in recommender systems recently shifted towards serendipity, but generating serendipitous recommendations is difficult due to the lack of training data. To the best of our knowledge, there are many large datasets containing relevance scores (relevance oriented) and only one publicly available dataset containing a relatively small number of serendipity scores (serendipity oriented). This limits the learning capabilities of serendipity oriented algorithms. Therefore, in the absence of any known deep learning algorithms for recommend…

ta113recommender systemInformation retrievalTraining setArtificial neural networkComputer sciencebusiness.industrySerendipityDeep learningsuosittelujärjestelmätdeep learning020207 software engineeringserendipity02 engineering and technologyRecommender systemtransfer learningalgorithmskoneoppiminenalgoritmit0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRelevance (information retrieval)Artificial intelligenceTransfer of learningbusiness
researchProduct

Data mining framework for random access failure detection in LTE networks

2014

Sleeping cell problem is a particular type of cell degradation. There are various software and hardware reasons that might cause such kind of cell outage. In this study a cell becomes sleeping because of Random Access Channel (RACH) failure. This kind of network problem can appear due to misconfiguration, excessive load or software/firmware problem at the Base Station (BS). In practice such failure might cause network performance degradation, which is hardly traceable by an operator. In this paper we present a data mining based framework for the detection of problematic cells. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving BS. The choice of N i…

ta113sleeping cell problembusiness.industryComputer scienceFirmwareHeuristic (computer science)Event (computing)Reliability (computer networking)data miningLTE networkscomputer.software_genreBase stationRandom-access channelUser equipmentData miningbusinessrandom access channelcomputerRandom accessComputer network2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC)
researchProduct

Towards enabling privacy preserving smart city apps

2016

Smart city applications are increasingly relying on personally identifiable data. A disclosure of such a data to a platform provider and possible 3rd parties represents a risk to the privacy of the application users. To mitigate the privacy risk, two-layer privacy-preserving platform architecture is introduced, wherein the personally identifiable information is dealt with at the inner layer (executed in a trusted environment), whereas only generic and personally unidentifiable information is made available to the apps at the outer layer of the architecture — e.g., in a form of app-specific events. The essential requirements for the platform are described, and the architectural implications …

ta113smart city application platformInformation privacyPrivacy by DesignComputer sciencebusiness.industryPrivacy softwareMultitier architectureInternet privacy020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreprivacylayered architecture020204 information systemsSmart city0202 electrical engineering electronic engineering information engineeringLayer (object-oriented design)ArchitecturebusinessPersonally identifiable informationcomputerpersonally identifiable information
researchProduct

Essence : Reference Architecture for Software Engineering - Representing Essence in Archimate Notation

2018

Essence is a standard for working with methods in software engineering. As such, it can be seen as the reference architecture for software engineering. The Essence consists of the Kernel, and a notation called the Language. This representation is not widely known and likely hinders the adoption of the Essence. This paper represents the work-in-progress of representing the Essence using ArchiMate, the de facto notation for enterprise architecture. Our purpose is to help organisations to adopt Essence by representing it in the language already understood by different stakeholders. peerReviewed

ta113software development methodbusiness.industryComputer scienceSEMAT020206 networking & telecommunications020207 software engineering02 engineering and technologyNotationessenceArchiMatekernel0202 electrical engineering electronic engineering information engineeringReference architectureSoftware engineeringbusinessohjelmistokehitys
researchProduct

Customer Perception Driven Product Evolution - Facilitation of Structured Feedback Collection

2016

Competitive environment not only requires effective advertising strategies from the product producers and service providers, but also to do comprehensive and sufficient analysis of their customers to understand their needs and expectations. Successfully involving customers into a product/service co-creation process, companies more likely increase their future revenue. Customer feedback analysis is widely applied in marketing and product development. Among other challenges (e.g. customer engagement, feedback collection, etc.) automation of customer feedback analysis becomes very demanding task and requires advance intelligent tools to understand customers’ product perception and preferences.…

ta113structured feedback collectionKnowledge managementComputer sciencebusiness.industry05 social sciencessemantic customer feedbackCustomer perception02 engineering and technologycustomer analytics020204 information systems0502 economics and businesssemantic personalization0202 electrical engineering electronic engineering information engineeringFacilitation050211 marketingProduct (category theory)businesstriple generation supportproduct customizationProceedings of the 12th International Conference on Web Information Systems and Technologies
researchProduct