Search results for "Computer science"
showing 10 items of 22367 documents
Biomass estimator for NIR image with a few additional spectral band images taken from light UAS
2012
A novel way to produce biomass estimation will offer possibilities for precision farming. Fertilizer prediction maps can be made based on accurate biomass estimation generated by a novel biomass estimator. By using this knowledge, a variable rate amount of fertilizers can be applied during the growing season. The innovation consists of light UAS, a high spatial resolution camera, and VTT's novel spectral camera. A few properly selected spectral wavelengths with NIR images and point clouds extracted by automatic image matching have been used in the estimation. The spectral wavelengths were chosen from green, red, and NIR channels.
Introduction of Multiflow for HSDPA
2012
This paper introduces a multi-cell transmission scheme for High-Speed Downlink Packet Access (HSDPA) networks, called Multiflow. In this concept, downlink data is transmitted to a user terminal at the border of two cells from one or both of the cells. The cells may belong to same NodeB or to two different NodeBs. The data flows are separated by different scrambling codes used by each associated cell, thus the flows can be treated independently. This provides increased multi-user diversity by means of flexibility in downlink resource management, in addition to the spatial diversity of multiple transmission locations. Another important gain mechanism for this scheme is realized by short-term …
Adaptive framework for network traffic classification using dimensionality reduction and clustering
2012
Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then …
Software-as-a-Service Revenue Models
2013
This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations.
How Students Get Going : Triggers for Students’ Learning in Project-Based Education
2018
Repeatedly documented positive student responses to project-based learning during its decades-long tradition in CS attest to the effectiveness of learning by doing. Support for reflective learning nevertheless continues to be a topic worth studying because the intensity of project work together with a high technical orientation among CS students often complicate reflective practice. A critical incident-inspired assignment was added to a project-based course to support reflective practice in spring 2017. In a previous study, the authors analyzed how students approached the assignment and whether they found it supportive for learning. The present study content-analyses the situations that tri…
Is My Office 365 GDPR Compliant? : Security Issues in Authentication and Administration
2018
The General Data Protection Regulation, commonly referred as GDPR, will be enforced in all European Union countries in May 2018. GDPR sets requirements for processing EU citizens’ personal data regardless of the physical location of the organisation processing the data. Over 40 percent of European organisations are using Office 365. Microsoft claims that Office 365 service is GDPR compliant, and has provided tools to help Office 365 customers to ensure their GDPR compliancy. In this paper, we present some security issues related to the very foundation of Office 365 service, namely Azure Active Directory and administrative tools, and assess their GDPR compliancy. Our findings reveal that per…
A Network-Based Framework for Mobile Threat Detection
2018
Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…
Enterprise Architecture - To Business or Not to Business? That Is The Question!
2018
DOBRO : a prediction error correcting robot under drifts
2016
We propose DOBRO, a light online learning module, which is equipped with a smart correction policy helping making decision to correct or not the given prediction depending on how likely the correction will lead to a better prediction performance. DOBRO is a standalone module requiring nothing more than a time series of prediction errors and it is flexible to be integrated into any black-box model to improve its performance under drifts. We performed evaluation in a real-world application with bus arrival time prediction problem. The obtained results show that DOBRO improved prediction performance significantly meanwhile it did not hurt the accuracy when drift does not happen.
Measuring Distraction at the Levels of Tactical and Strategic Control: The Limits of Capacity-Based Measures for Revealing Unsafe Visual Sampling Mod…
2011
The control theory of driving suggests that driver distraction can be analyzed as a breakdown of control at three levels. Common approach for analyzing distraction experimentally is to utilize capacity-based measures to assess distraction at the level of operational control. Three driving simulation experiments with 61 participants were organized to evaluate which kind of measures could be used to analyze drivers' tactical visual sampling models and the related effects of distraction while searching textual information on in-car display. The effects of two different text types were evaluated. The utilized capacity-based measures seemed to be insufficient for revealing participants' tactical…