Search results for "Computer science"

showing 10 items of 22367 documents

Biomass estimator for NIR image with a few additional spectral band images taken from light UAS

2012

A novel way to produce biomass estimation will offer possibilities for precision farming. Fertilizer prediction maps can be made based on accurate biomass estimation generated by a novel biomass estimator. By using this knowledge, a variable rate amount of fertilizers can be applied during the growing season. The innovation consists of light UAS, a high spatial resolution camera, and VTT's novel spectral camera. A few properly selected spectral wavelengths with NIR images and point clouds extracted by automatic image matching have been used in the estimation. The spectral wavelengths were chosen from green, red, and NIR channels.

ta113Computer scienceFabry-Perotprecision farmingNear-infrared spectroscopyPoint cloudEstimatorBiomassSpectral bandsNIRBiomass estimationfertilizerestimatorWavelength/dk/atira/pure/sustainabledevelopmentgoals/zero_hungerPrecision agriculturespectral imagerSDG 2 - Zero HungerImage resolutionRemote sensingProceedings of SPIE
researchProduct

Introduction of Multiflow for HSDPA

2012

This paper introduces a multi-cell transmission scheme for High-Speed Downlink Packet Access (HSDPA) networks, called Multiflow. In this concept, downlink data is transmitted to a user terminal at the border of two cells from one or both of the cells. The cells may belong to same NodeB or to two different NodeBs. The data flows are separated by different scrambling codes used by each associated cell, thus the flows can be treated independently. This provides increased multi-user diversity by means of flexibility in downlink resource management, in addition to the spatial diversity of multiple transmission locations. Another important gain mechanism for this scheme is realized by short-term …

ta113Computer scienceNetwork packetbusiness.industryHSDPALoad balancing (computing)Antenna diversityMonipistelähetysScramblingHandoverTelecommunications linkNetwork performanceNodeBbusinessMultipoint transmissionComputer network2012 5th International Conference on New Technologies, Mobility and Security (NTMS)
researchProduct

Adaptive framework for network traffic classification using dimensionality reduction and clustering

2012

Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then …

ta113Computer scienceNetwork securitybusiness.industryDimensionality reductionintrusion detectionk-meansdiffusion mapServer logcomputer.software_genreanomaly detectionTraffic classificationkoneoppiminenWeb log analysis softwareAnomaly detectionData miningWeb servicetiedonlouhintaCluster analysisbusinesscomputern-grams
researchProduct

Software-as-a-Service Revenue Models

2013

This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations.

ta113Computer sciencebusiness.industrycomputer.internet_protocolSoftware as a serviceSoftware developmentInformation technologyCloud computingService-oriented architectureComputer securitycomputer.software_genreComputer Science ApplicationsEngineering managementRevenue modelHardware and ArchitectureRevenue assuranceYield managementbusinesscomputerSoftwareIT Professional
researchProduct

How Students Get Going : Triggers for Students’ Learning in Project-Based Education

2018

Repeatedly documented positive student responses to project-based learning during its decades-long tradition in CS attest to the effectiveness of learning by doing. Support for reflective learning nevertheless continues to be a topic worth studying because the intensity of project work together with a high technical orientation among CS students often complicate reflective practice. A critical incident-inspired assignment was added to a project-based course to support reflective practice in spring 2017. In a previous study, the authors analyzed how students approached the assignment and whether they found it supportive for learning. The present study content-analyses the situations that tri…

ta113Computer sciencegovernment.form_of_governmentReflective practice05 social sciences0211 other engineering and technologiesprojektioppiminen050301 education02 engineering and technologyProject-based learningLearning-by-doing (economics)Work (electrical)Project basedproject-based learningMathematics educationgovernmentlearning triggersStudent learning0503 educationCritical Incident Techniquereflektio021106 design practice & managementIncident reportreflection
researchProduct

Is My Office 365 GDPR Compliant? : Security Issues in Authentication and Administration

2018

The General Data Protection Regulation, commonly referred as GDPR, will be enforced in all European Union countries in May 2018. GDPR sets requirements for processing EU citizens’ personal data regardless of the physical location of the organisation processing the data. Over 40 percent of European organisations are using Office 365. Microsoft claims that Office 365 service is GDPR compliant, and has provided tools to help Office 365 customers to ensure their GDPR compliancy. In this paper, we present some security issues related to the very foundation of Office 365 service, namely Azure Active Directory and administrative tools, and assess their GDPR compliancy. Our findings reveal that per…

ta113Computer scienceinformation securityOffice 365Microsoft OfficeComputer securitycomputer.software_genreAuthentication (law)pilvipalvelutGDPRtietoturvacomputerAdministration (government)Azure
researchProduct

A Network-Based Framework for Mobile Threat Detection

2018

Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…

ta113Computer scienceintrusion detectionmobile threatsFeature extractionEvasion (network security)concept-driftAdversaryComputer securitycomputer.software_genreFlow networkMobile malwareanomaly detectionVariety (cybernetics)haittaohjelmatmachine learningkoneoppiminenmobiililaitteetMalwaretietoturvacomputerHumanoid robot
researchProduct

Enterprise Architecture - To Business or Not to Business? That Is The Question!

2018

ta113Computer sciencetieto- ja viestintätekniikka05 social sciences0211 other engineering and technologiesEnterprise architecture02 engineering and technologyEngineering managementICTliiketoimintaenterprise architecture021105 building & construction0502 economics and businessscopekokonaisarkkitehtuuribusiness050203 business & managementProceedings of the 20th International Conference on Enterprise Information Systems
researchProduct

DOBRO : a prediction error correcting robot under drifts

2016

We propose DOBRO, a light online learning module, which is equipped with a smart correction policy helping making decision to correct or not the given prediction depending on how likely the correction will lead to a better prediction performance. DOBRO is a standalone module requiring nothing more than a time series of prediction errors and it is flexible to be integrated into any black-box model to improve its performance under drifts. We performed evaluation in a real-world application with bus arrival time prediction problem. The obtained results show that DOBRO improved prediction performance significantly meanwhile it did not hurt the accuracy when drift does not happen.

ta113Concept driftComputer scienceMean squared prediction error02 engineering and technologyARIMAconcept drifton-line prediction error correction020204 information systems0202 electrical engineering electronic engineering information engineeringRobot020201 artificial intelligence & image processingAutoregressive integrated moving averageSimulation
researchProduct

Measuring Distraction at the Levels of Tactical and Strategic Control: The Limits of Capacity-Based Measures for Revealing Unsafe Visual Sampling Mod…

2011

The control theory of driving suggests that driver distraction can be analyzed as a breakdown of control at three levels. Common approach for analyzing distraction experimentally is to utilize capacity-based measures to assess distraction at the level of operational control. Three driving simulation experiments with 61 participants were organized to evaluate which kind of measures could be used to analyze drivers' tactical visual sampling models and the related effects of distraction while searching textual information on in-car display. The effects of two different text types were evaluated. The utilized capacity-based measures seemed to be insufficient for revealing participants' tactical…

ta113Control theory (sociology)Article SubjectComputer scienceControl (management)Sampling (statistics)Workloadlcsh:QA75.5-76.95Task (project management)Human-Computer InteractionSAFERDistractionStrategic controllcsh:Electronic computers. Computer scienceSimulationCognitive psychologyAdvances in Human-Computer Interaction
researchProduct