Search results for "Computer science"
showing 10 items of 22367 documents
H.264 QoS and Application Performance with Different Streaming Protocols
2015
Streaming techniques, including the selected streaming protocol, have an effect on the streaming quality. In this study, the performance of three different streaming protocols in a disturbed communication channel is evaluated with a modified version of the FFPlay player. A H.264 encoded video is used as a test sequence. The number of displayed image frames, the frame rate and playout duration are used as objective metrics for QoS. The metrics brings out differences of streaming protocols in our test environment. They are measured at the application level and have a connection to the user experience. peerReviewed
Evaluating the performance of artificial neural networks for the classification of freshwater benthic macroinvertebrates
2014
Abstract Macroinvertebrates form an important functional component of aquatic ecosystems. Their ability to indicate various types of anthropogenic stressors is widely recognized which has made them an integral component of freshwater biomonitoring. The use of macroinvertebrates in biomonitoring is dependent on manual taxa identification which is currently a time-consuming and cost-intensive process conducted by highly trained taxonomical experts. Automated taxa identification of macroinvertebrates is a relatively recent research development. Previous studies have displayed great potential for solutions to this demanding data mining application. In this research we have a collection of 1350 …
Icons: Visual representation to enrich requirements engineering work
2013
Adapting icons in requirements engineering can support the multifaceted needs of stakeholders. Conventional ap- proaches to RE are mainly highlighted in diagrams. This paper introduces icon-based information as a way to represent ideas and concepts in the requirements engineering domain. We report on icon artifacts that support requirements engi- neering work such as priority types, status states and stakeholder kinds. We evaluate how users interpret meanings of icons and the efficacy of icon prototypes shaped to represent those requirements attributes. Our hypothesis is whether practitioners can recognize the icons’ meaning in terms of their functional representation. According to the empi…
Continuous Requirements Risk Profiling in Information Systems Development
2015
With the increasing adoption of agile, lean, and iterative development methods, information systems development (ISD) has become continuous, meaning that system development moves rapidly from release to release. This means that work practices and challenges that practitioners face have changed. Despite these changes, requirements development is still critical in ISD. However, IS literature is silent on how to manage requirements-related risks in the practice of continuous IS development. To fill this gap, we propose a continuous requirements risk profiling method. The study is informed by design science research methodology, and we apply focus group interviews and a Delphi study for data co…
An Information Systems Design Product Theory for Integrated Requirements, Test and Defect Management Systems
2012
Software companies need to develop high-quality products fast and with low cost. Development activities are typically distributed in different places and involve multiple stakeholders in different countries. Testing is an important way to ensure product quality but it is costly and takes ample time and resources. Sourcing testing services from specialized service providers is often the most viable option for software businesses. Flexible and effective test process management is especially vital to support the testing life-cycle when external testing service providers are involved. Yet, the extant literature provides little theoretical guidance for managing the testing life-cycle, including …
BioImageXD: an open, general-purpose and high-throughput image-processing platform
2012
BioImageXD puts open-source computer science tools for three-dimensional visualization and analysis into the hands of all researchers, through a user-friendly graphical interface tuned to the needs of biologists. BioImageXD has no restrictive licenses or undisclosed algorithms and enables publication of precise, reproducible and modifiable workflows. It allows simple construction of processing pipelines and should enable biologists to perform challenging analyses of complex processes. We demonstrate its performance in a study of integrin clustering in response to selected inhibitors.
An efficient cluster-based outdoor user positioning using LTE and WLAN signal strengths
2015
In this paper we propose a novel cluster-based RF fingerprinting method for outdoor user-equipment (UE) positioning using both LTE and WLAN signals. It uses a simple cost effective agglomerative hierarchical clustering with Davies-Bouldin criterion to select the optimal cluster number. The positioning method does not require training signature formation prior to UE position estimation phase. It is capable of reducing the search space for clustering operation by using LTE cell-ID searching criteria. This enables the method to estimate UE positioning in short time with less computational expense. To validate the cluster-based positioning real-time field measurements were collected using readi…
Using Video Conferencing and Video Recordings for Upper Secondary Distance Teaching: Teachers' View Points
2016
In Finland the “Isoverstas” (formely ISOverkosto) network of schools coordinates the development of upper secondary distance learning services. The community actually is quite extensive with 65 member schools. In this paper we introduce the results related using synchronous and asynchronous online video resources for distance teaching. The topic is approached broadly at the level of schools and different support services as well as the pedagogical practices of individual teachers. The research data consists of wiki stories written by teachers, the interviews of selected teachers, and an online survey. Data-based content analysis was chosen as the main analysis method with the aim of highlig…
A Serendipity-Oriented Greedy Algorithm for Recommendations
2017
Most recommender systems suggest items to a user that are popular among all users and similar to items the user usually consumes. As a result, a user receives recommendations that she/he is already familiar with or would find anyway, leading to low satisfaction. To overcome this problem, a recommender system should suggest novel, relevant and unexpected, i.e. serendipitous items. In this paper, we propose a serendipity-oriented algorithm, which improves serendipity through feature diversification and helps overcome the overspecialization problem. To evaluate our algorithm and compare it with others, we employ a serendipity metric that captures each component of serendipity, unlike the most …
An Information System Design Product Theory for Integrated Order, Transportation and Warehouse Management Systems
2013
Globalization, lead time reduction and cost pressures, and other factors make it nontrivial for most companies to devise and manage effective logistics services to meet client requirements. They are better off using the services of specialized third party logistics service providers. These providers compete fiercely and need to develop and improve their services continuously to gain competitive advantage. Integrating the logistics process for improving communication and coordination is the most feasible way for third party logistics providers to deal with these pressures. Yet, the extant literature provides little theoretical guidance for integrating the logistics life-cycle, including orde…