Search results for "Computer science"

showing 10 items of 22367 documents

H.264 QoS and Application Performance with Different Streaming Protocols

2015

Streaming techniques, including the selected streaming protocol, have an effect on the streaming quality. In this study, the performance of three different streaming protocols in a disturbed communication channel is evaluated with a modified version of the FFPlay player. A H.264 encoded video is used as a test sequence. The number of displayed image frames, the frame rate and playout duration are used as objective metrics for QoS. The metrics brings out differences of streaming protocols in our test environment. They are measured at the application level and have a connection to the user experience. peerReviewed

ta113Protocol (science)HLSbusiness.industryComputer sciencecomputer.internet_protocolQuality of serviceReal-time computingstreaming protocolsQoSFrame rateRTSPTest sequenceUser experience designRTMPReal Time Streaming ProtocolQoEH.264businesscomputerComputer networkProceedings of the 8th International Conference on Mobile Multimedia Communications
researchProduct

Evaluating the performance of artificial neural networks for the classification of freshwater benthic macroinvertebrates

2014

Abstract Macroinvertebrates form an important functional component of aquatic ecosystems. Their ability to indicate various types of anthropogenic stressors is widely recognized which has made them an integral component of freshwater biomonitoring. The use of macroinvertebrates in biomonitoring is dependent on manual taxa identification which is currently a time-consuming and cost-intensive process conducted by highly trained taxonomical experts. Automated taxa identification of macroinvertebrates is a relatively recent research development. Previous studies have displayed great potential for solutions to this demanding data mining application. In this research we have a collection of 1350 …

ta113Radial basis function networkEcologyArtificial neural networkComputer sciencebusiness.industryApplied MathematicsEcological Modelingta1172PerceptronMachine learningcomputer.software_genreBackpropagationComputer Science ApplicationsProbabilistic neural networkIdentification (information)Computational Theory and MathematicsModeling and SimulationMultilayer perceptronConjugate gradient methodta1181Artificial intelligencebusinesscomputerEcology Evolution Behavior and SystematicsEcological Informatics
researchProduct

Icons: Visual representation to enrich requirements engineering work

2013

Adapting icons in requirements engineering can support the multifaceted needs of stakeholders. Conventional ap- proaches to RE are mainly highlighted in diagrams. This paper introduces icon-based information as a way to represent ideas and concepts in the requirements engineering domain. We report on icon artifacts that support requirements engi- neering work such as priority types, status states and stakeholder kinds. We evaluate how users interpret meanings of icons and the efficacy of icon prototypes shaped to represent those requirements attributes. Our hypothesis is whether practitioners can recognize the icons’ meaning in terms of their functional representation. According to the empi…

ta113Requirements engineeringComputer scienceProcess (engineering)Interpretation (philosophy)Stakeholdervisuaalinen kieliikonitDomain (software engineering)Visual languagevaatimusmäärittelyHuman–computer interactionvisual languagekulttuuriiconsvaatimustenhallintaIconstakeholdercomputercomputer.programming_languageMeaning (linguistics)
researchProduct

Continuous Requirements Risk Profiling in Information Systems Development

2015

With the increasing adoption of agile, lean, and iterative development methods, information systems development (ISD) has become continuous, meaning that system development moves rapidly from release to release. This means that work practices and challenges that practitioners face have changed. Despite these changes, requirements development is still critical in ISD. However, IS literature is silent on how to manage requirements-related risks in the practice of continuous IS development. To fill this gap, we propose a continuous requirements risk profiling method. The study is informed by design science research methodology, and we apply focus group interviews and a Delphi study for data co…

ta113Requirements managementIterative and incremental developmentProcess managementKnowledge managementbusiness.industryComputer sciencerisk profilingRisk management information systemsvaatimusmäärittelytinformation systemsrisk managementinformation systems developmentohjelmistosuunnitteluSoftwareISDInformation systemriskianalyysiohjelmistokehitysbusinessDesign methodsRisk managementsoftware engineeringtietojärjestelmätAgile software development2015 48th Hawaii International Conference on System Sciences
researchProduct

An Information Systems Design Product Theory for Integrated Requirements, Test and Defect Management Systems

2012

Software companies need to develop high-quality products fast and with low cost. Development activities are typically distributed in different places and involve multiple stakeholders in different countries. Testing is an important way to ensure product quality but it is costly and takes ample time and resources. Sourcing testing services from specialized service providers is often the most viable option for software businesses. Flexible and effective test process management is especially vital to support the testing life-cycle when external testing service providers are involved. Yet, the extant literature provides little theoretical guidance for managing the testing life-cycle, including …

ta113Requirements managementTest strategyKnowledge managementProcess managementService product managementOffshoringTest managementComputer sciencebusiness.industrySystem testingSoftware performance testingService providerSoftware qualityOutsourcingSoftwareAcceptance testingPerformance engineeringManagement systemInformation systemNon-functional testingOperational acceptance testingbusinessSystem integration testing2012 45th Hawaii International Conference on System Sciences
researchProduct

BioImageXD: an open, general-purpose and high-throughput image-processing platform

2012

BioImageXD puts open-source computer science tools for three-dimensional visualization and analysis into the hands of all researchers, through a user-friendly graphical interface tuned to the needs of biologists. BioImageXD has no restrictive licenses or undisclosed algorithms and enables publication of precise, reproducible and modifiable workflows. It allows simple construction of processing pipelines and should enable biologists to perform challenging analyses of complex processes. We demonstrate its performance in a study of integrin clustering in response to selected inhibitors.

ta113SIMPLE (military communications protocol)Computer sciencebusiness.industryta1182Computational BiologyImage processingCell BiologyBioinformaticsBiochemistryVisualizationHigh-Throughput Screening AssaysUser-Computer InterfaceSoftwareWorkflowImaging Three-DimensionalHuman–computer interactionbusinessCluster analysisMolecular BiologyThroughput (business)AlgorithmsSoftwareBiotechnologyGraphical user interfaceNATURE METHODS
researchProduct

An efficient cluster-based outdoor user positioning using LTE and WLAN signal strengths

2015

In this paper we propose a novel cluster-based RF fingerprinting method for outdoor user-equipment (UE) positioning using both LTE and WLAN signals. It uses a simple cost effective agglomerative hierarchical clustering with Davies-Bouldin criterion to select the optimal cluster number. The positioning method does not require training signature formation prior to UE position estimation phase. It is capable of reducing the search space for clustering operation by using LTE cell-ID searching criteria. This enables the method to estimate UE positioning in short time with less computational expense. To validate the cluster-based positioning real-time field measurements were collected using readi…

ta113SIMPLE (military communications protocol)business.industryComputer scienceReal-time computingLTE cell-IDFingerprint recognitionGridminimization of drive testsDetermining the number of clusters in a data setEmbedded systemgrid-based RF fingerprintingRadio frequencybusinessCluster analysishierarchical clustering
researchProduct

Using Video Conferencing and Video Recordings for Upper Secondary Distance Teaching: Teachers' View Points

2016

In Finland the “Isoverstas” (formely ISOverkosto) network of schools coordinates the development of upper secondary distance learning services. The community actually is quite extensive with 65 member schools. In this paper we introduce the results related using synchronous and asynchronous online video resources for distance teaching. The topic is approached broadly at the level of schools and different support services as well as the pedagogical practices of individual teachers. The research data consists of wiki stories written by teachers, the interviews of selected teachers, and an online survey. Data-based content analysis was chosen as the main analysis method with the aim of highlig…

ta113Secondary levelpedagogyMultimediabusiness.industryComputer scienceDistance teachingtoisen asteen koulutuscomputer.software_genrepedagogiikkaVideoconferencingICTdistance educationsecondary educationComputingMilieux_COMPUTERSANDEDUCATIONta516Computer visionArtificial intelligencebusinessdevelopment communitycomputer
researchProduct

A Serendipity-Oriented Greedy Algorithm for Recommendations

2017

Most recommender systems suggest items to a user that are popular among all users and similar to items the user usually consumes. As a result, a user receives recommendations that she/he is already familiar with or would find anyway, leading to low satisfaction. To overcome this problem, a recommender system should suggest novel, relevant and unexpected, i.e. serendipitous items. In this paper, we propose a serendipity-oriented algorithm, which improves serendipity through feature diversification and helps overcome the overspecialization problem. To evaluate our algorithm and compare it with others, we employ a serendipity metric that captures each component of serendipity, unlike the most …

ta113SerendipityComputer sciencebusiness.industrysuosittelujärjestelmät020207 software engineeringserendipity02 engineering and technologyalgorithmsunexpectednessnoveltyalgoritmit0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencerecommender systemsGreedy algorithmbusinessGreedy randomized adaptive search procedure
researchProduct

An Information System Design Product Theory for Integrated Order, Transportation and Warehouse Management Systems

2013

Globalization, lead time reduction and cost pressures, and other factors make it nontrivial for most companies to devise and manage effective logistics services to meet client requirements. They are better off using the services of specialized third party logistics service providers. These providers compete fiercely and need to develop and improve their services continuously to gain competitive advantage. Integrating the logistics process for improving communication and coordination is the most feasible way for third party logistics providers to deal with these pressures. Yet, the extant literature provides little theoretical guidance for integrating the logistics life-cycle, including orde…

ta113Service (business)Humanitarian LogisticsProcess managementKnowledge managementbusiness.industryComputer scienceService providerCompetitive advantageOutsourcingGlobalizationInformation systemOrder processingIntegrated logistics supportbusinessLead time2013 46th Hawaii International Conference on System Sciences
researchProduct