Search results for "Computer science"
showing 10 items of 22367 documents
Critical Analysis on the NHTSA Acceptance Criteria for In-Vehicle Electronic Devices
2014
We tested a commercial in-car navigation system prototype against the NHTSA criteria for acceptance testing of in-vehicle electronic devices, in order to see what types of in-car tasks fail the acceptance test and why. In addition, we studied the visual demands of the driving scenario recommended by NHTSA for task acceptance testing. In the light of the results, NHTSA guidelines and acceptance criteria need to be further developed. In particular visual demands of the driving scenario and for different simulators need to be standardized in order to enable fair testing and comparable test results. We suggest the visual occlusion method for finding a driving scenario that corresponds better wi…
Semantic Portal as a Tool for Structural Reform of the Ukrainian Educational System
2014
Education is recognized as a fundamental enabler of human development. The adoption of information and communications technologies (ICTs) by education (especially in developing countries) contributes to educational system reforms, in addition to the traditional advantages, such as social openness and accessibility. Yet the academic community has not studied sufficiently the challenging context in which ICTs are used as instruments for the reform of inefficient, and sometimes even corrupted, educational systems rather than just as means for smarter classrooms, remote access, or content management. The object of this study is Ukrainian higher education (HE) and its quality assurance (QA) syst…
Supporting Institutional Awareness and Academic Advising using Clustered Study Profiles
2017
The purpose of academic advising is to help students with developing educational plans that support their academic career and personal goals, and to provide information and guidance on studies. Planning and management of the students’ study path is the main joint activity in advising. Based on a study log of passed courses, we propose to use robust, prototype-based clustering to identify a set of actual study path profiles. Such profiles identify groups of students with similar progress of studies, whose analysis and interpretation can be used for better institutional awareness and to support evidence-based academic advising. A model of automated academic advising system utilizing the possi…
First Year Computing Students' Perceptions of Authenticity in Assessment
2017
The problem of how best to assess student learning is a fundamental one in education. Changes to computer science curricula seek to emphasise teaching practices that promote deep learning through direct, contextual examination of student performance on tasks that resemble those of practitioners, rather than more traditional methods. This kind of "authentic assessment" is becoming more popular as it appears to incorporate employability skills associated with professional practice into the curriculum in a natural way. In this paper, we report on an investigation into how computing students themselves understand the terminology of authentic assessment. We give a brief summary of some of the sa…
Revealing Fake Profiles in Social Networks by Longitudinal Data Analysis
2017
Using VIS/NIR and IR spectral cameras for detecting and separating crime scene details
2012
Detecting invisible details and separating mixed evidence is critical for forensic inspection. If this can be done reliably and fast at the crime scene, irrelevant objects do not require further examination at the laboratory. This will speed up the inspection process and release resources for other critical tasks. This article reports on tests which have been carried out at the University of Jyväskylä in Finland together with the Central Finland Police Department and the National Bureau of Investigation for detecting and separating forensic details with hyperspectral technology. In the tests evidence was sought after at an assumed violent burglary scene with the use of VTT's 500-900 nm wave…
Feature Extractors for Describing Vehicle Routing Problem Instances
2016
The vehicle routing problem comes in varied forms. In addition to usual variants with diverse constraints and specialized objectives, the problem instances themselves – even from a single shared source - can be distinctly different. Heuristic, metaheuristic, and hybrid algorithms that are typically used to solve these problems are sensitive to this variation and can exhibit erratic performance when applied on new, previously unseen instances. To mitigate this, and to improve their applicability, algorithm developers often choose to expose parameters that allow customization of the algorithm behavior. Unfortunately, finding a good set of values for these parameters can be a tedious task that…
Modelling Recurrent Events for Improving Online Change Detection
2016
The task of online change point detection in sensor data streams is often complicated due to presence of noise that can be mistaken for real changes and therefore affecting performance of change detectors. Most of the existing change detection methods assume that changes are independent from each other and occur at random in time. In this paper we study how performance of detectors can be improved in case of recurrent changes. We analytically demonstrate under which conditions and for how long recurrence information is useful for improving the detection accuracy. We propose a simple computationally efficient message passing procedure for calculating a predictive probability distribution of …
Identity Use and Misuse of Public Persona on Twitter
2016
Social media sites have appeared during the last 10 years and their use has exploded all over the world. Twitter is a microblogging service that has currently 320 million user profiles and over 100 million daily active users. Many celebrities and leading politicians have a verified profile on Twitter, including Justin Bieber, president Obama, and the Pope. In this paper we investigate the '‘hundreds of Putins and Obamas phenomenon’ on Twitter. We collected two data sets in 2015 containing 582 and 6477 profiles that are related to the G20 leaders’ profiles on Twitter. The number of namesakes varied from 5 to 1000 per leader. We analysed in detail various aspects of the Putin and Erdogan rela…
Does the Learning Channel Really Matter? - Insights from Commercial Online ICT-training
2017
Evolving ICT has provided new options to participate to training. Online participation has been found to be cost effective, helping people to deal with the time and cost pressures they are facing on their jobs. Previous studies conducted in higher education sector indicates that student satisfaction or learning outcomes does not differ between online and classroom participants. However, little is known what is the situation in commercial ICT-training. This paper studied course feedbacks from courses having both online and classroom participants of a commercial ICT-training provider. Results revealed that the learning channel has no effect on satisfaction, perceived teacher’s substance and t…