Search results for "Computer science"

showing 10 items of 22367 documents

Critical Analysis on the NHTSA Acceptance Criteria for In-Vehicle Electronic Devices

2014

We tested a commercial in-car navigation system prototype against the NHTSA criteria for acceptance testing of in-vehicle electronic devices, in order to see what types of in-car tasks fail the acceptance test and why. In addition, we studied the visual demands of the driving scenario recommended by NHTSA for task acceptance testing. In the light of the results, NHTSA guidelines and acceptance criteria need to be further developed. In particular visual demands of the driving scenario and for different simulators need to be standardized in order to enable fair testing and comparable test results. We suggest the visual occlusion method for finding a driving scenario that corresponds better wi…

ta113kosketusnäyttödriver distractionComputer scienceNavigation systemvisual demandReliability engineeringTest (assessment)Task (project management)Variety (cybernetics)Acceptance testingnavigation systemElectronicsDuration (project management)test performanceVisual occlusionSimulationacceptance criteriavisual occlusion
researchProduct

Semantic Portal as a Tool for Structural Reform of the Ukrainian Educational System

2014

Education is recognized as a fundamental enabler of human development. The adoption of information and communications technologies (ICTs) by education (especially in developing countries) contributes to educational system reforms, in addition to the traditional advantages, such as social openness and accessibility. Yet the academic community has not studied sufficiently the challenging context in which ICTs are used as instruments for the reform of inefficient, and sometimes even corrupted, educational systems rather than just as means for smarter classrooms, remote access, or content management. The object of this study is Ukrainian higher education (HE) and its quality assurance (QA) syst…

ta113laadunvarmistusKnowledge managementPublic AdministrationHigher educationbusiness.industryquality assuranceDevelopmentHuman development (humanity)Computer Science ApplicationsDigital ecosystemhuman developmentInformation and Communications Technologyhigher educationEnablingOpenness to experiencesemantic portalUkrainebusinessQuality assuranceContent managementInformation Technology for Development
researchProduct

Supporting Institutional Awareness and Academic Advising using Clustered Study Profiles

2017

The purpose of academic advising is to help students with developing educational plans that support their academic career and personal goals, and to provide information and guidance on studies. Planning and management of the students’ study path is the main joint activity in advising. Based on a study log of passed courses, we propose to use robust, prototype-based clustering to identify a set of actual study path profiles. Such profiles identify groups of students with similar progress of studies, whose analysis and interpretation can be used for better institutional awareness and to support evidence-based academic advising. A model of automated academic advising system utilizing the possi…

ta113learning analyticsMedical educationKnowledge managementopiskelijatoppiminenComputer sciencebusiness.industry05 social sciencestutorointi050301 education02 engineering and technologyAcademic advisingopintopolutmentorointikorkea-asteen koulutusComputingMilieux_COMPUTERSANDEDUCATION0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingta516academic advisingbusinessrobust clustering0503 educationarviointi
researchProduct

First Year Computing Students' Perceptions of Authenticity in Assessment

2017

The problem of how best to assess student learning is a fundamental one in education. Changes to computer science curricula seek to emphasise teaching practices that promote deep learning through direct, contextual examination of student performance on tasks that resemble those of practitioners, rather than more traditional methods. This kind of "authentic assessment" is becoming more popular as it appears to incorporate employability skills associated with professional practice into the curriculum in a natural way. In this paper, we report on an investigation into how computing students themselves understand the terminology of authentic assessment. We give a brief summary of some of the sa…

ta113learningstudents030504 nursingComputer scienceSituated learningmedia_common.quotation_subject05 social sciences050301 educationEmployabilityTerminology03 medical and health sciencescomputingAuthentic assessmentPerceptionPedagogyComputingMilieux_COMPUTERSANDEDUCATIONNatural (music)0305 other medical science0503 educationCurriculummedia_commonQualitative researchProceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education
researchProduct

Revealing Fake Profiles in Social Networks by Longitudinal Data Analysis

2017

ta113longitudinal dataidentiteettiväärennöksetsocial network analysisComputer scienceLongitudinal dataverkkoprofiilitsosiaalinen mediaData scienceanomaly detectiongraph miningväärennöksetidentiteettisuspicious behaviour
researchProduct

Using VIS/NIR and IR spectral cameras for detecting and separating crime scene details

2012

Detecting invisible details and separating mixed evidence is critical for forensic inspection. If this can be done reliably and fast at the crime scene, irrelevant objects do not require further examination at the laboratory. This will speed up the inspection process and release resources for other critical tasks. This article reports on tests which have been carried out at the University of Jyväskylä in Finland together with the Central Finland Police Department and the National Bureau of Investigation for detecting and separating forensic details with hyperspectral technology. In the tests evidence was sought after at an assumed violent burglary scene with the use of VTT's 500-900 nm wave…

ta113medicine.medical_specialtySDG 16 - PeaceComputer scienceGunshot residueSDG 16 - Peace Justice and Strong InstitutionsdetectionHyperspectral imagingPolice departmentspectral imagingFingerprint recognition/dk/atira/pure/sustainabledevelopmentgoals/peace_justice_and_strong_institutionslatent fingerprintsJustice and Strong InstitutionsVNIRSpectral imagingmedicineCrime sceneDried bloodforensic investigationseparation of bloodRemote sensingCrime scene
researchProduct

Feature Extractors for Describing Vehicle Routing Problem Instances

2016

The vehicle routing problem comes in varied forms. In addition to usual variants with diverse constraints and specialized objectives, the problem instances themselves – even from a single shared source - can be distinctly different. Heuristic, metaheuristic, and hybrid algorithms that are typically used to solve these problems are sensitive to this variation and can exhibit erratic performance when applied on new, previously unseen instances. To mitigate this, and to improve their applicability, algorithm developers often choose to expose parameters that allow customization of the algorithm behavior. Unfortunately, finding a good set of values for these parameters can be a tedious task that…

ta113metaheuristics000 Computer science knowledge general worksfeature extractionComputer Sciencevehicle routing problemautomatic algorithm configurationunsupervised learning
researchProduct

Modelling Recurrent Events for Improving Online Change Detection

2016

The task of online change point detection in sensor data streams is often complicated due to presence of noise that can be mistaken for real changes and therefore affecting performance of change detectors. Most of the existing change detection methods assume that changes are independent from each other and occur at random in time. In this paper we study how performance of detectors can be improved in case of recurrent changes. We analytically demonstrate under which conditions and for how long recurrence information is useful for improving the detection accuracy. We propose a simple computationally efficient message passing procedure for calculating a predictive probability distribution of …

ta113noiseComputer scienceData stream miningMessage passingDetectordata streamsonline change detection02 engineering and technologycomputer.software_genreTask (computing)recurrent eventschange points020204 information systems0202 electrical engineering electronic engineering information engineeringProbability distribution020201 artificial intelligence & image processingNoise (video)Data miningBaseline (configuration management)computerChange detectionProceedings of the 2016 SIAM International Conference on Data Mining
researchProduct

Identity Use and Misuse of Public Persona on Twitter

2016

Social media sites have appeared during the last 10 years and their use has exploded all over the world. Twitter is a microblogging service that has currently 320 million user profiles and over 100 million daily active users. Many celebrities and leading politicians have a verified profile on Twitter, including Justin Bieber, president Obama, and the Pope. In this paper we investigate the '‘hundreds of Putins and Obamas phenomenon’ on Twitter. We collected two data sets in 2015 containing 582 and 6477 profiles that are related to the G20 leaders’ profiles on Twitter. The number of namesakes varied from 5 to 1000 per leader. We analysed in detail various aspects of the Putin and Erdogan rela…

ta113online identity: G20 leaders: Putinbusiness.industryComputer sciencesocial media05 social sciencesInternet privacyTwitterIdentity (social science)sosiaalinen media050801 communication & media studiesPersonafaked accountsG20 leaders: Putin [online identity]ObamaimpersonationErdogan0508 media and communications0502 economics and business050211 marketingta518business
researchProduct

Does the Learning Channel Really Matter? - Insights from Commercial Online ICT-training

2017

Evolving ICT has provided new options to participate to training. Online participation has been found to be cost effective, helping people to deal with the time and cost pressures they are facing on their jobs. Previous studies conducted in higher education sector indicates that student satisfaction or learning outcomes does not differ between online and classroom participants. However, little is known what is the situation in commercial ICT-training. This paper studied course feedbacks from courses having both online and classroom participants of a commercial ICT-training provider. Results revealed that the learning channel has no effect on satisfaction, perceived teacher’s substance and t…

ta113online trainingMultimediaComputer scienceonline learningverkko-oppiminencomputer.software_genreTraining (civil)learning channelsverkko-opiskeluInformation and Communications TechnologyComputingMilieux_COMPUTERSANDEDUCATIONta516verkko-opetuscomputerCommunication channelProceedings of the 9th International Conference on Computer Supported Education
researchProduct