Search results for "IPA"
showing 10 items of 5795 documents
Luonnon monimuotoisuuden ja ekosysteemipalveluiden väliset allokaatiokustannukset kaupunkien viherrakennesuunnittelussa
2016
Lähes kaikkialla maapallolla on havaittavissa, miten luonnon monimuotoisuus ja ekosysteemipalvelut ovat heikentyneet ihmispopulaation voimakkaan kasvun seurauksena. Luonnonvaroja on hyödynnetty kestämättömästi ja elinympäristöt ovat pirstoutuneet metsien hakkuiden, viljelysmaan raivaamisen ja kaupunkirakenteen hajautumisen seurauksena. Jo pitkän aikaa on kuitenkin ymmärretty, että luonnon ihmisille tuottamat hyödyt ovat riippuvaisia useista ekologisista ja evolutiivisista prosesseista, joita luonnon monimuotoisuuden eri tasot ylläpitävät. Viime vuosina voimakkaasti kehittynyt systemaattinen suojelusuunnittelu on kehitetty luomaan pitkälle aikavälille luonnon monimuotoisuutta mahdollisimman …
Szkoły stowarzyszeniowe w perspektywie lokalnej polityki oświatowej gmin
2019
Fundamentalnym osiągnięciem decentralizacyjnej polityki państwa w latach 90. XX w. był powrót oświaty do wymiaru lokalnego. Gminy przejęły odpowiedzialność za zakładanie, likwidowanie i przekształcanie szkół na swoim terenie. Jest to najważniejsze ich zadanie w kreowaniu lokalnej polityki oświatowej. Uwarunkowania demograficzne ostatnich lat, niż demograficzny, spadek liczby uczniów w szkołach oraz wzrastające koszty utrzymania placówek oświatowych to główne determinanty przekazywania przez gminy szkół lokalnym stowarzyszeniom
Citizens' Communication Habits and Use of ICTs During Crises and Emergencies
2014
In this article, citizens’ communication habits and use of information and communication technologies during crises and emergencies are discussed from the perspective of community resilience. The topic is approached qualitatively by exploring citizens’ perceptions, and the data were gathered by means of focus groups in storm-prone and flood-prone areas in Finland. The results indicate that citizens consider emergency communication to be mostly unidirectional: from authorities to the public. However, because crises are often complex and fast developing, cooperation among response organizations and citizen groups is needed to coproduce safety and in adapting to changing situations. Organizati…
Developing cloud business models: A case study on cloud gaming
2011
Cloud computing offers new ways for firms to operate in the global market so that even small firms can compete in markets traditionally dominated by multinational corporations. A case study considers how, over ten years, a small firm developed a successful business model to compete in computer gaming. peerReviewed
Is My Office 365 GDPR Compliant? : Security Issues in Authentication and Administration
2018
The General Data Protection Regulation, commonly referred as GDPR, will be enforced in all European Union countries in May 2018. GDPR sets requirements for processing EU citizens’ personal data regardless of the physical location of the organisation processing the data. Over 40 percent of European organisations are using Office 365. Microsoft claims that Office 365 service is GDPR compliant, and has provided tools to help Office 365 customers to ensure their GDPR compliancy. In this paper, we present some security issues related to the very foundation of Office 365 service, namely Azure Active Directory and administrative tools, and assess their GDPR compliancy. Our findings reveal that per…
Combining PCA and multiset CCA for dimension reduction when group ICA is applied to decompose naturalistic fMRI data
2015
An extension of group independent component analysis (GICA) is introduced, where multi-set canonical correlation analysis (MCCA) is combined with principal component analysis (PCA) for three-stage dimension reduction. The method is applied on naturalistic functional MRI (fMRI) images acquired during task-free continuous music listening experiment, and the results are compared with the outcome of the conventional GICA. The extended GICA resulted slightly faster ICA convergence and, more interestingly, extracted more stimulus-related components than its conventional counterpart. Therefore, we think the extension is beneficial enhancement for GICA, especially when applied to challenging fMRI d…
Semi-automatic literature mapping of participatory design studies 2006--2016
2018
The paper presents a process of semi-automatic literature mapping of a comprehensive set of participatory design studies between 2006--2016. The data of 2939 abstracts were collected from 14 academic search engines and databases. With the presented method, we were able to identify six education-related clusters of PD articles. Furthermore, we point out that the identified clusters cover the majority of education-related words in the whole data. This is the first attempt to systematically map the participatory design literature. We argue that by continuing our work, we can help to perceive a coherent structure in the body of PD research.
Online anomaly detection using dimensionality reduction techniques for HTTP log analysis
2015
Modern web services face an increasing number of new threats. Logs are collected from almost all web servers, and for this reason analyzing them is beneficial when trying to prevent intrusions. Intrusive behavior often differs from the normal web traffic. This paper proposes a framework to find abnormal behavior from these logs. We compare random projection, principal component analysis and diffusion map for anomaly detection. In addition, the framework has online capabilities. The first two methods have intuitive extensions while diffusion map uses the Nyström extension. This fast out-of-sample extension enables real-time analysis of web server traffic. The framework is demonstrated using …
Towards the cyber security paradigm of ehealth: Resilience and design aspects
2017
Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain…
Determining the number of sources in high-density EEG recordings of event-related potentials by model order selection
2011
To high-density electroencephalography (EEG) recordings, determining the number of sources to separate the signal and the noise subspace is very important. A mostly used criterion is that percentage of variance of raw data explained by the selected principal components composing the signal space should be over 90%. Recently, a model order selection method named as GAP has been proposed. We investigated the two methods by performing independent component analysis (ICA) on the estimated signal subspace, assuming the number of selected principal components composing the signal subspace is equal to the number of sources of brain activities. Through examining wavelet-filtered EEG recordings (128…