Search results for "IPA"

showing 10 items of 5795 documents

Luonnon monimuotoisuuden ja ekosysteemipalveluiden väliset allokaatiokustannukset kaupunkien viherrakennesuunnittelussa

2016

Lähes kaikkialla maapallolla on havaittavissa, miten luonnon monimuotoisuus ja ekosysteemipalvelut ovat heikentyneet ihmispopulaation voimakkaan kasvun seurauksena. Luonnonvaroja on hyödynnetty kestämättömästi ja elinympäristöt ovat pirstoutuneet metsien hakkuiden, viljelysmaan raivaamisen ja kaupunkirakenteen hajautumisen seurauksena. Jo pitkän aikaa on kuitenkin ymmärretty, että luonnon ihmisille tuottamat hyödyt ovat riippuvaisia useista ekologisista ja evolutiivisista prosesseista, joita luonnon monimuotoisuuden eri tasot ylläpitävät. Viime vuosina voimakkaasti kehittynyt systemaattinen suojelusuunnittelu on kehitetty luomaan pitkälle aikavälille luonnon monimuotoisuutta mahdollisimman …

systemaattinen suojelusuunnittelumaankäytön suunnitteluekosysteemipalvelutvihreä infrastruktuuripriorisointiZonationmonimuotoisuus
researchProduct

Szkoły stowarzyszeniowe w perspektywie lokalnej polityki oświatowej gmin

2019

Fundamentalnym osiągnięciem decentralizacyjnej polityki państwa w latach 90. XX w. był powrót oświaty do wymiaru lokalnego. Gminy przejęły odpowiedzialność za zakładanie, likwidowanie i przekształcanie szkół na swoim terenie. Jest to najważniejsze ich zadanie w kreowaniu lokalnej polityki oświatowej. Uwarunkowania demograficzne ostatnich lat, niż demograficzny, spadek liczby uczniów w szkołach oraz wzrastające koszty utrzymania placówek oświatowych to główne determinanty przekazywania przez gminy szkół lokalnym stowarzyszeniom

szkoła stowarzyszeniowa; polityka oświatowa; gmina; lokalnośćschools run by associations; education policy; municipality; localityAnnales Universitatis Mariae Curie-Skłodowska. Sectio J, Paedagogia-Psychologia
researchProduct

Citizens' Communication Habits and Use of ICTs During Crises and Emergencies

2014

In this article, citizens’ communication habits and use of information and communication technologies during crises and emergencies are discussed from the perspective of community resilience. The topic is approached qualitatively by exploring citizens’ perceptions, and the data were gathered by means of focus groups in storm-prone and flood-prone areas in Finland. The results indicate that citizens consider emergency communication to be mostly unidirectional: from authorities to the public. However, because crises are often complex and fast developing, cooperation among response organizations and citizen groups is needed to coproduce safety and in adapting to changing situations. Organizati…

ta113Community resilienceKnowledge managementSocial PsychologyEmergency managementlcsh:T58.5-58.64business.industrylcsh:Information technologyCommunicationInformation sharingInformation technologyPublic relationsFocus groupHuman-Computer Interactionemergency communicationInformation and Communications TechnologyICTPolitical sciencePublic participationSocial mediacitizen participationta518businessinformation and communication technologyHuman Technology
researchProduct

Developing cloud business models: A case study on cloud gaming

2011

Cloud computing offers new ways for firms to operate in the global market so that even small firms can compete in markets traditionally dominated by multinational corporations. A case study considers how, over ten years, a small firm developed a successful business model to compete in computer gaming. peerReviewed

ta113Competitive intelligenceComputingMilieux_THECOMPUTINGPROFESSIONBusiness processbusiness.industrySoftware as a serviceCloud gamingcloud computingCloud computingBusiness modelpienyrityksetGlobalizationpilvipalvelutCommerceMultinational corporationcomputer gamesBusinessbusiness modelssmall firmsSoftwaretietokonepelitIEEE Software
researchProduct

Is My Office 365 GDPR Compliant? : Security Issues in Authentication and Administration

2018

The General Data Protection Regulation, commonly referred as GDPR, will be enforced in all European Union countries in May 2018. GDPR sets requirements for processing EU citizens’ personal data regardless of the physical location of the organisation processing the data. Over 40 percent of European organisations are using Office 365. Microsoft claims that Office 365 service is GDPR compliant, and has provided tools to help Office 365 customers to ensure their GDPR compliancy. In this paper, we present some security issues related to the very foundation of Office 365 service, namely Azure Active Directory and administrative tools, and assess their GDPR compliancy. Our findings reveal that per…

ta113Computer scienceinformation securityOffice 365Microsoft OfficeComputer securitycomputer.software_genreAuthentication (law)pilvipalvelutGDPRtietoturvacomputerAdministration (government)Azure
researchProduct

Combining PCA and multiset CCA for dimension reduction when group ICA is applied to decompose naturalistic fMRI data

2015

An extension of group independent component analysis (GICA) is introduced, where multi-set canonical correlation analysis (MCCA) is combined with principal component analysis (PCA) for three-stage dimension reduction. The method is applied on naturalistic functional MRI (fMRI) images acquired during task-free continuous music listening experiment, and the results are compared with the outcome of the conventional GICA. The extended GICA resulted slightly faster ICA convergence and, more interestingly, extracted more stimulus-related components than its conventional counterpart. Therefore, we think the extension is beneficial enhancement for GICA, especially when applied to challenging fMRI d…

ta113MultisetPCAGroup (mathematics)business.industrydimension reductionSpeech recognitionDimensionality reductionPattern recognitionMusic listeningta3112naturalistic fMRIGroup independent component analysisPrincipal component analysistemporal cocatenationArtificial intelligenceCanonical correlationbusinessmultiset CCAMathematics
researchProduct

Semi-automatic literature mapping of participatory design studies 2006--2016

2018

The paper presents a process of semi-automatic literature mapping of a comprehensive set of participatory design studies between 2006--2016. The data of 2939 abstracts were collected from 14 academic search engines and databases. With the presented method, we were able to identify six education-related clusters of PD articles. Furthermore, we point out that the identified clusters cover the majority of education-related words in the whole data. This is the first attempt to systematically map the participatory design literature. We argue that by continuing our work, we can help to perceive a coherent structure in the body of PD research.

ta113Structure (mathematical logic)Point (typography)Computer scienceProcess (engineering)tekstinlouhinta020206 networking & telecommunications02 engineering and technologyData scienceParticipatory design0202 electrical engineering electronic engineering information engineeringklusterianalyysi020201 artificial intelligence & image processingparticipatory designSemi automaticSet (psychology)Cluster analysisosallistava suunnittelusystematic literature mappingsystemaattiset kirjallisuuskatsauksetclusteringProceedings of the 15th Participatory Design Conference: Short Papers, Situated Actions, Workshops and Tutorial - Volume 2
researchProduct

Online anomaly detection using dimensionality reduction techniques for HTTP log analysis

2015

Modern web services face an increasing number of new threats. Logs are collected from almost all web servers, and for this reason analyzing them is beneficial when trying to prevent intrusions. Intrusive behavior often differs from the normal web traffic. This paper proposes a framework to find abnormal behavior from these logs. We compare random projection, principal component analysis and diffusion map for anomaly detection. In addition, the framework has online capabilities. The first two methods have intuitive extensions while diffusion map uses the Nyström extension. This fast out-of-sample extension enables real-time analysis of web server traffic. The framework is demonstrated using …

ta113Web serverComputer Networks and Communicationsbusiness.industryComputer scienceRandom projectionDimensionality reductionRandom projectionPrincipal component analysisIntrusion detection systemAnomaly detectionMachine learningcomputer.software_genreCyber securityWeb trafficPrincipal component analysisDiffusion mapAnomaly detectionIntrusion detectionArtificial intelligenceData miningWeb servicebusinesskyberturvallisuuscomputer
researchProduct

Towards the cyber security paradigm of ehealth: Resilience and design aspects

2017

Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain…

ta113e-healthcareEmerging technologiesbusiness.industrycyber securityComputer securitycomputer.software_genreAnticipation (artificial intelligence)Critical information infrastructureHealth careSystemic riskeHealthBusinessteleterveydenhuoltoResilience (network)kyberturvallisuuscomputerHealthcare system
researchProduct

Determining the number of sources in high-density EEG recordings of event-related potentials by model order selection

2011

To high-density electroencephalography (EEG) recordings, determining the number of sources to separate the signal and the noise subspace is very important. A mostly used criterion is that percentage of variance of raw data explained by the selected principal components composing the signal space should be over 90%. Recently, a model order selection method named as GAP has been proposed. We investigated the two methods by performing independent component analysis (ICA) on the estimated signal subspace, assuming the number of selected principal components composing the signal subspace is equal to the number of sources of brain activities. Through examining wavelet-filtered EEG recordings (128…

ta113medicine.diagnostic_testNoise (signal processing)business.industryPattern recognitionElectroencephalographyExplained variationIndependent component analysisSignalPrincipal component analysismedicineArtificial intelligencebusinessSubspace topologyMathematicsSignal subspace2011 IEEE International Workshop on Machine Learning for Signal Processing
researchProduct