Search results for "Task analysis"

showing 10 items of 86 documents

Multiple Authentic Project-Based Experiences and Persistent Learning?

2019

This work-in-progress paper in the research category investigates students’ experiences of learning over two project-based courses, of which the first is taken during bachelor studies and the second is taken during master studies. The research goal was to explore if and how the first project experience was considered beneficial to the latter. A pilot interview was conducted and analyzed for qualitatively different themes. Transformative learning theory (TLT) is introduced as the theoretical framework because of its focus on persistent learning originating in transformations in meaning perspectives. The results are discussed in the context of TLT, and they inform curriculum design and resear…

business.industrymedia_common.quotation_subject05 social sciences050301 educationInformation technology050109 social psychologyContext (language use)BachelorFocus (linguistics)Transformative learningTask analysisMathematics education0501 psychology and cognitive sciencesbusinessPsychology0503 educationCurriculummedia_commonMeaning (linguistics)2019 IEEE Frontiers in Education Conference (FIE)
researchProduct

Incentive Mechanism for Edge Computing-Based Blockchain: A Sequential Game Approach

2022

The development of the blockchain framework is able to provide feasible solutions for a wide range of Industrial Internet of Things (IIoT) applications. While the IIoT devices are usually resource-limited, how to make sure the acquisition of computational resources and participation of the devices will be the driving force to realize blockchain. In this work, an edge computing-based blockchain framework is considered, where multiple edge service providers (ESPs) can provide computational resources to the IIoT devices. We focus on investigating the trading between the devices and ESPs, where ESPs are the sellers and devices are the buyers. A sequential game is formulated and by exploring the…

computational modelingblockchainsInternet of ThingsmininglohkoketjutComputer Science Applicationsedge computingreunalaskentaControl and Systems Engineeringtask analysispricinginformaticsincentive mechanismpeliteoriaesineiden internettiedonlouhintaElectrical and Electronic EngineeringgamesInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

Towards multi-concern software development with Everything-as-Code

2022

As software is becoming a central element in our lives, more and more stakeholders have concerns. Unlike today, when developers stop their coding activities to satisfy these stakeholder concerns, we propose dealing with them as part of the coding workflow, the central element of programmers’ daily duties. This can be achieved by extending the approach that we call Everything-as-Code (EaC) beyond software engineers and operators. peerReviewed

data modelssoftwareohjelmoijatohjelmistotuotantotask analysiscodessidosryhmätohjelmistokehitysdocumentationstakeholderspipelines
researchProduct

Latency-Oblivious Distributed Task Scheduling for Mobile Edge Computing

2018

Mobile Edge Computing (MEC) is emerging as one of the effective platforms for offloading the resource- and latency-constrained computational services of modern mobile applications. For latency- and resource-constrained mobile devices, the important issues include: 1) minimize end-to-end service latency; 2) minimize service completion time; 3) high quality-of-service (QoS) requirement to offload the complex computational services. To address the above issues, a latencyoblivious distributed task scheduling scheme is designed in this work to maximize the QoS performance and goodput for the MEC services. Unlike most of the existing works, we consider the latency-oblivious property of different …

hajautetut järjestelmätComputer scienceGoodput02 engineering and technologymatkaviestinverkotScheduling (computing)mobiililaitteetedge computing0202 electrical engineering electronic engineering information engineeringpalvelimetschedulingLatency (engineering)Mobile edge computingta213processor schedulingbusiness.industrymobile handsetsQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsserverstask analysisquality of service020201 artificial intelligence & image processingbusinessMobile deviceComputer network
researchProduct

Cognitive-Behavioural Treatment Package for Teaching Grooming Skills to a Man with an Intellectual Disability

2000

A combination of health education, use of picture cues based on task analyses, a system of least prompts and social reinforcement was applied to teach various grooming skills to a man with a moderate intellectual disability. A multiple baseline design across behaviours was employed to show the effects. The results indicated rapid learning of lacking skills such as tooth brushing, shaving, showering and washing of arms and face.

integumentary systemeducationCognitionmedicine.diseaseDevelopmental psychologyTask (project management)Tooth brushingNeuropsychology and Physiological PsychologyMultiple baseline designIntellectual disabilityTask analysismedicineHealth educationReinforcementPsychologyScandinavian Journal of Behaviour Therapy
researchProduct

Towards Practical Cybersecurity Mapping of STRIDE and CWE — a Multi-perspective Approach

2021

Software vulnerabilities are identified during their whole life-cycle; some vulnerabilities may be caused by flaws on the design while other appear due to advances on the technologies around the systems. Frameworks such as OWASP are well- known and are used for testing a systems security before or after implementation, and such testing is carried out against the existing system. Threat modeling however focuses on the early stages of the system design when it is feasible and easy to fix security-related flaws and prevent possible damage caused by them. For example, STRIDE is one very popular threat modeling framework. A STRIDE threat modelling specialist deals with abstract categorizations o…

järjestelmäsuunnittelucybersecurityComputer scienceVulnerabilitySTRIDETK5101-6720cveComputer securitycomputer.software_genrethreat lifecyclestrideSoftwaretietokannattietoturvakyberturvallisuushaavoittuvuusweaknessesvulnerabilitiesScope (project management)business.industrytietokoneohjelmatTechnological innovationcwemapping automationohjelmistosuunnitteluSystems development life cycleTask analysisThreat modelTelecommunicationTask analysisManualsSystems designthreat modellingmallit (mallintaminen)ohjelmistokehitysbusinessEstimationcomputervulnerability lifecycleSoftware2021 29th Conference of Open Innovations Association (FRUCT)
researchProduct

Time-Course of Grammatical Processing in Deaf Readers: An Eye-Movement Study.

2019

Abstract Twenty participants who were deaf and 20 chronological age-matched participants with typical hearing (TH) (mean age: 12 years) were asked to judge the correctness of written sentences with or without a grammatically incongruent word while their eye movements were registered. TH participants outperformed deaf participants in grammaticality judgment accuracy. For both groups, First Pass and Total Fixation Times of target words in correct trials were significantly longer in the incongruent condition than in the congruent one. However, whereas TH students showed longer First Pass in the target area than deaf students across congruity conditions, deaf students made more fixations than t…

medicine.medical_specialtyVocabularyEye Movementsmedia_common.quotation_subjecteducationAudiologyDeafnessVocabulary050105 experimental psychologySentence processingEducation030507 speech-language pathology & audiology03 medical and health sciencesSpeech and Hearingotorhinolaryngologic diseasesmedicineHumans0501 psychology and cognitive sciencesmedia_commonLanguage05 social sciencesEye movementFixation (psychology)SyntaxVocabulary developmentReadingTask analysisGrammaticality0305 other medical sciencePsychologyJournal of deaf studies and deaf education
researchProduct

Video-assisted surgery: suggestions for failure prevention in laparoscopic cholecystectomy

2014

Background: Surgery differs from other medical specialties in its execution. It is often complex and includes considerable individual variations. Observing problems in operating theatres (OT) allows for the identification of system failures which should be defined for learning purposes to increase patient safety and enhance general safety culture within hospital organizations. This study evaluates a common video-assisted surgical procedure, laparoscopic cholecystectomy (LC) through failure analysis. The profile of the LC procedure and failure sources is presented. Methods: Data consisted video-observations and interviews concerning twelve LC operations performed at a day surgery unit. All o…

medicine.medical_specialtybusiness.industryHuman factors and ergonomicsvideo observationCystic arteryVideo-Assisted Surgeryfailure analysisComputer Science ApplicationsSurgeryHuman-Computer InteractionPhilosophyPatient safetymedicine.anatomical_structuremedicine.arterysystem failuresmedicineTask analysisCystic ductOperations managementIndustrial and organizational psychologySafety culturesurgical workbusinesslaparoscopic cholecystectomyinhimilliset tekijätCognition, Technology & Work
researchProduct

Comparative ergonomic workflow and user experience analysis of MRI versus fluoroscopy-guided vascular interventions: an iliac angioplasty exemplar ca…

2014

A methodological framework is introduced to assess and compare a conventional fluoroscopy protocol for peripheral angioplasty with a new magnetic resonant imaging (MRI)-guided protocol. Different scenarios were considered during interventions on a perfused arterial phantom with regard to time-based and cognitive task analysis, user experience and ergonomics. Three clinicians with different expertise performed a total of 43 simulated common iliac angioplasties (9 fluoroscopic, 34 MRI-guided) in two blocks of sessions. Six different configurations for MRI guidance were tested in the first block. Four of them were evaluated in the second block and compared to the fluoroscopy protocol. Relevant…

medicine.medical_specialtymedicine.medical_treatmentBiomedical EngineeringHealth InformaticsProtocol analysisImaging phantomWorkflowUser experience designAngioplastymedicineFluoroscopyHumansRadiology Nuclear Medicine and imagingMedical physicsComputer SimulationRetrospective StudiesProtocol (science)medicine.diagnostic_testbusiness.industryAngioplastyGeneral MedicineComputer Graphics and Computer-Aided DesignMagnetic Resonance ImagingComputer Science ApplicationsWorkflowSurgery Computer-AssistedFluoroscopyIliac AneurysmTask analysisSurgeryComputer Vision and Pattern RecognitionRadiologyErgonomicsbusiness
researchProduct

Minimalism for the Win : User-Centered Design for Guidance in Industrial Maintenance

2022

Background: We conducted an exploratory study to test the delivery of technical instructions built on the principles of minimalism. The aim was to investigate how we could support target users’ skill levels in a context-sensitive manner. Literature review: Related work examines minimalism, user needs and profiling, and industrial maintenance and technician experience. Research questions: 1. How can the semantic structure of DITA XML be utilized in delivering technical information to users based on their skill levels? 2. How would a layered system of information support the principles of minimalism? Methodology: We created material and tested the concept in user studies with maintenance pers…

minimalismohjeetsoftwarestructured authoringtekninen viestintädocumentationkäyttäjäkeskeinen suunnitteludokumentointiconferencesindustrial maintenanceIndustrial relationsprofessional communicationtask analysishardwareDarwin Information Typing Architecture (DITA)huoltoElectrical and Electronic Engineeringmaintenance engineeringteollisuususer-centered designtietojärjestelmätkunnossapito
researchProduct