Search results for "computer.software_genre"
showing 10 items of 3858 documents
Removing the barriers to adoption of social OER environments
2015
Despite the opportunities and benefits of OER, research and practice has shown how the OER repositories have a hard time in reaching an active user-base. The opportunities of experience exchange and simple feedback mechanisms of social software have been realized for improving the situation and many are basing or transforming their OER offerings towards socially powered environments. Research on social software has shown how knowledge-sharing barriers in online environments are highly culture and context-specific and require proper investigation. It is crucial to study what challenges might arise in such environments and how to overcome them, ensuring a successful uptake. A large-scale (N =…
Criminal DNA databases: the European situation
2001
In the last 5 years, a number of European countries have successfully introduced national databases holding the DNA profiles from suspected and convicted criminal offenders as well as from biological stain materials from unsolved crime cases. At present, DNA databases are fully or partially in operation in the UK, The Netherlands, Austria, Germany, Finland, Norway, Denmark, Switzerland and Sweden. Furthermore, in the other European countries, specific legislation will be enacted soon, or the introduction of such databases is being discussed to initiate a legislative process. Numerous differences exist regarding the criteria for a criminal offender to be included in the database, the storage…
Ontology-based annotation and retrieval of services in the cloud
2014
Cloud computing is a technological paradigm that permits computing services to be offered over the Internet. This new service model is closely related to previous well-known distributed computing initiatives such as Web services and grid computing. In the current socio-economic climate, the affordability of cloud computing has made it one of the most popular recent innovations. This has led to the availability of more and more cloud services, as a consequence of which it is becoming increasingly difficult for service consumers to find and access those cloud services that fulfil their requirements. In this paper, we present a semantically-enhanced platform that will assist in the process of …
Aligning Two Specifications for Controlling Information Security
2014
Assuring information security is a necessity in modern organizations. Many recommendations for information security management exist, which can be used to define a baseline of information security requirements. ISO/ IEC 27001 prescribes a process for an information security management system, and guidance to implement security controls is provided in ISO/IEC 27002. Finnish National Security Auditing Criteria (KATAKRI) has been developed by the national authorities in Finland as a tool to verify maturity of information security practices. KATAKRI defines both security control objectives and security controls to meet an objective. Here the authors compare and align these two specifications in…
An overview of incremental feature extraction methods based on linear subspaces
2018
Abstract With the massive explosion of machine learning in our day-to-day life, incremental and adaptive learning has become a major topic, crucial to keep up-to-date and improve classification models and their corresponding feature extraction processes. This paper presents a categorized overview of incremental feature extraction based on linear subspace methods which aim at incorporating new information to the already acquired knowledge without accessing previous data. Specifically, this paper focuses on those linear dimensionality reduction methods with orthogonal matrix constraints based on global loss function, due to the extensive use of their batch approaches versus other linear alter…
Towards safe reinforcement-learning in industrial grid-warehousing
2020
Abstract Reinforcement learning has shown to be profoundly successful at learning optimal policies for simulated environments using distributed training with extensive compute capacity. Model-free reinforcement learning uses the notion of trial and error, where the error is a vital part of learning the agent to behave optimally. In mission-critical, real-world environments, there is little tolerance for failure and can cause damaging effects on humans and equipment. In these environments, current state-of-the-art reinforcement learning approaches are not sufficient to learn optimal control policies safely. On the other hand, model-based reinforcement learning tries to encode environment tra…
Using PageRank for non-personalized default rankings in dynamic markets
2017
Abstract Default ranking algorithms are used to generate non-personalized product rankings for standard consumers, for example, on landing pages of online stores. Default rankings are created without any information about the consumers’ preferences. This paper proposes using the product centrality ranking algorithm (PCRA), which solves some problems of existing default ranking algorithms: Existing approaches either have low accuracy, because they rely on only one product attribute, or they are unable to estimate ranks for new or updated products, because they use past consumer behavior, such as previous sales or ratings. The PCRA uses the PageRank centrality of products in a product dominat…
Analysis and design of sequencing rules for car sequencing
2009
Abstract This paper presents novel approaches for generating sequencing rules for the car sequencing (CS) problem in cases of two and multiple processing times per station. The CS problem decides on the succession of different car models launched down a mixed-model assembly line. It aims to avoid work overloads at the stations of the line by applying so-called sequencing rules, which restrict the maximum occurrence of labor-intensive options in a subsequence of a certain length. Thus to successfully avoid work overloads, suitable sequencing rules are essential. The paper shows that the only existing rule generation approach leads to sequencing rules which misclassify feasible sequences. We …
Strategic leadership in cyber security, case Finland
2020
Cyber security has become one of the biggest priorities for businesses and governments. Streamlining and strengthening strategic leadership are key aspects in making sure the cyber security vision is achieved. The strategic leadership of cyber security implies identifying and setting goals based on the protection of the digital operating environment. Furthermore, it implies coordinating actions and preparedness as well as managing extensive disruptions. The aim of this article is to define what is strategic leadership of cyber security and how it is implemented as part of the comprehensive security model in Finland. In terms of effective strategic leadership of cyber security, it is vital t…