Search results for "ta113"

showing 10 items of 530 documents

Numerical Recovery of Source Singularities via the Radiative Transfer Equation with Partial Data

2013

The inverse source problem for the radiative transfer equation is considered, with partial data. Here we demonstrate numerical computation of the normal operator $X_{V}^{*}X_{V}$ where $X_{V}$ is the partial data solution operator to the radiative transfer equation. The numerical scheme is based in part on a forward solver designed by F. Monard and G. Bal. We will see that one can detect quite well the visible singularities of an internal optical source $f$ for generic anisotropic $k$ and $\sigma$, with or without noise added to the accessible data $X_{V}f$. In particular, we use a truncated Neumann series to estimate $X_{V}$ and $X_{V}^{*}$, which provides a good approximation of $X_{V}^{*…

ta113Applied MathematicsGeneral MathematicsOperator (physics)ta111010102 general mathematicsMathematical analysisMicrolocal analysisNumerical Analysis (math.NA)Inverse problem01 natural sciences35R30 (Primary) 35S05 35R09 35Q20 92C55Neumann series010101 applied mathematicsSobolev spaceMathematics - Analysis of PDEsRadiative transferFOS: MathematicsGravitational singularityMathematics - Numerical Analysis0101 mathematicsAnisotropyMathematicsAnalysis of PDEs (math.AP)
researchProduct

Remote Attestation of Software and Execution-Environment in Modern Machines

2015

The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…

ta113AuthenticationMulti-core processorNetwork securitybusiness.industryComputer sciencesoftwaremedia_common.quotation_subjectDistributed computingTrusted ComputingCertaintyComputer securitycomputer.software_genreVirtualizationVariety (cybernetics)remote attestationSoftwarenetwork securitybusinesscomputermedia_commonexecution-environment
researchProduct

Anomaly detection approach to keystroke dynamics based user authentication

2017

Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…

ta113AuthenticationpääsynvalvontaComputer scienceaccess control02 engineering and technologycomputer.software_genreKeystroke dynamicstodentaminen020204 information systems0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Unsupervised learningauthentication020201 artificial intelligence & image processingAnomaly detectionData miningtietoturvadata securitycomputer
researchProduct

Fotogrammetrisen 3D-latvusmallin ja hyperspektriaineiston käyttö aluetason puustotulkinnassa

2017

Seloste artikkelista Tuominen S., Balazs A., Honkavaara E., Polonen I., Saari H., Hakala T., Viljanen N. (2017). Hyperspectral UAV-imagery and photogrammetric canopy height model in estimating forest stand variables. Silva Fennica vol. 51 no. 5 article id 7721. https://doi. org/10.14214/sf.7721

ta113CanopyHyperspectral imagingForestryForestrymallitSD1-669.5ta4112latvusmetsänarviointiGeographypuustoCartography
researchProduct

Using a mobile application to support children's writing motivation

2013

PurposeThe purpose of this paper is to explore the use of the prototype of a mobile application for the enhancement of children's motivation for writing. The results are explored from students' and experts' perspectives.Design/methodology/approachThis study is based on a field trial and expert evaluations of a prototype of a mobile application. The field trial data consists of questionnaire data collected from elementary school students (n=25) who used the mobile prototype. The expert evaluations (n=8) of the prototype were conducted based on usability and pedagogical heuristics. The main research question is how the mobile application motivates children to learn creative writing.FindingsTh…

ta113Class (computer programming)Multimediabusiness.industryComputer scienceUsabilitycomputer.software_genreEducationBlended learningWriting motivationComputer Science (miscellaneous)Mathematics educationCreative writingMobile technologyta516businessMobile deviceResearch questioncomputerInteractive Technology and Smart Education
researchProduct

An Information system design product theory for the abstract class of integrated requirements and delivery management systems

2014

Information and Communications Technology-enabled international sourcing of software-intensive systems and services (eSourcing) is increasingly used as a means of adding value, reducing costs, sharing risks, and achieving strategic aims. To maximally reap the benefits from eSourcing and to mitigate the risks, providers and clients have to be aware of and build capabilities for the eSourcing life-cycle. China is in a position to become a superpower for eSourcing service provisioning, but most Chinese eSourcing service providers are small or medium-sized and typically work for larger intermediaries instead of end-clients, limiting their business and capabilities development. The extant litera…

ta113Class (computer programming)Process managementKnowledge managementbusiness.industryComputer scienceService providerCost reductionIntermediaryRisk analysis (business)Management systemInformation systemProduct (category theory)business
researchProduct

Employees’ adherence to information security policies: An exploratory field study

2014

The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees' adherence to security policies. The paradigm combines elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive Evaluation Theory. We validated the model by using a sample of 669 responses from four corporations in Finland. The SEM-based results showed that perceived severity of potential information security threats, employees' belief as to whether they can apply and adhere to information security policies, perceived vulnerability to potential security threats, employees…

ta113Cognitive evaluation theoryInformation Systems and Managementbusiness.industryInformation securityPublic relationsSecurity policyManagement Information SystemsThreatTheory of reasoned actionInformation security managementInformation security standardsSecurity managementBusinessMarketingInformation SystemsInformation & Management
researchProduct

Design principles for collaboration platforms for open education

2015

Increasing the current low uptake of Open Education Resources (OER) is a key challenge for researchers and practitioners in the field. User studies have shown that collaboration is a main success factor for successful open educational activities. However, effective collaboration in open educational contexts requires well planned processes and platforms supporting collaboration, in particular in physically distributed settings. We have been investigating the value of such platforms, their main features and user requirements to enable collaboration from immature ideas to completed resources. We used quantitative and qualitative research methods to collect insights from potential users of such…

ta113Collaborative softwareKnowledge managementopen educational resourcesbusiness.industryComputer scienceIntellectual propertyUser requirements documentOpen educational resourcesFocus groupcollaborationTerminologyOpen educationcollaboration platformsOERopen educationbusinessQualitative research
researchProduct

Teaching Knowledge Management by Combining Wikis and Screen Capture Videos

2011

PurposeThis paper aims to report on the design and creation of a knowledge management course aimed at facilitating student creation and use of social interactive learning tools for enhanced learning.Design/methodology/approachThe era of social media and web 2.0 has enabled a bottom‐up collaborative approach and new ways to publish work on the web, promoted by tools such as YouTube video service. In this spirit a knowledge management course was designed aiming to facilitate university students to compose videos on different difficult concepts in the theory part of the course by searching for explanations on the web and by creating a Windows Media Player video focusing on the self‐defined pro…

ta113Collaborative writingKnowledge managementMultimediaComputer Networks and Communicationsbusiness.industryComputer scienceWindows MediaLibrary and Information Sciencescomputer.software_genreInteractive LearningWorld Wide WebProblem-based learningConstructivism (philosophy of education)The InternetSocial mediabusinessSocial constructivismcomputer
researchProduct

Citizens' Communication Habits and Use of ICTs During Crises and Emergencies

2014

In this article, citizens’ communication habits and use of information and communication technologies during crises and emergencies are discussed from the perspective of community resilience. The topic is approached qualitatively by exploring citizens’ perceptions, and the data were gathered by means of focus groups in storm-prone and flood-prone areas in Finland. The results indicate that citizens consider emergency communication to be mostly unidirectional: from authorities to the public. However, because crises are often complex and fast developing, cooperation among response organizations and citizen groups is needed to coproduce safety and in adapting to changing situations. Organizati…

ta113Community resilienceKnowledge managementSocial PsychologyEmergency managementlcsh:T58.5-58.64business.industrylcsh:Information technologyCommunicationInformation sharingInformation technologyPublic relationsFocus groupHuman-Computer Interactionemergency communicationInformation and Communications TechnologyICTPolitical sciencePublic participationSocial mediacitizen participationta518businessinformation and communication technologyHuman Technology
researchProduct