Department of Software Engineering - Administrative Units - Bridge of Knowledge

Search

Department of Software Engineering

Filters

total: 477

  • Category
  • Year
  • Options

clear Chosen catalog filters disabled

Catalog Publications

  • Security information sharing for smart grids: Developing the right data model
    Publication

    - Year 2014

    The smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...

    Full text to download in external service

  • Assessing Effectiveness of Recommendations to Requirements-Related Problems through Interviews with Experts

    Requirements Engineering and Business Analysis are known as very important to software project outcome but also difficult activities, coping with many problems and challenges. The work reported in this paper was preceded by a survey which revealed most common requirements-related problems in Polish IT industry. We addressed ten most frequently reported problems by reviewing the literature for recommen¬dations how to cope with...

    Full text available to download

  • Applications for investigating therapy progress of autistic children
    Publication

    The paper regards supporting behavioral therapy of autistic children with mobile applications, specifically applied for measuring the child’s progress. A family of five applications is presented, that was developed as an investigation tool within the project aimed at automation of therapy progress monitoring. The applications were already tested with children with autism spectrum disorder. Hereby we analyse children’ experience...

    Full text available to download

  • Algebra of ontology modules for semantic agents
    Publication

    W środowisku Sieci Semantycznej problem precyzyjnego manipulowania jednostkami wiedzy nabiera szczególnego znaczenia. W tej publikacji dyskutujemy możliwość zaadaptowania do tego celu elastycznego aparatu algebry relacyjnej. Na bazie dysksji szkicujemy pewną szczególną analogię pomiędzy bazami danych a bazami wiedzy i używamy tej analogii do wprowadzenia algebry modułów semantycznych.

  • Evaluating Performance and Accuracy Improvements for Attention-OCR

    In this paper we evaluated a set of potential improvements to the successful Attention-OCR architecture, designed to predict multiline text from unconstrained scenes in real-world images. We investigated the impact of several optimizations on model’s accuracy, including employing dynamic RNNs (Recurrent Neural Networks), scheduled sampling, BiLSTM (Bidirectional Long Short-Term Memory) and a modified attention model. BiLSTM was...

    Full text to download in external service

  • Towards Emotion Acquisition in IT Usability Evaluation Context
    Publication

    - Year 2015

    The paper concerns extension of IT usability studies with automatic analysis of the emotional state of a user. Affect recognition methods and emotion representation models are reviewed and evaluated for applicability in usability testing procedures. Accuracy of emotion recognition, susceptibility to disturbances, independence on human will and interference with usability testing procedures are...

    Full text to download in external service

  • Validation of Services Supporting Healthcare Standards Conformance

    The paper presents the results of experimental validation of a set of innovative software services supporting processes of achieving, assessing and maintaining conformance with standards and regulations. The study involved several hospitals implementing the Accreditation Standard promoted by the Polish Ministry of Health. First we introduce NOR-STA services that implement the TRUST-IT methodology of argument management. Then we...

    Full text available to download

  • Playing the Sprint Retrospective

    In agile software development, where great emphasis is put on effective informal communication, success depends heavily on human and social factors. However, Scrum does not specify any techniques that aid the human side of software development. In this paper we investigate the use of 6 collaborative games for the Sprint Retrospective. Each game was implemented twice in a Scrum team in Intel Technology Poland. The received feedback...

    Full text available to download

  • An Industrial Survey on Business Analysis Problems and Solutions

    The paper focuses on the problems reported by business analysts which have a negative impact on their work and on the applicability of available business analysis (BA) techniques as solutions to such problems. A unified set of BA techniques was developed on the basis of 3 industrial standards associated with IIBA, REQB and IREB certification schemes. A group of 8 business analysts was surveyed to list problems they encounter in...

    Full text available to download

  • Scaling scrum with a customized nexus framework: A report from a joint industry‐academia research project
    Publication

    espite a wide range of scaling frameworks available, large-scale agile transformations are not straightforward undertakings. Few organizations have structures in place that fit the predefined workflows – while once one applies an off-the-shelf framework outside of its prescribed process, guidance quickly runs out. In this paper, we demonstrate how to instantiate a method configuration process using a lightweight experimental approach...

    Full text available to download

  • Adopting Collaborative Games into Agile Software Development
    Publication

    - Year 2018

    Although the emergence of agile methods has triggered a growing awareness that social factors have a crucial impact on the success of software projects, neither the Scrum Guide nor the Agile Manifesto prescribe techniques that aid the human side of software development. To address this challenge, we enriched the Scrum process with a set of collaborative games. Collaborative games refer to techniques inspired by game play, but designed...

    Full text to download in external service

  • Stress Detection of Children with Autism using Physiological Signals in Kaspar Robot-Based Intervention Studies
    Publication
    • B. Coskun
    • P. Uluer
    • E. Toprak
    • D. E. Barkana
    • H. Kose
    • T. Zorcec
    • B. Robins
    • A. Landowska

    - Year 2022

    This study aims to develop a stress detection system using the blood volume pulse (BVP) signals of children with Autism Spectrum Disorder (ASD) during robot-based interven- tion. This study presents the heart rate variability (HRV) analysis method to detect the stress, where HRV features are extracted from raw BVP signals recorded from an E4 wristband during interaction studies with the social robot Kaspar. Low frequency power...

    Full text to download in external service

  • Things You Might Not Know about the k-Nearest Neighbors Algorithm
    Publication

    Recommender Systems aim at suggesting potentially interesting items to a user. The most common kind of Recommender Systems is Collaborative Filtering which follows an intuition that users who liked the same things in the past, are more likely to be interested in the same things in the future. One of Collaborative Filtering methods is the k Nearest Neighbors algorithm which finds k users who are the most similar to an active user...

    Full text to download in external service

  • What Is Troubling IT Analysts? A Survey Report from Poland on Requirements-Related Problems

    Requirements engineering and business analysis are activities considered to be important to software project success but also difficult and challenging. This paper reports on a survey conducted in Polish IT industry, aimed at identifying most widespread problems/challenges related to requirements. The survey was targeted at people performing role of analyst in commercial IT projects. The questionnaire included 64 pre-defined problems...

    Full text available to download

  • A note on the applications of artificial intelligence in the hospitality industry: preliminary results of a survey
    Publication

    - Year 2021

    Intelligent technologies are widely implemented in different areas of modern society but specific approaches should be applied in services. Basic relationships refer to supporting customers and people responsible for services offering for these customers. The aim of the paper is to analyze and evaluate the state-of-the art of artificial intelligence (AI) applications in the hospitality industry. Our findings show that the major...

    Full text available to download

  • Communication and Documentation Practices in Agile Requirements Engineering: A Survey in Polish Software Industry

    Requirements engineering, system analysis and other analytical activities form the basis of every IT project. Such activities are not clearly defined in Agile development methods, but it does not mean that they are absent in an agile project. The aim of our work was to determine which practices related to requirements-related communication and which requirements documenting techniques are used in agile software projects. For this...

    Full text available to download

  • Modern approaches to file system integrity checking
    Publication

    - Year 2008

    One of the means to detect intruder's activity is totrace all unauthorized changes in a file system.Programs which fulfill this functionality are called fileintegrity checkers. This paper concerns modernapproach to file system integrity checking. It reviewsarchitecture of popular systems that are widely used inproduction environment as well as scientific projects,which not only detect intruders but also take actions tostop their...

    Full text to download in external service

  • A Case Study on Implementing Agile Techniques and Practices: Rationale, Benefits, Barriers and Business Implications for Hardware Development
    Publication

    Agile methodologies, along with the corresponding tools and practices, are claimed to facilitate teams in managing their work more effectively and conducting their work more efficiently while fostering the highest quality product within the constraints of the budget. Therefore, the rate of awareness and adoption of Agile frameworks both within and outside the software industry has increased significantly. Yet, the latest studies...

    Full text available to download

  • Agile Requirements Prioritization in Practice: Results of an Industrial Survey
    Publication

    Agile software development stresses the importance of providing the customer with a product of a maximized business value. To achieve that, requirements prioritization is used. Agile development methods like Scrum define guidelines for prioritization, however practitioners do not necessarily have to follow them. Our goal was to investigate the industry practice related to requirements prioritization process, including its timing,...

    Full text available to download

  • The Algorithm of Modelling and Analysis of Latent Semantic Relations: Linear Algebra vs. Probabilistic Topic Models
    Publication

    - Year 2017

    This paper presents the algorithm of modelling and analysis of Latent Semantic Relations inside the argumentative type of documents collection. The novelty of the algorithm consists in using a systematic approach: in the combination of the probabilistic Latent Dirichlet Allocation (LDA) and Linear Algebra based Latent Semantic Analysis (LSA) methods; in considering each document as a complex of topics, defined on the basis of separate...

    Full text available to download

  • Emotion Monitor - Concept, Construction and Lessons Learned

    This paper concerns the design and physical construction of an emotion monitor stand for tracking human emotions in Human-Computer Interaction using multi-modal approach. The concept of the stand using cameras, behavioral analysis tools and a set of physiological sensors such as galvanic skin response, blood-volume pulse, temperature, breath and electromyography is presented and followed...

    Full text available to download

  • Automatic recognition of males and females among web browser users based on behavioural patterns of peripherals usage
    Publication

    - Internet Research - Year 2016

    Purpose The purpose of this paper is to answer the question whether it is possible to recognise the gender of a web browser user on the basis of keystroke dynamics and mouse movements. Design/methodology/approach An experiment was organised in order to track mouse and keyboard usage using a special web browser plug-in. After collecting the data, a number of parameters describing the users’ keystrokes, mouse movements and clicks...

    Full text to download in external service

  • Towards the participant observation of emotions in software development teams

    Emotions, moods and temperament influence our behaviour in every aspect of life. Until now plenty of research has been conducted and many theories have been proposed to explain the role of emotions within the working environment. However, in the field of software engineering, interest in the role of human factors in the process of software development is relatively new. In the paper the research design process that has been proposed...

    Full text available to download

  • Emotion Recognition from Physiological Channels Using Graph Neural Network

    In recent years, a number of new research papers have emerged on the application of neural networks in affective computing. One of the newest trends observed is the utilization of graph neural networks (GNNs) to recognize emotions. The study presented in the paper follows this trend. Within the work, GraphSleepNet (a GNN for classifying the stages of sleep) was adjusted for emotion recognition and validated for this purpose. The...

    Full text available to download

  • Landscape of Automated Log Analysis: A Systematic Literature Review and Mapping Study
    Publication

    - IEEE Access - Year 2022

    Logging is a common practice in software engineering to provide insights into working systems. The main uses of log files have always been failure identification and root cause analysis. In recent years, novel applications of logging have emerged that benefit from automated analysis of log files, for example, real-time monitoring of system health, understanding users’ behavior, and extracting domain knowledge. Although nearly every...

    Full text available to download

  • System supporting behavioral therapy for children with autism

    In this paper, a system supporting behavioral therapy for autistic children is presented. The system consists of sensors network, base station and a brooch indicating person's emotional states. The system can be used to measure values of physiological parameters that are associated with changes in the emotional state. In the future, it can be useful to inform the autistic child and the therapist about the emotional state of the...

    Full text available to download

  • Assurance Case Patterns On-line Catalogue
    Publication

    - Year 2017

    Assurance case is an evidence-based argument demonstrating that a given property of a system (e.g. safety, security) is assured. Assurance cases are developed for high integrity systems, as in many industry domains such argu-ment is explicitly required by regulations. Despite the fact that each assurance case is unique, several reusable argument patterns have been identified and pub-lished. This paper reports work on development...

    Full text available to download

  • Serendipitous Recommendations Through Ontology-Based Contextual Pre-filtering
    Publication

    Context-aware Recommender Systems aim to provide users with better recommendations for their current situation. Although evaluations of recommender systems often focus on accuracy, it is not the only important aspect. Often recommendations are overspecialized, i.e. all of the same kind. To deal with this problem, other properties can be considered, such as serendipity. In this paper, we study how an ontology-based and context-aware...

    Full text to download in external service

  • The Impact of Lexicon Adaptation on the Emotion Mining From Software Engineering Artifacts
    Publication

    - IEEE Access - Year 2020

    Sentiment analysis and emotion mining techniques are increasingly being used in the field of software engineering. However, the experiments conducted so far have not yielded high accuracy results. Researchers indicate a lack of adaptation of the methods of emotion mining to the specific context of the domain as the main cause of this situation. The article describes research aimed at examining whether the adaptation of the lexicon...

    Full text available to download

  • The Role of a Software Product Manager in Various Business Environments

    The aim of the paper is to identify the role of the software product manager depending on the size of the company and the characteristics of the product they are working on. This has been achieved in cooperation with 15 experts from the IT industry. The companies were divided into 4 levels of size: micro-enterprises, small businesses, medium businesses and large enterprises. The characteristics of the products were divided into...

    Full text available to download

  • Improving the Accuracy in Sentiment Classification in the Light of Modelling the Latent Semantic Relations
    Publication

    - Information - Year 2018

    The research presents the methodology of improving the accuracy in sentiment classification in the light of modelling the latent semantic relations (LSR). The objective of this methodology is to find ways of eliminating the limitations of the discriminant and probabilistic methods for LSR revealing and customizing the sentiment classification process (SCP) to the more accurate recognition of text tonality. This objective was achieved...

    Full text available to download

  • A Survey on Identifying and Addressing Business Analysis Problems

    Despite the growing body of knowledge on requirements engineering and business analysis, these areas of software project are still considered problematic. The paper focuses on problems reported by business analysts and on applicability of available business analysis techniques as solutions to such problems. A unified set of techniques was developed on the basis of 3 industrial standards associated with IIBA, REQB and IREB certification...

    Full text available to download

  • MobileNet family tailored for Raspberry Pi

    With the advances in systems-on-a-chip technologies, there is a growing demand to deploy intelligent vision systems on low-cost microcomputers. To address this challenge, much of the recent research has focused on reducing the model size and computational complexity of contemporary convolutional neural networks (CNNs). The state-of-the-art lightweight CNN is MobileNetV3. However, it was designed to achieve a good trade-off between...

    Full text available to download

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
    Publication

    - Year 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Full text to download in external service

  • Affective reactions to playing digital games
    Publication

    - Year 2015

    The paper presents a study of emotional states during a gameplay. An experiment of two-player Tetris game is reported, followed by the analysis of the results - self-reported emotional states as well as physiological signals measurements interpretation. The study reveals the diversity of emotional reactions and concludes, that a representative player's emotional model is hard to define. Instead, an adaptive approach to emotion...

    Full text to download in external service

  • Threat intelligence platform for the energy sector

    In recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...

    Full text available to download

  • An Approach to Trust Case Development
    Publication

    - Year 2003

    In the paper we present an approach to the architectural trust case development for DRIVE, the IT infrastructure supporting the processes of drugs distribution and application. The objectives of DRIVE included safer and cheaper drugs distribution and application. A trust case represents an argument supporting the trustworthiness of the system. It is decomposed into claims that postulate some trust related properties. Claims differ...

    Full text available to download

  • Methodology of Affective Intervention Design for Intelligent Systems

    This paper concerns how intelligent systems should be designed to make adequate, valuable and natural affective interventions. The article proposes a process for choosing an affective intervention model for an intelligent system. The process consists of 10 activities that allow for step-by-step design of an affective feedback loop and takes into account the following factors: expected and desired emotional states, characteristics...

    Full text to download in external service

  • Operating system security by integrity checking and recovery using write-protected storage

    The paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...

    Full text available to download

  • ARIMA vs LSTM on NASDAQ stock exchange data
    Publication

    - Procedia Computer Science - Year 2022

    This study compares the results of two completely different models: statistical one (ARIMA) and deep learning one (LSTM) based on a chosen set of NASDAQ data. Both models are used to predict daily or monthly average prices of chosen companies listed on the NASDAQ stock exchange. Research shows which model performs better in terms of the chosen input data, parameters and number of features. The chosen models were compared using...

    Full text available to download

  • Uncertainty in emotion recognition

    Purpose–The purpose of this paper is to explore uncertainty inherent in emotion recognition technologiesand the consequences resulting from that phenomenon.Design/methodology/approach–The paper is a general overview of the concept; however, it is basedon a meta-analysis of multiple experimental and observational studies performed over the past couple of years.Findings–The mainfinding of the paper might be summarized as follows:...

    Full text to download in external service

  • Scaled agile framework. Dealing with software process‐related challenges of a financial group with the action research approach
    Publication

    - Journal of Software-Evolution and Process - Year 2022

    This article reports on a domain-specific software development venture at Nordea. We explore organizational constraints, challenges, and corrective actions undertaken when scaling the agile development approach of their Core Banking Platform program. The fit and required customizations of the rather complex and rigid SAFe framework in a policy-heavy financial institution are audited against the organic growth of the program. In...

    Full text available to download

  • On the Usefulness of the Generalised Additive Model for Mean Path Loss Estimation in Body Area Networks

    In this article, the usefulness of the Generalised Additive Model for mean path loss estimation in Body Area Networks is investigated. The research concerns a narrow-band indoor off-body network operating at 2.45 GHz, being based on measurements performed with four different users. The mean path loss is modelled as a sum of four components that depend on path length, antenna orientation angle, absolute difference between transmitting...

    Full text available to download

  • Supporting Assurance by Evidence-based Argument Services

    Structured arguments based on evidence are used in many domains, including systems engineering, quality assurance and standards conformance. Development, maintenance and assessment of such arguments is addressed by TRUST-IT methodology outlined in this paper. The effective usage of TRUST-IT requires an adequate tool support. We present a platform of software services, called NOR-STA, available in the Internet, supporting key activities...

    Full text available to download

  • Supporting Compliance with Security Standards by Trust Case Templates
    Publication

    - Year 2007

    Trust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....

  • Selecting Requirements Documentation Techniques for Software Projects: a Survey Study
    Publication

    A significant number of techniques dedicated to requirements specification and documentation is described in the available sources. As there is no purpose to use all of them, a selection has to be made, taking into consideration the context of a given software project, for example its size, usage of agile approach or stakeholders' technical competency. This paper is intended to provide guidelines for such selection. We reviewed...

    Full text available to download

  • Adopting collaborative games into Open Kanban
    Publication

    - Year 2016

    The crucial element of any agile project is people. Not surprisingly, principles and values such as "Respect for people", "Communication and Collaboration", "Lead using a team approach", and "Learn and improve continuously" are an integral part of Open Kanban. However, Open Kanban has not provided any tools or techniques to aid the human side of software development. Moreover, as a Lean initiative, it is not as comprehensively...

    Full text to download in external service

  • Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments
    Publication

    - SENSORS - Year 2023

    [Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...

    Full text available to download

  • Limitations of Emotion Recognition from Facial Expressions in e-Learning Context
    Publication

    The paper concerns technology of automatic emotion recognition applied in e-learning environment. During a study of e-learning process the authors applied facial expressions observation via multiple video cameras. Preliminary analysis of the facial expressions using automatic emotion recognition tools revealed several unexpected results, including unavailability of recognition due to face coverage and significant inconsistency...

    Full text to download in external service

  • Developing Novel Solutions to Realise the European Energy - Information Sharing & Analysis Centre
    Publication

    For more effective decision making in preparation for and response to cyberevents in the energy sector, multilevel situation awareness, from technical to strategic is essential. With an uncertain picture of evolving threats, sharing of the latest cybersecurity knowledge among all sector stakeholders can inform and improve decisions and responses. This paper describes two novel solutions proposed during the formation of the European...

    Full text available to download