Department of Software Engineering - Administrative Units - Bridge of Knowledge

Search

Department of Software Engineering

Filters

total: 477

  • Category
  • Year
  • Options

clear Chosen catalog filters disabled

Catalog Publications

Year 2024
  • Usability Testing of Mobile Applications: A Methodological Framework
    Publication

    Less than five percent of all mobile applications have become successful throughout 2023. The success of a new mobile application depends on a variety of factors ranging from business understanding, customer value, and perceived quality of use. In this sense, the topic of usability testing of mobile applications is relevant from the point of view of user satisfaction and acceptance. However, the current knowledge seems to be fragmented,...

    Full text available to download

  • Ontology-based text convolution neural network (TextCNN) for prediction of construction accidents
    Publication
    • S. Donghui
    • L. Zhigang
    • J. Zurada
    • A. Manikas
    • J. Guan
    • P. Weichbroth

    - KNOWLEDGE AND INFORMATION SYSTEMS - Year 2024

    The construction industry suffers from workplace accidents, including injuries and fatalities, which represent a significant economic and social burden for employers, workers, and society as a whole.The existing research on construction accidents heavily relies on expert evaluations,which often suffer from issues such as low efficiency, insufficient intelligence, and subjectivity.However, expert opinions provided in construction...

    Full text to download in external service

  • Exploring the Benefits, Challenges, and Opportunities of Collaborative Business Intelligence
    Publication

    - Year 2024

    In traditional business intelligence (BI) settings, the collective decision-making process is often hindered by the absence of knowledge and expertise exchange among various stakeholders, as well as lack of information sharing. The study delves into the concept of Collaborative BI, which aims to overcome these limitations by promoting collaboration, business networking, knowledge sharing, and improved communication among stakeholders....

    Full text available to download

  • Exploring Relationships Between Data in Enterprise Information Systems by Analysis of Log Contents
    Publication

    - Year 2024

    Enterprise systems are inherently complex and maintaining their full, up-to-date overview poses a serious challenge to the enterprise architects’ teams. This problem encourages the search for automated means of discovering knowledge about such systems. An important aspect of this knowledge is understanding the data that are processed by applications and their relationships. In our previous work, we used application logs of an enterprise...

    Full text to download in external service

  • Anomaly Detection in Railway Sensor Data Environments: State-of-the-Art Methods and Empirical Performance Evaluation
    Publication

    - SENSORS - Year 2024

    To date, significant progress has been made in the field of railway anomaly detection using technologies such as real-time data analytics, the Internet of Things, and machine learning. As technology continues to evolve, the ability to detect and respond to anomalies in railway systems is once again in the spotlight. However, railway anomaly detection faces challenges related to the vast infrastructure, dynamic conditions, aging...

    Full text to download in external service

Year 2023
Year 2022
Year 2021
Year 2020
  • Usability of mobile applications: a systematic literature study
    Publication

    - IEEE Access - Year 2020

    Since the release of the first mobile devices, the usability of on-board applications has been the concern not only of software vendors but hardware manufacturers as well. The academia community later willingly joined the discussion on usability in terms of theory and empirical measurement, having experience and knowledge in desktop settings. At first sight, such a background should guarantee a solid foundation to conduct research...

    Full text available to download

  • Towards a Lightweight Approach for the Evaluation of Requirements Engineering Impact on Other IT Project Areas
    Publication

    Requirements Engineering (RE) is recognized as one of the most important, but difficult areas of software engineering, with a significant impact on other areas of the IT project and its final outcome. The empirical studies investigating this impact are hard to conduct, mainly due to large effort required. It is thus difficult for researchers and even more for industry practitioners to make evidence-based evaluations, how decisions...

    Full text available to download

  • The Impact of Lexicon Adaptation on the Emotion Mining From Software Engineering Artifacts
    Publication

    - IEEE Access - Year 2020

    Sentiment analysis and emotion mining techniques are increasingly being used in the field of software engineering. However, the experiments conducted so far have not yielded high accuracy results. Researchers indicate a lack of adaptation of the methods of emotion mining to the specific context of the domain as the main cause of this situation. The article describes research aimed at examining whether the adaptation of the lexicon...

    Full text available to download

  • Scientific Collaboration, Citation and Topic Analysis of International Conference on Agile Software Development Papers
    Publication

    - Year 2020

    The International Conference on Agile Software Development (XP) was established almost sixteen years ago. Based on data from Scopus database, a total of 789 papers have been published in between years of 2002 and 2018. We employed bibliometrics analysis and topic modeling with R/RStudio to analyze these published papers from various dimensions, including the most active authors, collaboration of authorship, most cited papers, used...

    Full text to download in external service

  • Robot Eye Perspective in Perceiving Facial Expressions in Interaction with Children with Autism
    Publication

    The paper concerns automatic facial expression analysis applied in a study of natural “in the wild” interaction between children with autism and a social robot. The paper reports a study that analyzed the recordings captured via a camera located in the eye of a robot. Children with autism exhibit a diverse level of deficits, including ones in social interaction and emotional expression. The aim of the study was to explore the possibility...

    Full text to download in external service

  • Playing the Sprint Retrospective: A Replication Study
    Publication

    - Year 2020

    The Sprint Retrospective is a vehicle for continuous process improvement. Even though it is a well established agile practice, running effective retrospective meetings is challenging. There have been a lot of identified problems that commonly occur during these meetings. To address them, Przybyłek & Kotecka [20] successfully revitalized retrospective meetings by adopting collaborative games, which represent a powerful tool in improving...

    Full text to download in external service

  • On the Usefulness of the Generalised Additive Model for Mean Path Loss Estimation in Body Area Networks

    In this article, the usefulness of the Generalised Additive Model for mean path loss estimation in Body Area Networks is investigated. The research concerns a narrow-band indoor off-body network operating at 2.45 GHz, being based on measurements performed with four different users. The mean path loss is modelled as a sum of four components that depend on path length, antenna orientation angle, absolute difference between transmitting...

    Full text available to download

  • Mobile Security: Threats and Best Practices
    Publication

    - Mobile Information Systems - Year 2020

    Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...

    Full text available to download

  • Improving the Performance of Ontological Querying by using a Contextual Approach

    In the paper we present the results of experiment we performed to determine whether a contextual approach may be used to increase the performance of querying a knowledge base. For the experiments we have used a unique setting where we put much effort in developing a contextual and a non-contextual ontology which are as much close counterparts as possible. To achieve this we created a contextual version...

    Full text available to download

  • Identification of the Agile Mindset and Its Comparison to the Competencies of Selected Agile Roles
    Publication

    - Year 2020

    In this paper we present the results of the identification and evalua-tion of the elements of an agile mindset as well as its comparison to the compe-tence models for the roles of Scrum Master, Product Owner and agile analyst. We have identified 70 unique agile mindset elements from literature and 5 in-terviews with experts. Based on an opinion survey among 52 agile practitioners we evaluated the importance of 26 selected elements...

    Full text to download in external service

  • Exploring Impact of Requirements Engineering on Other IT Project Areas – Case Study
    Publication

    Requirements Engineering (RE) is recognized as one of the most important (yet difficult) areas of software engineering that has a significant impact on other areas of IT projects and their final outcomes. Empirical studies investigating this impact are hard to conduct, mainly due to the great effort required. It is thus difficult for both researchers and industry practitioners to make evidence-based evaluations about how decisions...

    Full text available to download

  • Exploring application relationships within enterprise system by matching messages in enterprise log
    Publication

    - Year 2020

    With data becoming their key asset, large enterprises require data governance processes to maintain its quality. Because a large portion of business value in enterprise systems is usually delivered by legacy applications without proper documentation, there is a need for a better understanding of these applications and the data produced by them. In this paper, we present an approach to collecting insights into the data managed by...

    Full text to download in external service

  • Evaluation of Selected UX Techniques by Product Managers - A Preliminary Survey
    Publication

    - Year 2020

    In this paper we present the results of an opinion survey among 28 IT product managers who evaluated the subjective usefulness of 24 selected UX techniques to 6 IT product management tasks derived from ProdBOK®. We selected the UX techniques based on the literature review and 6 interviews with experienced IT product managers. Based on the survey results, we propose our recommendation of useful techniques for 5 of the 6 studied...

    Full text to download in external service

  • EduAkcja. Historia pewnego czasopisma
    Publication

    - Year 2020

    Rozdział przedstawia przebieg inicjatywy powołania czasopisma poświęconego zdalnemu nauczaniu o nazwie EduAkcja. Magazyn edukacji elektronicznej

  • Contextual ontology for tonality assessment
    Publication

    classification tasks. The discussion focuses on two important research hypotheses: (1) whether it is possible to construct such an ontology from a corpus of textual document, and (2) whether it is possible and beneficial to use inferencing from this ontology to support the process of sentiment classification. To support the first hypothesis we present a method of extraction of hierarchy of contexts from a set of textual documents...

    Full text available to download

  • Choosing Exploration Process Path in Data Mining Processes for Complex Internet Objects

    We present an experimental case study of a novel and original framework for classifying aggregate objects, i.e. objects that consist of other objects. The features of the aggregated objects are converted into the features of aggregate ones, by use of aggregate functions. The choice of the functions, along with the specific method of classification can be automated by choosing of one of several process paths, and different paths...

    Full text to download in external service

  • Choosing Exploration Process Path in Data Mining Processes for Complex Internet Objects
    Publication

    - Year 2020

    We present an experimental case study of a novel and original framework for classifying aggregate objects, i.e. objects that consist of other objects. The features of the aggregated objects are converted into the features of aggregate ones, by use of aggregate functions. The choice of the functions, along with the specific method of classification can be automated by choosing of one of several process paths, and different paths...

    Full text to download in external service

  • Child-Robot Interaction Studies During COVID-19 Pandemic
    Publication
    • P. Uluer
    • H. Kose
    • A. Landowska
    • T. Zorcec
    • B. Robins
    • D. Erol Barkana

    - Year 2020

    The coronavirus disease (COVID-19) pandemic affected our lives deeply, just like everyone else, the children also suffered from the restrictions due to COVID-19 affecting their education and social interactions with others, being restricted from play areas and schools for a long time. Although social robots provide a promising solution to support children in their education, healthcare, and social interaction with others, the precautions...

    Full text to download in external service

  • BIG PROBLEMS WITH BIG DATA
    Publication

    - TASK Quarterly - Year 2020

    The article presents an overview of the most important issues related to the phenomenon called big data. The characteristics of big data concerning the data itself and the data sources are presented. Then, the big data life cycle concept is formulated. The next sections focus on two big data technologies: MapReduce for big data processing and NoSQL databases for big data storage.

    Full text available to download

  • Agile Requirements Prioritization in Practice: Results of an Industrial Survey
    Publication

    Agile software development stresses the importance of providing the customer with a product of a maximized business value. To achieve that, requirements prioritization is used. Agile development methods like Scrum define guidelines for prioritization, however practitioners do not necessarily have to follow them. Our goal was to investigate the industry practice related to requirements prioritization process, including its timing,...

    Full text available to download

  • Adapting Agile Practices to Security Context – Practitioners’ Perspective
    Publication

    In this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...

    Full text to download in external service

Year 2019
  • Using Evidence-based Arguments to Support Dependability Assurance-Experiences and Challenges
    Publication

    The article introduces to the problem of evidence-based arguments and their applications. Then, based on the experiences collected during commercial deployment of a concrete solution to this problem (system NOR-STA) we overview selected challenges and the ways of addressing them

    Full text available to download

  • Uncertainty in emotion recognition

    Purpose–The purpose of this paper is to explore uncertainty inherent in emotion recognition technologiesand the consequences resulting from that phenomenon.Design/methodology/approach–The paper is a general overview of the concept; however, it is basedon a meta-analysis of multiple experimental and observational studies performed over the past couple of years.Findings–The mainfinding of the paper might be summarized as follows:...

    Full text to download in external service

  • Threat intelligence platform for the energy sector

    In recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...

    Full text available to download

  • Things You Might Not Know about the k-Nearest Neighbors Algorithm
    Publication

    Recommender Systems aim at suggesting potentially interesting items to a user. The most common kind of Recommender Systems is Collaborative Filtering which follows an intuition that users who liked the same things in the past, are more likely to be interested in the same things in the future. One of Collaborative Filtering methods is the k Nearest Neighbors algorithm which finds k users who are the most similar to an active user...

    Full text to download in external service

  • Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components
    Publication

    The chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...

    Full text available to download

  • Software Factory project for enhancement of student experiential learning
    Publication

    - Year 2019

    Providing opportunities for students to work on real-world software development projects for real customers is critical to prepare students for the IT industry. Such projects help students to understand what they will face in the industry and experience real customer interaction and challenges in collaborative work. To provide this opportunity in an academic environment and enhance the learning and multicultural teamwork experience,...

  • Software development methodologies and practices in start-ups
    Publication

    - IET Software - Year 2019

    Software start-ups are aiming to develop cutting-edge software products under highly uncertain conditions, overcoming fast-growing markets under multiple influences. This study aims to identify and analyse the existing scientific literature regarding software development methodologies and practices in software start-ups published between January 2006 and December 2017 using the systematic mapping study. The results identified 37...

    Full text available to download

  • Security-oriented agile approach with AgileSafe and OWASP ASVS
    Publication

    In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...

  • Scoreboard Architectural Pattern and Integration of Emotion Recognition Results
    Publication

    This paper proposes a new design pattern, named Scoreboard , dedicated for applications solving complex, multi-stage, non-deterministic problems. The pattern provides a computational framework for the design and implementation of systems that integrate a large number of diverse specialized modules that may vary in accuracy, solution level, and modality. The Scoreboard is an extension of Blackboard design pattern and comes under...

    Full text available to download

  • Residual MobileNets

    As modern convolutional neural networks become increasingly deeper, they also become slower and require high computational resources beyond the capabilities of many mobile and embedded platforms. To address this challenge, much of the recent research has focused on reducing the model size and computational complexity. In this paper, we propose a novel residual depth-separable convolution block, which is an improvement of the basic...

    Full text to download in external service

  • Representing Process Characteristics to Increase Confidence in Assurance Case Arguments
    Publication

    An assurance case is a structured, evidence-based argument demonstrating that a safety or other quality objective of a high integrity system is assured. Assurance cases are required or recommended in many industry domains as a means to convince the regulatory bodies to allow commissioning of such system. To be convincing, an argument should address all potential doubts and thus cover numerous additional issues, including the processes...

    Full text available to download