Publikacje
Filtry
wszystkich: 504
Katalog Publikacji
Rok 2018
-
Improving the Accuracy in Sentiment Classification in the Light of Modelling the Latent Semantic Relations
PublikacjaThe research presents the methodology of improving the accuracy in sentiment classification in the light of modelling the latent semantic relations (LSR). The objective of this methodology is to find ways of eliminating the limitations of the discriminant and probabilistic methods for LSR revealing and customizing the sentiment classification process (SCP) to the more accurate recognition of text tonality. This objective was achieved...
-
Integration in Multichannel Emotion Recognition
PublikacjaThe paper concerns integration of results provided by automatic emotion recognition algorithms. It presents both the challenges and the approaches to solve them. Paper shows experimental results of integration. The paper might be of interest to researchers and practitioners who deal with automatic emotion recognition and use more than one solution or multichannel observation.
-
Introducing agile practices into development processes of safety critical software
PublikacjaIn this paper we present AgileSafe - a method which supports introduction of agile practices into safety-critical software development processes. To represent safety assurance constraints resulting from the regulatory context, AgileSafe uses assurance case patterns. The knowledge base of AgileSafe helps the user to select the agile practices relevant for the considered software development project. The corresponding assurance case...
-
MaliciousIDE – software development environment that evokes emotions
PublikacjaEmotions affect every aspect of human live, including work. Numerous studies in software engineering have shown that negative emotions can lower the productivity of programmers. Unlike traditional approaches to managing software development, modern methods, such as Agile and Lean, take into account human aspects of programming. To thoroughly investigate the impact of negative emotions on the work of programmers, a malicious integrated...
-
Methodology for Text Classification using Manually Created Corpora-based Sentiment Dictionary
PublikacjaThis paper presents the methodology of Textual Content Classification, which is based on a combination of algorithms: preliminary formation of a contextual framework for the texts in particular problem area; manual creation of the Hierarchical Sentiment Dictionary (HSD) on the basis of a topically-oriented Corpus; tonality texts recognition via using HSD for analysing the documents as a collection of topically completed fragments...
-
Positive Risk of Creativity in Software Projects: an Expected Result, a Threat or an Opportunity?
PublikacjaPositive risk of creativity appears when there is an excess of creativity. This paper aims at exploring the concept of positive risk of creativity in software projects. It presents a taxonomy of positive risks as well as case studies of positive risks in diploma software projects. It also attempts to answer the question whether positive risks should be treated as expected results of applying creativity process, or they cause additional...
-
Problems and Solutions of Software Design in Scrum Projects
PublikacjaThe aim of the paper is to identify the problems and solutions of the software design in Scrum project as well as to analyze the effectiveness of the solutions. Through a series of workshops with 4 experts from IT industry and academia we have identified 52 problems and 99 unique solutions. In this paper we present a list of 10 common problems and 5 solutions for each problem selected by the number of sources. The effectiveness...
-
RYZYKO KREATYWNOŚCI W PROJEKTACH INFORMATYCZNYCH
PublikacjaRyzyko kreatywności dotyczy sytuacji, w których nie są osiągane zamierzone cele związane z kreatywnością lub występują niekorzystne skutki uboczne zastosowania metod kreatywności. W artykule dokonano systematyzacji tych zjawisk z wykorzystaniem wymiarów ukierunkowywania kreatywności i ujęto je w kategoriach zarządzania ryzykiem w projekcie. Wynikiem tych prac jest lista zagrożeń i czynników ryzyka kreatywności, która została zweryfikowana i...
-
Sztuczna inteligencja - oksymoron czy oczywistość?
PublikacjaW artykule przedstawiono historię powstania i rozwoju sztucznej inteligencji, jej główne obszary badawcze i perspektywy. Szczególną uwagę poświęcono uczeniu maszynowemu jako głównemu obszarowi badań naukowych. Sformułowano i skomentowano hipotezy dotyczące perspektyw sztucznej inteligencji.
-
The algorithm of building the hierarchical contextual framework of textual corpora
PublikacjaThis paper presents an approach for Modeling the Latent Semantic Relations. The approach is based on advantages of two computational approaches: Latent Semantic Analysis and Latent Dirichlet Allocation. The scientific question about the possibility of reducing the influence of these Methods limitation on the Quality of the Latent Semantic Relations Analysis Results is raised. The case study for building the Two-level Hierarchical Contextual...
-
The Role of a Software Product Manager in Various Business Environments
PublikacjaThe aim of the paper is to identify the role of the software product manager depending on the size of the company and the characteristics of the product they are working on. This has been achieved in cooperation with 15 experts from the IT industry. The companies were divided into 4 levels of size: micro-enterprises, small businesses, medium businesses and large enterprises. The characteristics of the products were divided into...
-
Towards New Mappings between Emotion Representation Models
PublikacjaThere are several models for representing emotions in affect-aware applications, and available emotion recognition solutions provide results using diverse emotion models. As multimodal fusion is beneficial in terms of both accuracy and reliability of emotion recognition, one of the challenges is mapping between the models of affect representation. This paper addresses this issue by: proposing a procedure to elaborate new mappings,...
-
Utilizing online collaborative games to facilitate Agile Software Development
PublikacjaEffective collaboration and interaction among the development team and between the team and the customer as well as proactive attitude in initiating and implementing improvements play vital roles in the success of agile projects. The challenge is how to address these social aspects since neither the Agile Manifesto nor the Scrum Guide specify techniques that aid the human side of software development. To fill this gap, we developed...
-
What Is Troubling IT Analysts? A Survey Report from Poland on Requirements-Related Problems
PublikacjaRequirements engineering and business analysis are activities considered to be important to software project success but also difficult and challenging. This paper reports on a survey conducted in Polish IT industry, aimed at identifying most widespread problems/challenges related to requirements. The survey was targeted at people performing role of analyst in commercial IT projects. The questionnaire included 64 pre-defined problems...
-
Which digital games are appropriate for our children?
PublikacjaChapter contains advice on which digital games are accessible for children with diverse impairments. It providess a process for choosing the device, the game and adjusting it. It might be of use for therapists, techers and caregivers.
Rok 2017
-
A Survey on Identifying and Addressing Business Analysis Problems
PublikacjaDespite the growing body of knowledge on requirements engineering and business analysis, these areas of software project are still considered problematic. The paper focuses on problems reported by business analysts and on applicability of available business analysis techniques as solutions to such problems. A unified set of techniques was developed on the basis of 3 industrial standards associated with IIBA, REQB and IREB certification...
-
Assurance Case Patterns On-line Catalogue
PublikacjaAssurance case is an evidence-based argument demonstrating that a given property of a system (e.g. safety, security) is assured. Assurance cases are developed for high integrity systems, as in many industry domains such argu-ment is explicitly required by regulations. Despite the fact that each assurance case is unique, several reusable argument patterns have been identified and pub-lished. This paper reports work on development...
-
Automatic recognition of therapy progress among children with autism
PublikacjaThe article presents a research study on recognizing therapy progress among children with autism spectrum disorder. The progress is recognized on the basis of behavioural data gathered via five specially designed tablet games. Over 180 distinct parameters are calculated on the basis of raw data delivered via the game flow and tablet sensors - i.e. touch screen, accelerometer and gyroscope. The results obtained confirm the possibility...
-
Badania nad e-technologiami wspierającymi terapię autyzmu
PublikacjaArtykuł opisuje badania i osiągnięcia we wspomaganiu automatycznego pomiaru postępów dzieci z autyzmem. Badania te zostały zrealizowane w ramach projektu AUTMON realizowanego na Politechnice Gdańskiej, WETI w latach 2015-2017
-
Behaviometrics of Digital Games for Children with Autism Spectrum Disorder
PublikacjaTe paper reports current stage of the project Automated Terapy Monitoring for Children with Developmental Disorders of Autism Spectrum (AUTMON), that aims at development of methods and tools to allow for the automatic evaluation of the therapy progress among children with autism. Finding objective measures suitable for evaluating therapy progress would let create a system supporting those who diagnose autism and the therapists...
-
DUABI - Business Intelligence Architecture for Dual Perspective Analytics
PublikacjaA significant expansion of Big Data and NoSQL databases made it necessary to develop new architectures for Business Intelligence systems based on data organized in a non-relational way. There are many novel solutions combining Big Data technologies with Data Warehousing. However, the proposed solutions are often not sufficient enough to meet the increasing business demands, such as low data latency while still maintaining high...
-
Extending Expressiveness of Knowledge Description with Contextual Approach
PublikacjaIn the paper we show how imposing the contextual structure of a knowledge base can lead to extending its expressiveness without changing the underlying language. We show this using the example of Description Logics, which constitutes a base for a range of dialects for expressing knowledge in ontologies (including state-of-the-art OWL). While the contextual frameworks have been used in knowledge bases, they have been perceived as...
-
Investigation of educational processes with affective computing methods
PublikacjaThis paper concerns the monitoring of educational processes with the use of new technologies for the recognition of human emotions. This paper summarizes results from three experiments, aimed at the validation of applying emotion recognition to e-learning. An analysis of the experiments’ executions provides an evaluation of the emotion elicitation methods used to monitor learners. The comparison of affect recognition algorithms...
-
Limitations of Emotion Recognition from Facial Expressions in e-Learning Context
PublikacjaThe paper concerns technology of automatic emotion recognition applied in e-learning environment. During a study of e-learning process the authors applied facial expressions observation via multiple video cameras. Preliminary analysis of the facial expressions using automatic emotion recognition tools revealed several unexpected results, including unavailability of recognition due to face coverage and significant inconsistency...
-
Making agile retrospectives more awesome
PublikacjaAccording to the textbook [23], Scrum exists only in its entirety, where every component is essential to Scrum’s success. However, in many organizational environments some of the components are omitted or modified in a way that is not aligned with the Scrum guidelines. Usually, such deviations result in missing the full benefits of Scrum [24]. Thereby, a Scrum process should be frequently inspected and any deviations should be...
-
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile
PublikacjaThe paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...
-
Metoda analizy związanych z czasem wymagań dotyczących bezpieczeństwa systemów komputerowych
PublikacjaBezpieczeństwo jest pożądaną cecha systemów przemysłowych, transportowych i innych typów. A ponieważ do sterowania tymi systemami powszechnie stosuje się systemy komputerowe, jest ono również ważną cechą oprogramowania. Analiza bezpieczeństwa oprogramowania jest jednak, ze względu na jego niematerialność, trudniejsza od typowej analizy. Ponadto, ze względu na skomplikowane reguły sterujące oraz naturę kontrolowanych systemów, bezpieczeństwo...
-
Postrzeganie inwazyjności automatycznego rozpoznawania emocji w kontekście edukacyjnym
PublikacjaArtykuł dotyczy aktualnych trendów w konstrukcji inteligentnych systemów edukacyjnych, uwzględniających stan emocjonalny ucznia w doborze ścieżki nauczania. Artykuł przedstawia założenia i rezultaty badania ankietowego, którego celem było określenie, jak zastosowanie automatycznego rozpoznawania emocji jest postrzegane w kontekście edukacyjnym. Badanie przeprowadzono wśród studentów oraz pracowników uczelni wyższych w Polsce. Rezultaty...
-
Przyjazne aplikacje dla dzieci z autyzmem – e-edukacja na poziomie przedszkolnym
PublikacjaArtykuł dotyczy możliwości wykorzystania aplikacji na tablety do wspomagania terapii dzieci z zaburzeniami rozwojowymi ze spektrum autyzmu. Przedstawia studium przypadku skutecznego zastosowania e-technologii w kształceniu specjalnym na poziomie przedszkolnym. Artykuł opisuje zestaw aplikacji edukacyjnych o nazwie Przyjazne Aplikacje, których celem jest wspieranie terapii dzieci z autyzmem opartej o stosowaną...
-
SACAM A Model for Describing and Classifying Sentiment Analysis Methods
PublikacjaIn this paper we introduce SACAM — a model for describing and classifying sentiment analysis (SA) methods. The model focuses on the knowledge used during processing textual opinions. SACAM was designed to create informative descriptions of SA methods (or classes of SA methods) and is strongly integrated with its accompanying graphical notation suited for presenting the descriptions in diagrammatical form. The paper discusses applications...
-
Selecting Requirements Documentation Techniques for Software Projects: a Survey Study
PublikacjaA significant number of techniques dedicated to requirements specification and documentation is described in the available sources. As there is no purpose to use all of them, a selection has to be made, taking into consideration the context of a given software project, for example its size, usage of agile approach or stakeholders' technical competency. This paper is intended to provide guidelines for such selection. We reviewed...
-
Serendipitous Recommendations Through Ontology-Based Contextual Pre-filtering
PublikacjaContext-aware Recommender Systems aim to provide users with better recommendations for their current situation. Although evaluations of recommender systems often focus on accuracy, it is not the only important aspect. Often recommendations are overspecialized, i.e. all of the same kind. To deal with this problem, other properties can be considered, such as serendipity. In this paper, we study how an ontology-based and context-aware...
-
The Algorithm of Modelling and Analysis of Latent Semantic Relations: Linear Algebra vs. Probabilistic Topic Models
PublikacjaThis paper presents the algorithm of modelling and analysis of Latent Semantic Relations inside the argumentative type of documents collection. The novelty of the algorithm consists in using a systematic approach: in the combination of the probabilistic Latent Dirichlet Allocation (LDA) and Linear Algebra based Latent Semantic Analysis (LSA) methods; in considering each document as a complex of topics, defined on the basis of separate...
-
Top k Recommendations using Contextual Conditional Preferences Model
PublikacjaRecommender systems are software tools and techniques which aim at suggesting to users items they might be interested in. Context-aware recommender systems are a particular category of recommender systems which exploit contextual information to provide more adequate recommendations. However, recommendation engines still suffer from the cold-start problem, namely where not enough information about users and their ratings is available....
-
Trust Management Method for Wireless Sensor Networks
PublikacjaA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
Trust, Tacit Knowledge Sharing, Project Performance and their Managerial Implications
PublikacjaTacit Knowledge Sharing is increasingly attracting the attention of scientists and managers intrigued by their potential application for creating innovative solutions. Project management as a set of methodologies and best practices need to be charged by knowledge. The research problem tackled in this article refers to a current managerial problem regarding tacit knowledge sharing execution in project based organizations. The objective...
-
Uniform Model Interface for Assurance Case Integration with System Models
PublikacjaAssurance cases are developed and maintained in parallel with corresponding system models and therefore need to reference each other. Managing the correctness and consistency of interrelated safety argument and system models is essential for system dependability and is a nontrivial task. The model interface presented in this paper enables a uniform process of establishing and managing assurance case references to various types...
-
Zarządzanie kreatywnością w projekcie
PublikacjaW kontekście innowacyjności oraz badań w obszarze nauk technicznych pojawia się problem efektywnego zastosowania metod kreatywności w konkretnej sytuacji projektowej oraz weryfikacji wyników podejmowanych działań kreatywnych. Celem referatu jest zaproponowanie podejścia do zarządzania kreatywnością w projekcie w oparciu o wiedzę pochodzącą z psychologii kreatywności. Zaprezentowano ramy zarządzania kreatywnością z zastosowaniem...
Rok 2016
-
A CONTEXT IN RECOMMENDER SYSTEMS
PublikacjaRecommender systems aim to propose potentially interesting items to a user based on his preferences or previous interaction with the system. In the last decade, researcher found out that known recommendation techniques are not sufficient to predict user decisions. It has been noticed that user preferences strongly depend on the context in which he currently is. This raises new challenges for the researchers such as how to obtain...
-
Adopting collaborative games into Open Kanban
PublikacjaThe crucial element of any agile project is people. Not surprisingly, principles and values such as "Respect for people", "Communication and Collaboration", "Lead using a team approach", and "Learn and improve continuously" are an integral part of Open Kanban. However, Open Kanban has not provided any tools or techniques to aid the human side of software development. Moreover, as a Lean initiative, it is not as comprehensively...
-
AgileSafe – a method of introducing agile practices into safety-critical software development processes
PublikacjaThis article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the software assurance requirements imposed by the application domain. We present the description of the method covering the process of its application and the input and output artefacts.
-
An Industrial Survey on Business Analysis Problems and Solutions
PublikacjaThe paper focuses on the problems reported by business analysts which have a negative impact on their work and on the applicability of available business analysis (BA) techniques as solutions to such problems. A unified set of BA techniques was developed on the basis of 3 industrial standards associated with IIBA, REQB and IREB certification schemes. A group of 8 business analysts was surveyed to list problems they encounter in...
-
An Ontology-based Contextual Pre-filtering Technique for Recommender Systems
PublikacjaContext-aware Recommender Systems aim to provide users with the most adequate recommendations for their current situation. However, an exact context obtained from a user could be too specific and may not have enough data for accurate rating prediction. This is known as the data sparsity problem. Moreover, often user preference representation depends on the domain or the specific recommendation approach used. Therefore, a big effort...
-
Applications for investigating therapy progress of autistic children
PublikacjaThe paper regards supporting behavioral therapy of autistic children with mobile applications, specifically applied for measuring the child’s progress. A family of five applications is presented, that was developed as an investigation tool within the project aimed at automation of therapy progress monitoring. The applications were already tested with children with autism spectrum disorder. Hereby we analyse children’ experience...
-
Automatic recognition of males and females among web browser users based on behavioural patterns of peripherals usage
PublikacjaPurpose The purpose of this paper is to answer the question whether it is possible to recognise the gender of a web browser user on the basis of keystroke dynamics and mouse movements. Design/methodology/approach An experiment was organised in order to track mouse and keyboard usage using a special web browser plug-in. After collecting the data, a number of parameters describing the users’ keystrokes, mouse movements and clicks...
-
Badanie sieci świadomości sytuacyjnej dla infrastruktury elektroenergetycznej
PublikacjaWspółczesne systemy elektroenergetyczne są narażone na nowe rodzaje zagrożeń. Są one spowodowane lukami w zabezpieczeniach oraz słabościami architektonicznymi związanymi z szerszym zastosowaniem technologii teleinformatycznych (ICT) w tych systemach. Połączenie sieci elektroenergetycznych z Internetem naraża je na nowego rodzaju niebezpieczeństwa, takie jak ataki APT (ang. Advanced Persistent Threats) lub rozproszona odmowa usługi...
-
Comparison of selected off-the-shelf solutions for emotion recognition based on facial expressions
PublikacjaThe paper concerns accuracy of emotion recognition from facial expressions. As there are a couple of ready off-the-shelf solutions available in the market today, this study aims at practical evaluation of selected solutions in order to provide some insight into what potential buyers might expect. Two solutions were compared: FaceReader by Noldus and Xpress Engine by QuantumLab. The performed evaluation revealed that the recognition...
-
Designing effective educational games - a case study of a project management game
PublikacjaThis paper addresses the issues of designing effective educational games. We aim at investigating how the cognitive, behavioral and emotional aspects of the games influence their educational effectiveness. The results were obtained with an observational user experience study extended with affect analysis carried out for a project management game GraPM. We analyzed the...
-
Druga edycja Konferencji Inżynierii Oprogramowania beIT
PublikacjaW dniach 18–20 marca 2016 roku na Wydziale Elektroniki, Telekomunikacji i Informatyki odbyła się II Konferencja Inżynierii Oprogramowania beIT. Podobnie jak pierwszą edycję Konferencji beIT, tegoroczne spotkanie zorganizowało Koło Naukowe Zarządzanie IT przy wsparciu Katedry Inżynierii Oprogramowania, WETI oraz JM Rektora PG. Do przeprowadzenia 15 warsztatów, 4 sesji dyskusyjnych round tables oraz 5 wykładów organizatorzy zaprosili...
-
Friendly Applications: supporting education of children with autism
PublikacjaFriendly Applications is a project introducing a family of applications supporting education of children with autism at kindergarten level. The applications were developed as a joint initiative of Gdansk University of Technology and Institute for Child Development, which uses the applications in daily educational activities.