Publikacje
Filtry
wszystkich: 483
Katalog Publikacji
Rok 2017
-
DUABI - Business Intelligence Architecture for Dual Perspective Analytics
PublikacjaA significant expansion of Big Data and NoSQL databases made it necessary to develop new architectures for Business Intelligence systems based on data organized in a non-relational way. There are many novel solutions combining Big Data technologies with Data Warehousing. However, the proposed solutions are often not sufficient enough to meet the increasing business demands, such as low data latency while still maintaining high...
-
Extending Expressiveness of Knowledge Description with Contextual Approach
PublikacjaIn the paper we show how imposing the contextual structure of a knowledge base can lead to extending its expressiveness without changing the underlying language. We show this using the example of Description Logics, which constitutes a base for a range of dialects for expressing knowledge in ontologies (including state-of-the-art OWL). While the contextual frameworks have been used in knowledge bases, they have been perceived as...
-
Investigation of educational processes with affective computing methods
PublikacjaThis paper concerns the monitoring of educational processes with the use of new technologies for the recognition of human emotions. This paper summarizes results from three experiments, aimed at the validation of applying emotion recognition to e-learning. An analysis of the experiments’ executions provides an evaluation of the emotion elicitation methods used to monitor learners. The comparison of affect recognition algorithms...
-
Limitations of Emotion Recognition from Facial Expressions in e-Learning Context
PublikacjaThe paper concerns technology of automatic emotion recognition applied in e-learning environment. During a study of e-learning process the authors applied facial expressions observation via multiple video cameras. Preliminary analysis of the facial expressions using automatic emotion recognition tools revealed several unexpected results, including unavailability of recognition due to face coverage and significant inconsistency...
-
Making agile retrospectives more awesome
PublikacjaAccording to the textbook [23], Scrum exists only in its entirety, where every component is essential to Scrum’s success. However, in many organizational environments some of the components are omitted or modified in a way that is not aligned with the Scrum guidelines. Usually, such deviations result in missing the full benefits of Scrum [24]. Thereby, a Scrum process should be frequently inspected and any deviations should be...
-
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile
PublikacjaThe paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...
-
Metoda analizy związanych z czasem wymagań dotyczących bezpieczeństwa systemów komputerowych
PublikacjaBezpieczeństwo jest pożądaną cecha systemów przemysłowych, transportowych i innych typów. A ponieważ do sterowania tymi systemami powszechnie stosuje się systemy komputerowe, jest ono również ważną cechą oprogramowania. Analiza bezpieczeństwa oprogramowania jest jednak, ze względu na jego niematerialność, trudniejsza od typowej analizy. Ponadto, ze względu na skomplikowane reguły sterujące oraz naturę kontrolowanych systemów, bezpieczeństwo...
-
Postrzeganie inwazyjności automatycznego rozpoznawania emocji w kontekście edukacyjnym
PublikacjaArtykuł dotyczy aktualnych trendów w konstrukcji inteligentnych systemów edukacyjnych, uwzględniających stan emocjonalny ucznia w doborze ścieżki nauczania. Artykuł przedstawia założenia i rezultaty badania ankietowego, którego celem było określenie, jak zastosowanie automatycznego rozpoznawania emocji jest postrzegane w kontekście edukacyjnym. Badanie przeprowadzono wśród studentów oraz pracowników uczelni wyższych w Polsce. Rezultaty...
-
Przyjazne aplikacje dla dzieci z autyzmem – e-edukacja na poziomie przedszkolnym
PublikacjaArtykuł dotyczy możliwości wykorzystania aplikacji na tablety do wspomagania terapii dzieci z zaburzeniami rozwojowymi ze spektrum autyzmu. Przedstawia studium przypadku skutecznego zastosowania e-technologii w kształceniu specjalnym na poziomie przedszkolnym. Artykuł opisuje zestaw aplikacji edukacyjnych o nazwie Przyjazne Aplikacje, których celem jest wspieranie terapii dzieci z autyzmem opartej o stosowaną...
-
SACAM A Model for Describing and Classifying Sentiment Analysis Methods
PublikacjaIn this paper we introduce SACAM — a model for describing and classifying sentiment analysis (SA) methods. The model focuses on the knowledge used during processing textual opinions. SACAM was designed to create informative descriptions of SA methods (or classes of SA methods) and is strongly integrated with its accompanying graphical notation suited for presenting the descriptions in diagrammatical form. The paper discusses applications...
-
Selecting Requirements Documentation Techniques for Software Projects: a Survey Study
PublikacjaA significant number of techniques dedicated to requirements specification and documentation is described in the available sources. As there is no purpose to use all of them, a selection has to be made, taking into consideration the context of a given software project, for example its size, usage of agile approach or stakeholders' technical competency. This paper is intended to provide guidelines for such selection. We reviewed...
-
Serendipitous Recommendations Through Ontology-Based Contextual Pre-filtering
PublikacjaContext-aware Recommender Systems aim to provide users with better recommendations for their current situation. Although evaluations of recommender systems often focus on accuracy, it is not the only important aspect. Often recommendations are overspecialized, i.e. all of the same kind. To deal with this problem, other properties can be considered, such as serendipity. In this paper, we study how an ontology-based and context-aware...
-
The Algorithm of Modelling and Analysis of Latent Semantic Relations: Linear Algebra vs. Probabilistic Topic Models
PublikacjaThis paper presents the algorithm of modelling and analysis of Latent Semantic Relations inside the argumentative type of documents collection. The novelty of the algorithm consists in using a systematic approach: in the combination of the probabilistic Latent Dirichlet Allocation (LDA) and Linear Algebra based Latent Semantic Analysis (LSA) methods; in considering each document as a complex of topics, defined on the basis of separate...
-
Top k Recommendations using Contextual Conditional Preferences Model
PublikacjaRecommender systems are software tools and techniques which aim at suggesting to users items they might be interested in. Context-aware recommender systems are a particular category of recommender systems which exploit contextual information to provide more adequate recommendations. However, recommendation engines still suffer from the cold-start problem, namely where not enough information about users and their ratings is available....
-
Trust Management Method for Wireless Sensor Networks
PublikacjaA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
Uniform Model Interface for Assurance Case Integration with System Models
PublikacjaAssurance cases are developed and maintained in parallel with corresponding system models and therefore need to reference each other. Managing the correctness and consistency of interrelated safety argument and system models is essential for system dependability and is a nontrivial task. The model interface presented in this paper enables a uniform process of establishing and managing assurance case references to various types...
-
Zarządzanie kreatywnością w projekcie
PublikacjaW kontekście innowacyjności oraz badań w obszarze nauk technicznych pojawia się problem efektywnego zastosowania metod kreatywności w konkretnej sytuacji projektowej oraz weryfikacji wyników podejmowanych działań kreatywnych. Celem referatu jest zaproponowanie podejścia do zarządzania kreatywnością w projekcie w oparciu o wiedzę pochodzącą z psychologii kreatywności. Zaprezentowano ramy zarządzania kreatywnością z zastosowaniem...
Rok 2016
-
A CONTEXT IN RECOMMENDER SYSTEMS
PublikacjaRecommender systems aim to propose potentially interesting items to a user based on his preferences or previous interaction with the system. In the last decade, researcher found out that known recommendation techniques are not sufficient to predict user decisions. It has been noticed that user preferences strongly depend on the context in which he currently is. This raises new challenges for the researchers such as how to obtain...
-
Adopting collaborative games into Open Kanban
PublikacjaThe crucial element of any agile project is people. Not surprisingly, principles and values such as "Respect for people", "Communication and Collaboration", "Lead using a team approach", and "Learn and improve continuously" are an integral part of Open Kanban. However, Open Kanban has not provided any tools or techniques to aid the human side of software development. Moreover, as a Lean initiative, it is not as comprehensively...
-
AgileSafe – a method of introducing agile practices into safety-critical software development processes
PublikacjaThis article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the software assurance requirements imposed by the application domain. We present the description of the method covering the process of its application and the input and output artefacts.
-
An Industrial Survey on Business Analysis Problems and Solutions
PublikacjaThe paper focuses on the problems reported by business analysts which have a negative impact on their work and on the applicability of available business analysis (BA) techniques as solutions to such problems. A unified set of BA techniques was developed on the basis of 3 industrial standards associated with IIBA, REQB and IREB certification schemes. A group of 8 business analysts was surveyed to list problems they encounter in...
-
An Ontology-based Contextual Pre-filtering Technique for Recommender Systems
PublikacjaContext-aware Recommender Systems aim to provide users with the most adequate recommendations for their current situation. However, an exact context obtained from a user could be too specific and may not have enough data for accurate rating prediction. This is known as the data sparsity problem. Moreover, often user preference representation depends on the domain or the specific recommendation approach used. Therefore, a big effort...
-
Applications for investigating therapy progress of autistic children
PublikacjaThe paper regards supporting behavioral therapy of autistic children with mobile applications, specifically applied for measuring the child’s progress. A family of five applications is presented, that was developed as an investigation tool within the project aimed at automation of therapy progress monitoring. The applications were already tested with children with autism spectrum disorder. Hereby we analyse children’ experience...
-
Automatic recognition of males and females among web browser users based on behavioural patterns of peripherals usage
PublikacjaPurpose The purpose of this paper is to answer the question whether it is possible to recognise the gender of a web browser user on the basis of keystroke dynamics and mouse movements. Design/methodology/approach An experiment was organised in order to track mouse and keyboard usage using a special web browser plug-in. After collecting the data, a number of parameters describing the users’ keystrokes, mouse movements and clicks...
-
Badanie sieci świadomości sytuacyjnej dla infrastruktury elektroenergetycznej
PublikacjaWspółczesne systemy elektroenergetyczne są narażone na nowe rodzaje zagrożeń. Są one spowodowane lukami w zabezpieczeniach oraz słabościami architektonicznymi związanymi z szerszym zastosowaniem technologii teleinformatycznych (ICT) w tych systemach. Połączenie sieci elektroenergetycznych z Internetem naraża je na nowego rodzaju niebezpieczeństwa, takie jak ataki APT (ang. Advanced Persistent Threats) lub rozproszona odmowa usługi...
-
Comparison of selected off-the-shelf solutions for emotion recognition based on facial expressions
PublikacjaThe paper concerns accuracy of emotion recognition from facial expressions. As there are a couple of ready off-the-shelf solutions available in the market today, this study aims at practical evaluation of selected solutions in order to provide some insight into what potential buyers might expect. Two solutions were compared: FaceReader by Noldus and Xpress Engine by QuantumLab. The performed evaluation revealed that the recognition...
-
Designing effective educational games - a case study of a project management game
PublikacjaThis paper addresses the issues of designing effective educational games. We aim at investigating how the cognitive, behavioral and emotional aspects of the games influence their educational effectiveness. The results were obtained with an observational user experience study extended with affect analysis carried out for a project management game GraPM. We analyzed the...
-
Druga edycja Konferencji Inżynierii Oprogramowania beIT
PublikacjaW dniach 18–20 marca 2016 roku na Wydziale Elektroniki, Telekomunikacji i Informatyki odbyła się II Konferencja Inżynierii Oprogramowania beIT. Podobnie jak pierwszą edycję Konferencji beIT, tegoroczne spotkanie zorganizowało Koło Naukowe Zarządzanie IT przy wsparciu Katedry Inżynierii Oprogramowania, WETI oraz JM Rektora PG. Do przeprowadzenia 15 warsztatów, 4 sesji dyskusyjnych round tables oraz 5 wykładów organizatorzy zaprosili...
-
Friendly Applications: supporting education of children with autism
PublikacjaFriendly Applications is a project introducing a family of applications supporting education of children with autism at kindergarten level. The applications were developed as a joint initiative of Gdansk University of Technology and Institute for Child Development, which uses the applications in daily educational activities.
-
How to Design Affect-aware Educational Systems – the AFFINT Process Approach
PublikacjaComputer systems, that support learning processes, can adapt to the needs and states of a learner. The adaptation might directly address the knowledge deficits and most tutoring systems apply an adaptable learning path of that kind. Apart from a preliminary knowledge state, there are more factors, that influence education effectiveness and among those there are fluctuating emotional states. The tutoring systems may recognize or...
-
Limitations of Emotion Recognition in Software User Experience Evaluation Context
PublikacjaThis paper concerns how an affective-behavioural- cognitive approach applies to the evaluation of the software user experience. Although it may seem that affect recognition solutions are accurate in determining the user experience, there are several challenges in practice. This paper aims to explore the limitations of the automatic affect recognition applied in the usability context as well as...
-
Methodology of Affective Intervention Design for Intelligent Systems
PublikacjaThis paper concerns how intelligent systems should be designed to make adequate, valuable and natural affective interventions. The article proposes a process for choosing an affective intervention model for an intelligent system. The process consists of 10 activities that allow for step-by-step design of an affective feedback loop and takes into account the following factors: expected and desired emotional states, characteristics...
-
Model działania analityka biznesowego w administracji publicznej w celu przeciwdziałania ukrytym wymaganiom
PublikacjaCelem referatu było zaproponowanie modelu działania analityka biznesowego po stronie podmiotów administracji publicznej, który jest ukierunkowany na zapobieganie problemom wynikającym z występowania ukrytych wymagań. Podstawą tej propozycji są ogłoszone w 2015 r. dokumenty poświęcone analizie biznesowej, tzn. A Guide to the Business Analysis Body of Knowledge International Institute of Business Analysis oraz Business Analysis...
-
Model inteligentnego systemu edukacyjnego rozpoznającego emocje ucznia
PublikacjaW niniejszym raporcie omówiono model afektywnego systemu edukacyjnego i jego składowe oraz wyzwania, jakie stoją przed konstruktorami tego rodzaju rozwiązań.
-
Rating Prediction with Contextual Conditional Preferences
PublikacjaExploiting contextual information is considered a good solution to improve the quality of recommendations, aiming at suggesting more relevant items for a specific context. On the other hand, recommender systems research still strive for solving the cold-start problem, namely where not enough information about users and their ratings is available. In this paper we propose a new rating prediction algorithm to face the cold-start...
-
RECSYS CHALLENGE 2015: a BUY EVENT PREDICTION IN THE E-COMMERCE DOMAIN
PublikacjaIn this paper we present our approach to RecSys Challenge 2015. Given a set of e-commerce events, the task is to predict whether a user will buy something in the current session and, if yes, which of the item will be bought. We show that the data preparation and enrichment are very important in finding the solution for the challenge and that simple ideas and intuitions could lead to satisfactory results. We also show that simple...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublikacjaThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Talents, Competencies and Techniques of Business Analyst: A Balanced Professional Development Program
PublikacjaThis paper presents preliminary results of action research in which we search for fundamentals of an universal theory of balanced approaches to software process. It is developed on the basis of balanced approach for professional development program for business analysts which integrates approaches oriented on talents, competencies and techniques. This paper includes the description of key concepts in background approaches, components...
-
Towards automation of IT systems repairs
PublikacjaMonitoring and repair are two sides of the on-the-fly maintenance of IT systems.Monitoring is well supported by automatic tools. In contrast, repairs involve much higherhuman intervention which negatively affects reliability and efficiency. The paper intro-duces a method of automating repairs of IT systems which can be integrated with any ofthe existing monitoring mechanisms. The method is described as a collection of modelsand...
-
Towards Safety Case Integration with Hazard Analysis for Medical Devices
PublikacjaSafety case is one of system safety lifecycle products and should be consistent with other lifecycle products like hazard analysis results. In this paper we present a method of safety case integration with hazard tables based on the use of parametrized argument patterns. We describe a hazard table metamodel, a safety argument pattern and a mechanism of pattern instantiation using a linking table which represents references to system...
-
Towards the participant observation of emotions in software development teams
PublikacjaEmotions, moods and temperament influence our behaviour in every aspect of life. Until now plenty of research has been conducted and many theories have been proposed to explain the role of emotions within the working environment. However, in the field of software engineering, interest in the role of human factors in the process of software development is relatively new. In the paper the research design process that has been proposed...
-
Using contextual conditional preferences for recommendation taska: a case study in the movie domain
PublikacjaRecommendation engines aim to propose users items they are interested in by looking at the user interaction with a system. However, individual interests may be drastically influenced by the context in which decisions are taken. We present an attempt to model user interests via a set of contextual conditional preferences. We show that usage of proposed preferences gives reasonable values of the accuracy and the precision even when...
Rok 2015
-
Affective reactions to playing digital games
PublikacjaThe paper presents a study of emotional states during a gameplay. An experiment of two-player Tetris game is reported, followed by the analysis of the results - self-reported emotional states as well as physiological signals measurements interpretation. The study reveals the diversity of emotional reactions and concludes, that a representative player's emotional model is hard to define. Instead, an adaptive approach to emotion...
-
Balance Between Creativity and Methodology in Software Projects
PublikacjaTaking into account trends of innovation in economy and increasing interest in applying creativity techniques in computer science, this paper focuses on relationship between creativity and methodology in software project. First, it extracts useful knowledge about creativity from creativity research. Then, it makes an attempt to combine creativity issues and dimensions with concepts from software project area. It presents also lessons...
-
Contextual approach to reasoning with rules
PublikacjaIn the paper we present a method of reasoning with Horn rules within a contextual framework. We show that by proper use of a structure of contexts we can obtain partial OWA compliance with no necessity of extending the syntax of underlying Description Logics.
-
Developing Game-Structure Sensitive Matchmaking System for Massive-Multiplayer Online Games
PublikacjaProviding a fair matchmaking system is an essential issue, while developing every online video game. In the article, we show that the currently existing matchmaking system in League of Legends, one of the most popular online video games currently existing, is built on a base of conditions which do not hold true in the presence of empirical data. This, in short, decreases the effectiveness of the ranking system, and negatively affects...
-
Emotion Monitor - Concept, Construction and Lessons Learned
PublikacjaThis paper concerns the design and physical construction of an emotion monitor stand for tracking human emotions in Human-Computer Interaction using multi-modal approach. The concept of the stand using cameras, behavioral analysis tools and a set of physiological sensors such as galvanic skin response, blood-volume pulse, temperature, breath and electromyography is presented and followed...
-
Evaluation Criteria for Affect-Annotated Databases
PublikacjaIn this paper a set of comprehensive evaluation criteria for affect-annotated databases is proposed. These criteria can be used for evaluation of the quality of a database on the stage of its creation as well as for evaluation and comparison of existing databases. The usefulness of these criteria is demonstrated on several databases selected from affect computing domain. The databases contain different kind of data: video or still...
-
Information Logistics as a Paradigm
PublikacjaThis paper presents a paradigm-based approach to information logistics. The approach deals with extracting concepts specific to information logistics in categories typical to paradigms. The resulting description should be easily connected to complementary components which are based on other paradigms, e.g. business process management and information systems development. Empirical part aims at checking and enhancing features typical...