Institution
Østfold University College
Education•Halden, Norway•
About: Østfold University College is a education organization based out in Halden, Norway. It is known for research contribution in the topics: Context (language use) & Health care. The organization has 438 authors who have published 1213 publications receiving 12510 citations. The organization is also known as: HiØ.
Topics: Context (language use), Health care, Computer science, Population, Competence (human resources)
Papers published on a yearly basis
Papers
More filters
21 Jun 2009
TL;DR: It is argued that traditional documentary film approaches like Direct Cinema and Cinema Verite show that a purely observational approach may not be most valuable for user research and that video material can be used in a variety of ways to explore, understand and present the everyday.
Abstract: Documentary video is regularly used to support user research in user-centred design, and many researchers are familiar with this medium. There is strong research evidence that video can contribute substantially to human-computer interaction and interaction design. But the question what role the video camera actually plays in studying people and establishing design collaboration still exists. In this article we argue that traditional documentary film approaches like Direct Cinema and Cinema Verite show that a purely observational approach may not be most valuable for user research and that video material can be used in a variety of ways to explore, understand and present the everyday. Based on a comparison of several video studies of similar activities, but shot by different researchers, we develop the concept of ‘styles’ in video studies, and define three camera styles that may be a help for researchers in organising user research: Not only in making decisions about camera techniques, but in relating how the researcher interacts with the person(s) in front of the camera to the purpose of the shooting.
5 citations
••
20 Jul 2016TL;DR: In this article, the authors employ automatic programming, a relatively unknown evolutionary computation strategy, to improve the non-max suppression step in the popular Canny edge detector, which has been tested on a dataset widely used to benchmark edge detection algorithms.
Abstract: In this paper, we employ automatic programming, a relatively unknown evolutionary computation strategy, to improve the non-max suppression step in the popular Canny edge detector. The new version of the algorithm has been tested on a dataset widely used to benchmark edge detection algorithms. The performance has increased by 1.9%, and a pairwise student-t comparison with the original algorithm gives a p-value of 6.45 x 10-9. We show that the changes to the algorithm have made it better at detecting weak edges, without increasing the computational complexity or changing the overall design. Previous attempts have been made to improve the filter stage of the Canny algorithm using evolutionary computation, but, to our knowledge, this is the first time it has been used to improve the non-max suppression algorithm. The fact that we have found a heuristic improvement to the algorithm with significantly better performance on a dedicated test set of natural images suggests that our method should be used as a standard part of image analysis platforms, and that our methodology could be used to improve the performance of image analysis algorithms in general.
5 citations
••
17 Jul 20135 citations
••
TL;DR: It is suggested that a blunted CAR can predict mood deterioration post treatment in inpatients diagnosed with severe MDD, and may therefore predict depressive symptom severity once patients return home following inpatient treatment.
5 citations
••
01 Jan 2004TL;DR: The integration of security in qualitative analysis is demonstrated and the possibility of probabilistically modelling security is discussed and methods of particular interest are HAZOPs and Petri-nets.
Abstract: This paper addresses the necessity of including security aspects when assessing reliability and safety of critical systems. The integration of security in qualitative analysis is demonstrated and the possibility of probabilistically modelling security is discussed. Methods of particular interest are HAZOPs and Petri-nets.
5 citations
Authors
Showing all 452 results
Name | H-index | Papers | Citations |
---|---|---|---|
Per Morten Sandset | 54 | 325 | 11220 |
Anna-Lena Kjøniksen | 39 | 155 | 4591 |
Ricardo Colomo-Palacios | 37 | 311 | 4981 |
Camilla Ihlebæk | 33 | 77 | 3892 |
Julianne Cheek | 33 | 89 | 3421 |
Tomm Bernklev | 30 | 90 | 4190 |
Nand Kishor | 28 | 153 | 3476 |
Øystein Haugen | 27 | 121 | 2598 |
Turid Heiberg | 25 | 52 | 2945 |
Gisela Håkansson | 25 | 127 | 2084 |
Stefan Sütterlin | 22 | 91 | 1507 |
Guro Huby | 21 | 51 | 2414 |
Lars-Petter Jelsness-Jørgensen | 20 | 59 | 1022 |
Arne Løkketangen | 20 | 42 | 1923 |
Lucian Mihet-Popa | 19 | 115 | 1573 |