25 resultados para Privacy typology
em Helda - Digital Repository of University of Helsinki
Resumo:
Ubiquitous computing is about making computers and computerized artefacts a pervasive part of our everyday lifes, bringing more and more activities into the realm of information. The computationalization, informationalization of everyday activities increases not only our reach, efficiency and capabilities but also the amount and kinds of data gathered about us and our activities. In this thesis, I explore how information systems can be constructed so that they handle this personal data in a reasonable manner. The thesis provides two kinds of results: on one hand, tools and methods for both the construction as well as the evaluation of ubiquitous and mobile systems---on the other hand an evaluation of the privacy aspects of a ubiquitous social awareness system. The work emphasises real-world experiments as the most important way to study privacy. Additionally, the state of current information systems as regards data protection is studied. The tools and methods in this thesis consist of three distinct contributions. An algorithm for locationing in cellular networks is proposed that does not require the location information to be revealed beyond the user's terminal. A prototyping platform for the creation of context-aware ubiquitous applications called ContextPhone is described and released as open source. Finally, a set of methodological findings for the use of smartphones in social scientific field research is reported. A central contribution of this thesis are the pragmatic tools that allow other researchers to carry out experiments. The evaluation of the ubiquitous social awareness application ContextContacts covers both the usage of the system in general as well as an analysis of privacy implications. The usage of the system is analyzed in the light of how users make inferences of others based on real-time contextual cues mediated by the system, based on several long-term field studies. The analysis of privacy implications draws together the social psychological theory of self-presentation and research in privacy for ubiquitous computing, deriving a set of design guidelines for such systems. The main findings from these studies can be summarized as follows: The fact that ubiquitous computing systems gather more data about users can be used to not only study the use of such systems in an effort to create better systems but in general to study phenomena previously unstudied, such as the dynamic change of social networks. Systems that let people create new ways of presenting themselves to others can be fun for the users---but the self-presentation requires several thoughtful design decisions that allow the manipulation of the image mediated by the system. Finally, the growing amount of computational resources available to the users can be used to allow them to use the data themselves, rather than just being passive subjects of data gathering.
Resumo:
Inter-enterprise collaboration has become essential for the success of enterprises. As competition increasingly takes place between supply chains and networks of enterprises, there is a strategic business need to participate in multiple collaborations simultaneously. Collaborations based on an open market of autonomous actors set special requirements for computing facilities supporting the setup and management of these business networks of enterprises. Currently, the safeguards against privacy threats in collaborations crossing organizational borders are both insufficient and incompatible to the open market. A broader understanding is needed of the architecture of defense structures, and privacy threats must be detected not only on the level of a private person or enterprise, but on the community and ecosystem levels as well. Control measures must be automated wherever possible in order to keep the cost and effort of collaboration management reasonable. This article contributes to the understanding of the modern inter-enterprise collaboration environment and privacy threats in it, and presents the automated control measures required to ensure that actors in inter-enterprise collaborations behave correctly to preserve privacy.
Resumo:
This study analyses the diction of Latin building inscriptions. Despite its importance, this topic has rarely been discussed before: the most substantial contribution on the subject is a short dissertation by Klaus Gast (1965) that focuses on 100 inscriptions dating mostly from the Republican period. Marietta Horster (2001) also touched upon this theme in her thesis on imperial building inscriptions. I have collected my source material in North Africa because more Latin building inscriptions dating from the Imperial period have survived there than in any other area of the Roman Empire. By means of a thorough and independent survey, I have assembled all relevant African Latin building inscriptions datable to the Roman period (between 146 BC and AD 425), 1002 texts, into a corpus. These inscriptions are all fully edited in Appendix 1; Appendix 2 contains references to earlier editions. To facilitate search operations, both are also available in electronic form. They are downloadable from the address http://www.helsinki.fi/hum/kla/htm/jatkoopinnot.htm. Chapter one is an introduction dealing with the nature of building inscriptions as source material. Chapter two offers a statistical overview of the material. The following main section of the work falls into five chapters, each of which analyses one main part of a building inscription. An average building inscription can be divided into five parts: the starting phrase opens the inscription (a dedication to gods, for example), the subject part identifies the builder, the object part describes the constructed or repaired building, the predicate part records the building activity and the supplement part offers additional information on the project (it can specify the funding, for instance). These chapters are systematic and chronological and their purpose is to register and interpret the phrases used, to analyse reasons for their use and for their popularity among the different groups of builders. Chapter eight, which follows the main section of the work, creates a typology of building inscriptions based on their structure. It also presents the most frequently attested types of building inscriptions. The conclusion describes, on a general level, how the diction of building inscriptions developed during the period of study and how this striking development resulted from socio-economic changes that took place in Romano-African society during Antiquity. This study shows that the phraseology of building inscriptions had a clear correlation both with the type of builder and with the date of carving. Private builders tended to accentuate their participation (especially its financial side) in the project; honouring the emperor received more emphasis in the building inscriptions set up by communities; the texts produced by the army were concise. The chronological development is so clear that it enables stylistic dating. At the beginning of the imperial period the phrases were clear, concrete, formal and stereotyped but by Late Antiquity they have become vague, subjective, flexible, varied and even rhetorically or poetically coloured.
Resumo:
This study reports a diachronic corpus investigation of common-number pronouns used to convey unknown or otherwise unspecified reference. The study charts agreement patterns in these pronouns in various diachronic and synchronic corpora. The objective is to provide base-line data on variant frequencies and distributions in the history of English, as there are no previous systematic corpus-based observations on this topic. This study seeks to answer the questions of how pronoun use is linked with the overall typological development in English and how their diachronic evolution is embedded in the linguistic and social structures in which they are used. The theoretical framework draws on corpus linguistics and historical sociolinguistics, grammaticalisation, diachronic typology, and multivariate analysis of modelling sociolinguistic variation. The method employs quantitative corpus analyses from two main electronic corpora, one from Modern English and the other from Present-day English. The Modern English material is the Corpus of Early English Correspondence, and the time frame covered is 1500-1800. The written component of the British National Corpus is used in the Present-day English investigations. In addition, the study draws supplementary data from other electronic corpora. The material is used to compare the frequencies and distributions of common-number pronouns between these two time periods. The study limits the common-number uses to two subsystems, one anaphoric to grammatically singular antecedents and one cataphoric, in which the pronoun is followed by a relative clause. Various statistical tools are used to process the data, ranging from cross-tabulations to multivariate VARBRUL analyses in which the effects of sociolinguistic and systemic parameters are assessed to model their impact on the dependent variable. This study shows how one pronoun type has extended its uses in both subsystems, an increase linked with grammaticalisation and the changes in other pronouns in English through the centuries. The variationist sociolinguistic analysis charts how grammaticalisation in the subsystems is embedded in the linguistic and social structures in which the pronouns are used. The study suggests a scale of two statistical generalisations of various sociolinguistic factors which contribute to grammaticalisation and its embedding at various stages of the process.
Resumo:
The history of the Leningrad underground is one of the key themes of late socialism. Samizdat, "black humour", religious syncretism, dissidence, apolitical bohemianism, the pathos of freedom of individuality and the mechanics of literature are closely interlinked with the cultural mythology of this passed epoch. Describing conceptions that, when taken together, form the contemporary understanding of unofficial culture, the author creates a historical portrait of this environment. Amongst the central figures here, there are well-known writers (Bitov, Brodsky, Dovlatov, Khvostenko, Krivulin) and literary activists who still await recognition. The analysis of works, many of which were only distributed in typewritten publications in the 1960s-1980s, gives a preliminary definition of the key factors that united the authors of the unofficial community. The book begins with a critique of the identification of the Soviet underground with political dissidence or with a society living in autonomous independence with regard to the state. Describing the historical development of the various names for this environment (the underground, samizdat, unofficial culture, podpolie and others), the author follows the genesis of the community from its appearance, in the years of "the Thaw", through to perestroika, when it dissolved. Taking the history of the publication of Bitov's "The Pushkin House" as an example, the concept of the unofficial is interpreted as a risky interaction with the authorities. Unofficial culture is then viewed as a late Soviet reflection of the Western underground in the 1950s-1960s. Unlike the radical-utopian-anarchistic source, it proclaimed a liberalist and democratic ideology in the context of the destruction of the socialist utopia. The historical portrait of the community is built up from the perceptions of its members regarding literature practice and rhetorical approaches, with the aid of which these perceptions are expressed. Taking typewritten publications as source material, four main representations are given: privacy, deviancy, criticism and irrationality. An understanding of literature as a private affair, neo-avant-garde deviancy in social and literary behaviour and the pathos of the critical relationship with officialdom and irrational message of literary work, comprise the basis for the worldview of unofficial authors, as well as the poetic system, genre preferences and dictums. An analysis of irrationality, based on the texts of Khvostenko and Bogdanov, leads to a review of the cultural mythologies that were crucial to the unofficial conception of the absurd. Absurd is an homonym. It contains ideas that are important for the worldview of unofficial authors and the poetics of their works. The irrationality of the Soviet order is reflected in the documentary nature of the satirical prose of Dovlatov. The existential absurd of Camus is perceived here as the pointlessness of social realities and the ontological alienation of man, while existentialist practices for consciousness in the "atmosphere of absurd" remain bracketed off. The third homonym of absurd - the conception of reality as an illusion - is a clear demonstration of religious syncretism, where neo-Christian ideas are interweaved with a modernized version of Hinduism, as taken from Rolland s books on Ramakrishna and Vivekananda. The unofficial community was influenced by the ideology of westernization. Even "the East" arrived here via French retellings and accounts. As a whole, unofficial Leningrad culture can be understood as a neo-modernist phenomenon which, unlike the western neo-modernism of the 1940s and 1950s, arose in the years of the Thaw and ended its existence in the mid-1980s.
Resumo:
The common focus of the studies brought together in this work is the prosodic segmentation of spontaneous speech. The theoretically most central aspect is the introduction and further development of the IJ-model of intonational chunking. The study consists of a general introduction and five detailed studies that approach prosodic chunking from different perspectives. The data consist of recordings of face-to-face interaction in several spoken varieties of Finnish and Finland Swedish; the methodology is usage-based and qualitative. The term “speech prosody” refers primarily to the melodic and rhythmic characteristics of speech. Both speaking and understanding speech require the ability to segment the flow of speech into suitably sized prosodic chunks. In order to be usage-based, a study of spontaneous speech consequently needs to be based on material that is segmented into prosodic chunks of various sizes. The segmentation is seen to form a hierarchy of chunking. The prosodic models that have so far been developed and employed in Finland have been based on sentences read aloud, which has made it difficult to apply these models in the analysis of spontaneous speech. The prosodic segmentation of spontaneous speech has not previously been studied in detail in Finland. This research focuses mainly on the following three questions: (1) What are the factors that need to be considered when developing a model of prosodic segmentation of speech, so that the model can be employed regardless of the language or dialect under analysis? (2) What are the characteristics of a prosodic chunk, and what are the similarities in the ways chunks of different languages and varieties manifest themselves that will make it possible to analyze different data according to the same criteria? (3) How does the IJ-model of intonational chunking introduced as a solution to question (1) function in practice in the study of different varieties of Finnish and Finland Swedish? The boundaries of the prosodic chunks were manually marked in the material according to context-specific acoustic and auditory criteria. On the basis of the data analyzed, the IJ-model was further elaborated and implemented, thus allowing comparisons between different language varieties. On the basis of the empirical comparisons, a prosodic typology is presented for the dialects of Swedish in Finland. The general contention is that the principles of the IJ-model can readily be used as a methodological tool for prosodic analysis irrespective of language varieties.
Resumo:
The influence of the architecture of the Byzantine capital spread to the Mediterranean provinces with travelling masters and architects. In this study the architecture of the Constantinopolitan School has been detected on the basis of the typology of churches, completed by certain morphological aspects when necessary. The impact of the Constantinopolitan workshops appears to have been more important than previously realized. This research revealed that the Constantinopolitan composite domed inscribed-cross type or cross-in-square spread everywhere to the Balkans and it was assumed soon by the local schools of architecture. In addition, two novel variants were invented on the basis of this model: the semi-composite type and the so-called Athonite type. In the latter variant lateral conches, choroi, were added for liturgical reasons. Instead, the origin of the domed ambulatory church was partly provincial. One result of this study is that the origin of the Middle Byzantine domed octagonal types was traced to Constantinople. This is attested on the basis of the archaeological evidence. Also some other architectural elements that have not been preserved in the destroyed capital have survived at the provincial level: the domed hexagonal type, the multi-domed superstructure, the pseudo-octagon and the narthex known as the lite. The Constantinopolitan architecture during the period in question was based on the Early Christian and Late Antique forms, practices and innovations and this also emerges at the provincial level.
Resumo:
The aim of this study is to examine the relationship of the Roman villa to its environment. The villa was an important feature of the countryside intended both for agricultural production and for leisure. Manuals of Roman agriculture give instructions on how to select a location for an estate. The ideal location was a moderate slope facing east or south in a healthy area and good neighborhood, near good water resources and fertile soils. A road or a navigable river or the sea was needed for transportation of produce. A market for selling the produce, a town or a village, should have been nearby. The research area is the surroundings of the city of Rome, a key area for the development of the villa. The materials used consist of archaeological settlement sites, literary and epigraphical evidence as well as environmental data. The sites include all settlement sites from the 7th century BC to 5th century AD to examine changes in the tradition of site selection. Geographical Information Systems were used to analyze the data. Six aspects of location were examined: geology, soils, water resources, terrain, visibility/viewability and relationship to roads and habitation centers. Geology was important for finding building materials and the large villas from the 2nd century BC onwards are close to sources of building stones. Fertile soils were sought even in the period of the densest settlement. The area is rich in water, both rainfall and groundwater, and finding a water supply was fairly easy. A certain kind of terrain was sought over very long periods: a small spur or ridge shoulder facing preferably south with an open area in front of the site. The most popular villa resorts are located on the slopes visible from almost the entire Roman region. A visible villa served the social and political aspirations of the owner, whereas being in the villa created a sense of privacy. The area has a very dense road network ensuring good connectivity from almost anywhere in the region. The best visibility/viewability, dense settlement and most burials by roads coincide, creating a good neighborhood. The locations featuring the most qualities cover nearly a quarter of the area and more than half of the settlement sites are located in them. The ideal location was based on centuries of practical experience and rationalized by the literary tradition.
Resumo:
Bestiality was in the 18th century a more difficult problem in terms of criminal policy in Sweden and Finland than in any other Christian country in any other period. In the legal history of deviant sexuality, the phenomenon was uniquely widespread by international comparison. The number of court cases per capita in Finland was even higher than in Sweden. The authorities classified bestiality among the most serious crimes and a deadly sin. The Court of Appeal in Turku opted for an independent line and was clearly more lenient than Swedish courts of justice. Death sentences on grounds of bestiality ended in the 1730s, decades earlier than in Sweden. The sources for the present dissertation include judgment books and Court of Appeal decisions in 253 cases, which show that the persecution of those engaging in bestial acts in 18th century Finland was not organised by the centralised power of Stockholm. There is little evidence of local campaigns that would have been led by authorities. The church in its orthodoxy was losing ground and the clergy governed their parishes with more pragmatism than the Old Testament sanctioned. When exposing bestiality, the legal system was compelled to rely on the initiative of the public. In cases of illicit intercourse or adultery the authorities were even more dependent on the activeness of the local community. Bestiality left no tangible evidence, illegitimate children, to betray the crime to the clergy or secular authorities. The moral views of the church and the local community were not on a collision course. It was a common view that bestiality was a heinous act. Yet nowhere near all crimes came to the authorities' knowledge. Because of the heavy burden of proof, the legal position of the informer was difficult. Passiveness in reporting the crime was partly because most Finns felt it was not their place to intervene in their neighbours' private lives, as long as that privacy posed no serious threat to the neighbourhood. Hidden crime was at least as common as crime more easily exposed and proven. A typical Finnish perpetrator of bestiality was a young unmarried man with no criminal background or mental illness. The suspects were not members of ethnic minorities or marginal social groups. In trials, farmhands were more likely to be sentenced than their masters, but a more salient common denominator than social and economical status was the suspects' young age. For most of the defendants bestiality was a deep-rooted habit, which had been adopted in early youth. This form of subculture spread among the youth, and the most susceptible to experiment with the act were shepherds. The difference between man and animal was not clear-cut or self-evident. The difficulty in drawing the line is evident both in legal sources and Finnish folklore. The law that required that the animal partners be slaughtered led to the killing of thousands of cows and mares, and thereby to substantial material losses to their owners. Regarding bestiality as a crime against property motivated people to report it. The belief that the act would produce human-animal mongrels or that it would poison the milk and the meat horrified the public more than the teachings of the church ever could. Among the most significant aspects in the problems regarding the animals is how profoundly different the worldview of 18th century people was from that of today.
Resumo:
This dissertation consists of four articles and an introduction. The five parts address the same topic, nonverbal predication in Erzya, from different perspectives. The work is at the same time linguistic typology and Uralic studies. The findings based on a large corpus of empirical Erzya data, which was collected using several different methods and included recordings of the spoken language, made it possible for the present study to apply, then test and finally discuss the previous theories based on cross-linguistic data. Erzya makes use of multiple predication patterns which vary from totally analytic to the morphologically very complex. Nonverbal predicate clause types are classified on the basis of propositional acts in clauses denoting class-membership, identity, property and location. The predicates of these clauses are nouns, adjectives and locational expressions, respectively. The following three predication strategies in Erzya nonverbal predication can be identified: i. the zero-copula construction, ii. the predicative suffix construction and iii. the copula construction. It has been suggested that verbs and nouns cannot be clearly distinguished on morphological grounds when functioning as predicates in Erzya. This study shows that even though predicativity must not be considered a sufficient tool for defining parts of speech in any language, the Erzya lexical classes of adjective, noun and verb can be distinguished from each other also in predicate position. The relative frequency and degree of obligation for using the predicative suffix construction decreases when moving left to right on the scale verb adjective/locative noun ( identificational statement). The predicative suffix is the main pattern in the present tense over the whole domain of nonverbal predication in Standard Erzya, but if it is replaced it is most likely to be with a zero-copula construction in a nominal predication. This study exploits the theory of (a)symmetry for the first time in order to describe verbal vs. nonverbal predication. It is shown that the asymmetry of paradigms and constructions differentiates the lexical classes. Asymmetrical structures are motivated by functional level asymmetry. Variation in predication as such adds to the complexity of the grammar. When symmetric structures are employed, the functional complexity of grammar decreases, even though morphological complexity increases. The genre affects the employment of predication strategies in Erzya. There are differences in the relative frequency of the patterns, and some patterns are totally lacking from some of the data. The clearest difference is that the past tense predicative suffix construction occurs relatively frequently in Standard Erzya, while it occurs infrequently in the other data. Also, the predicative suffixes of the present tense are used more regularly in written Standard Erzya than in any other genre. The genre also affects the incidence of the translative in uľ(ń)ems copula constructions. In translations from Russian to Erzya the translative case is employed relatively frequently in comparison to other data. This study reveals differences between the two Mordvinic languages Erzya and Moksha. The predicative suffixes (bound person markers) of the present tense are used more regularly in Moksha in all kinds of nonverbal predicate clauses compared to Erzya. It should further be observed that identificational statements are encoded with a predicative suffix in Moksha, but seldom in Erzya. Erzya clauses are more frequently encoded using zero-constructions, displaying agreement in number only.
Resumo:
Topic avoidance in romantic relationships has not been researched before in Finnish speech communication research, and this study was expected to increase the understanding of a phenomenon that acquires relatively dramatic attributes in everyday conversation. The aim of this study was to describe topic avoidance based on what was told in the interviews, and to describe the beliefs concerning functional or dysfunctional relational communication that can be interpreted from the interviewees' speech when they talk about topic avoidance. The theoretical reference frame of this study consists of the Communication Privacy Management Theory, relational dialectics, and earlier, mostly American research on topic avoidance. Ten Finnish people aged 22-31, who all had previous experience on one or more marital or common-law relationships were interviewed for this study. Additional material for the study was gathered from the interviewees by using the role playing method to describe interactional events where something essential is left unsaid in the context of romantic relationship. The following values were attributed to functional communication in romantic relationships: openness, equality, honesty, trust and positivity. The dialectical nature of the phenomenon being researched is evident in the way that along with openness, the interviewees talked about excessive openness that should occasionally be avoided in the context of relational communication by leaving things unsaid. Topic avoidance was seen both as a conscious strategic communication for managing privacy, and as an uncontrollable force of nature that at its worst destroys the relationship. When topic avoidance is seen as strategic communication, the choice concerning what is left unsaid is made by weighing the following dimensions asgainst each other: risks/ benefits (for self, relationship), protects/ does not protect (self, partner, relationship), burdens/ does not burden (self, partner, relationship), honesty/ dishonesty, responsibility lies with self/ responsibility does not lie with self. Topic avoidance was acceptable if it was used in order to preserve the relationship, as opposed to gaining power in the relationship or causing insecurity for the partner. The acceptability of topic avoidance varied according to whether it differed from lying or not. When the interviewees talk about topic avoidance, their speech can be interpreted to mean that in spite of uncontrollability, communicative choices can be made in relational communication and that skills concerning communication in romantic relationships can be learned.
Resumo:
The temperamental traits of Cloninger’s personality theory (novelty seeking, harm avoidance, reward dependence and persistence) reflect independent systems of central nervous system deciding responses toward new, rewarding and aversive stimuli. Thus, certain temperamental traits and their combinations may predispose to heavy drinking and alcohol dependence. Hence, the aim of the present study was to investigate associations between temperamental traits and the amount of alcohol consumption, frequency of heavy drinking and the maximum number of drinks per occasion. In this study, we investigated also whether these associations are only confounded by between-family differences in genetic and environmental factors. Furthermore the associations between temperamental trait combinations that reflect Cloninger's typology of alcoholism and alcohol use were studied. The subjects (n=401) in the current study were a group of FinnTwin16 study participators, Finnish twins born in 1974-79. Temperament was measured with TCI-R (Temperament and Character Inventory-Revised) a self-report form. The amount of alcohol consumption was asked by Semi-structured interview (Semi-Structured Assessment of Genetics of Alcoholism = SSAGA). The frequency of heavy drinking and maximum number of drinks per occasion were asked by mail form. In accordance with previous studies, novelty seeking had a positive relationship with the amount of alcohol consumption, frequency of heavy drinking and the maximum number of drinks per occasion in both genders. In this study, the association was proven independent of between-family differences in genetic and environmental factors that are associated to both novelty seeking and alcohol use. Surprisingly, reward dependence was negatively related to the maximum number of drinks per occasion in both genders. Persistence had a weak positive relationship with maximum number of drinks per occasion in men. The temperamental trait combinations that reflect Cloninger's typology of alcoholism did not differ from the other combinations in regard to alcohol use as hypothesized. The results confirm the previous finding about the relationship between novelty seeking and alcohol use. Support for Cloninger's typology of alcoholism in regard to combinations of temperamental trait was not achieved in this study.
Resumo:
The study focused on the different ways that forest-related rights can be devolved to the local level according to the current legal frameworks in Laos, Nepal, Vietnam, Kenya, Mozambique and Tanzania. The eleven case studies represented the main ways in which forest-related rights can be devolved to communities or households in these countries. The objectives of this study were to 1) analyse the contents and extent of forest-related rights that can be devolved to the local level, 2) develop an empirical typology that represents the main types of devolution, and 3) compare the cases against a theoretical ideal type to assess in what way and to what extent the cases are similar to or differ from the theoretical construct. Fuzzy set theory, Qualitative Comparative Analysis and ideal type analysis were used in analysing the case studies and in developing an empirical typology. The theoretical framework, which guided data collection and analyses, was based on institutional economics and theories on property rights, common pool resources and collective action. On the basis of the theoretical and empirical knowledge, the most important attributes of rights were defined as use rights, management rights, exclusion rights, transfer rights and the duration and security of the rights. The ideal type was defined as one where local actors have been devolved comprehensive use rights, extensive management rights, rights to exclude others from the resource and rights to transfer these rights. In addition, the rights are to be secure and held perpetually. The ideal type was used to structure the analysis and as a tool against which the cases were analysed. The contents, extent and duration of the devolved rights varied greatly. In general, the results show that devolution has mainly meant the transfer of use rights to the local level, and has not really changed the overall state control over forest resources. In most cases the right holders participate, or have a limited role in the decision making regarding the harvesting and management of the resource. There was a clear tendency to devolve the rights to enforce rules and to monitor resource use and condition more extensively than the powers to decide on the management and development of the resource. The empirical typology of the cases differentiated between five different types of devolution. The types can be characterised by the devolution of 1) restricted use and control rights, 2) extensive use rights but restricted control rights, 3) extensive rights, 4) insecure, short term use and restricted control rights, and 5) insecure extensive rights. Overall, the case studies conformity to the ideal type was very low: only two cases were similar to the ideal type, all other cases differed considerably from the ideal type. The restricted management rights were the most common reason for the low conformity to the ideal type (eight cases). In three cases, the short term of the rights, restricted transfer rights, restricted use rights or restricted exclusion rights were the reason or one of the reasons for the low conformity to the ideal type. In two cases the rights were not secure.
Resumo:
Digital elevation models (DEMs) have been an important topic in geography and surveying sciences for decades due to their geomorphological importance as the reference surface for gravita-tion-driven material flow, as well as the wide range of uses and applications. When DEM is used in terrain analysis, for example in automatic drainage basin delineation, errors of the model collect in the analysis results. Investigation of this phenomenon is known as error propagation analysis, which has a direct influence on the decision-making process based on interpretations and applications of terrain analysis. Additionally, it may have an indirect influence on data acquisition and the DEM generation. The focus of the thesis was on the fine toposcale DEMs, which are typically represented in a 5-50m grid and used in the application scale 1:10 000-1:50 000. The thesis presents a three-step framework for investigating error propagation in DEM-based terrain analysis. The framework includes methods for visualising the morphological gross errors of DEMs, exploring the statistical and spatial characteristics of the DEM error, making analytical and simulation-based error propagation analysis and interpreting the error propagation analysis results. The DEM error model was built using geostatistical methods. The results show that appropriate and exhaustive reporting of various aspects of fine toposcale DEM error is a complex task. This is due to the high number of outliers in the error distribution and morphological gross errors, which are detectable with presented visualisation methods. In ad-dition, the use of global characterisation of DEM error is a gross generalisation of reality due to the small extent of the areas in which the decision of stationarity is not violated. This was shown using exhaustive high-quality reference DEM based on airborne laser scanning and local semivariogram analysis. The error propagation analysis revealed that, as expected, an increase in the DEM vertical error will increase the error in surface derivatives. However, contrary to expectations, the spatial au-tocorrelation of the model appears to have varying effects on the error propagation analysis depend-ing on the application. The use of a spatially uncorrelated DEM error model has been considered as a 'worst-case scenario', but this opinion is now challenged because none of the DEM derivatives investigated in the study had maximum variation with spatially uncorrelated random error. Sig-nificant performance improvement was achieved in simulation-based error propagation analysis by applying process convolution in generating realisations of the DEM error model. In addition, typology of uncertainty in drainage basin delineations is presented.
Resumo:
Cell transition data is obtained from a cellular phone that switches its current serving cell tower. The data consists of a sequence of transition events, which are pairs of cell identifiers and transition times. The focus of this thesis is applying data mining methods to such data, developing new algorithms, and extracting knowledge that will be a solid foundation on which to build location-aware applications. In addition to a thorough exploration of the features of the data, the tools and methods developed in this thesis provide solutions to three distinct research problems. First, we develop clustering algorithms that produce a reliable mapping between cell transitions and physical locations observed by users of mobile devices. The main clustering algorithm operates in online fashion, and we consider also a number of offline clustering methods for comparison. Second, we define the concept of significant locations, known as bases, and give an online algorithm for determining them. Finally, we consider the task of predicting the movement of the user, based on historical data. We develop a prediction algorithm that considers paths of movement in their entirety, instead of just the most recent movement history. All of the presented methods are evaluated with a significant body of real cell transition data, collected from about one hundred different individuals. The algorithms developed in this thesis are designed to be implemented on a mobile device, and require no extra hardware sensors or network infrastructure. By not relying on external services and keeping the user information as much as possible on the user s own personal device, we avoid privacy issues and let the users control the disclosure of their location information.