278 resultados para informed user
Resumo:
Most recommender systems attempt to use collaborative filtering, content-based filtering or hybrid approach to recommend items to new users. Collaborative filtering recommends items to new users based on their similar neighbours, and content-based filtering approach tries to recommend items that are similar to new users' profiles. The fundamental issues include how to profile new users, and how to deal with the over-specialization in content-based recommender systems. Indeed, the terms used to describe items can be formed as a concept hierarchy. Therefore, we aim to describe user profiles or information needs by using concepts vectors. This paper presents a new method to acquire user information needs, which allows new users to describe their preferences on a concept hierarchy rather than rating items. It also develops a new ranking function to recommend items to new users based on their information needs. The proposed approach is evaluated on Amazon book datasets. The experimental results demonstrate that the proposed approach can largely improve the effectiveness of recommender systems.
Resumo:
In recent years, the Web 2.0 has provided considerable facilities for people to create, share and exchange information and ideas. Upon this, the user generated content, such as reviews, has exploded. Such data provide a rich source to exploit in order to identify the information associated with specific reviewed items. Opinion mining has been widely used to identify the significant features of items (e.g., cameras) based upon user reviews. Feature extraction is the most critical step to identify useful information from texts. Most existing approaches only find individual features about a product without revealing the structural relationships between the features which usually exist. In this paper, we propose an approach to extract features and feature relationships, represented as a tree structure called feature taxonomy, based on frequent patterns and associations between patterns derived from user reviews. The generated feature taxonomy profiles the product at multiple levels and provides more detailed information about the product. Our experiment results based on some popularly used review datasets show that our proposed approach is able to capture the product features and relations effectively.
Resumo:
Background: Health policy, guidelines, and standards advocate giving patients comprehensive information and facilitating their involvement in health-related decision-making. Routine assessment of patient reports of these processes is needed. Our objective was to examine decision-making processes, specifically information provision and consumer involvement in decision-making, for nine pregnancy, labour, and birth procedures, as reported by maternity care consumers in Queensland, Australia. Methods: Participants were women who had a live birth in Queensland in a specified time period and were not found to have had a baby that died since birth, who completed the extended Having a Baby in Queensland Survey, 2010 about their maternity care experiences, and who reported at least one of the nine procedures of interest. For each procedure, women answered two questions that measured perceived (i) receipt of information about the benefits and risks of the procedure and (ii) role in decision-making about the procedure. Results: In all, 3,542 eligible women (34.2%) completed the survey. Between 4% (for pre-labour caesarean section) and 60% (for vaginal examination) of women reported not being informed of the benefits and risks of the procedure they experienced. Between 2% (epidural) and 34% (episiotomy) of women reported being unconsulted in decision-making. Over one quarter (26%) of the women who experienced episiotomy reported being neither informed nor consulted. Conclusions: There is an urgent need for interventions that facilitate information provision and consumer involvement in decision-making about several perinatal procedures, especially those performed within the time-limited intrapartum care episode.
Resumo:
Being across new knowledge is critical to the survival of individual businesses. This study explored the way in which managers of small social services in Queensland identified important new knowledge and brought this into their organisations. New knowledge was found to be highly valued by managers with key resources allocated to knowledge seeking processes particularly in response to regulatory change. Knowledge absorption involved accessing multiple sources, and external professional networks were found to be critical to understanding and integrating new knowledge. The research highlighted the challenges in securing new knowledge and the importance of managers professional links.
Resumo:
This project investigated 1) Australian web designers’ cultural perceptions towards Australian Indigenous users and 2) Australian Indigenous cultural features in terms of user interface design. In doing so, it reviews the literature of cross-cultural user interface design by focusing on feasible models and arguments to articulate and integrate Australian Indigenous Internet users’ cultural needs of web user interface. The online survey results collected from 101 Indigenous users and 126 Web designers showed a distinctive difference between them on the integration of Indigenous users' cultural in Web sites. The interview data collected from 14 Indigenous users and 14 web designers suggested practical approaches to the design implications of Indigenous culture.
Resumo:
Term-based approaches can extract many features in text documents, but most include noise. Many popular text-mining strategies have been adapted to reduce noisy information from extracted features; however, text-mining techniques suffer from low frequency. The key issue is how to discover relevance features in text documents to fulfil user information needs. To address this issue, we propose a new method to extract specific features from user relevance feedback. The proposed approach includes two stages. The first stage extracts topics (or patterns) from text documents to focus on interesting topics. In the second stage, topics are deployed to lower level terms to address the low-frequency problem and find specific terms. The specific terms are determined based on their appearances in relevance feedback and their distribution in topics or high-level patterns. We test our proposed method with extensive experiments in the Reuters Corpus Volume 1 dataset and TREC topics. Results show that our proposed approach significantly outperforms the state-of-the-art models.
Resumo:
Scenario 1 A buys a two storey commercial building built along the only street frontage to the property. Vehicles cannot reach the rear of the property as the building extends across the entire width of the land. A bought the building with full knowledge that vehicular access to the rest of the property had been compromised by a desire to obtain maximum street frontage for the building which was occupied by a commercial tenant. On street parking is scarce in the surrounding area. A (to the knowledge of the adjoining owner B) constructs a carpark at the rear of the building. The employees of A’s tenant have been using the carpark obtaining access via a driveway on B’s land. To formalise this arrangement, A seeks a right of way for vehicles to travel down B’s driveway to access the carpark...
Resumo:
We propose a new kind of asymmetric mutual authentication from passwords with stronger privacy against malicious servers, lest they be tempted to engage in “cross-site user impersonation” to each other. It enables a person to authenticate (with) arbitrarily many independent servers, over adversarial channels, using a memorable and reusable single short password. Beside the usual PAKE security guarantees, our framework goes to lengths to secure the password against brute-force cracking from privileged server information.
Resumo:
Mitchell critiques Georges Perec's Life a User's Manual, which articulates compellingly the confluence of literature and architecture studies that emerged in the late twentieth century. He argues the Perec's novel diverges from this tradition, for, rather than being a search for origins and true expression, Life a User's Manual denies the very possibility of originality. He adds that Perec's architext is de-constructive and ironic.
Resumo:
This paper describes the design and implementation of a wireless neural telemetry system that enables new experimental paradigms, such as neural recordings during rodent navigation in large outdoor environments. RoSco, short for Rodent Scope, is a small lightweight user-configurable module suitable for digital wireless recording from freely behaving small animals. Due to the digital transmission technology, RoSco has advantages over most other wireless modules of noise immunity and online user-configurable settings. RoSco digitally transmits entire neural waveforms for 14 of 16 channels at 20 kHz with 8-bit encoding which are streamed to the PC as standard USB audio packets. Up to 31 RoSco wireless modules can coexist in the same environment on non-overlapping independent channels. The design has spatial diversity reception via two antennas, which makes wireless communication resilient to fading and obstacles. In comparison with most existing wireless systems, this system has online user-selectable independent gain control of each channel in 8 factors from 500 to 32,000 times, two selectable ground references from a subset of channels, selectable channel grounding to disable noisy electrodes, and selectable bandwidth suitable for action potentials (300 Hz–3 kHz) and low frequency field potentials (4 Hz–3 kHz). Indoor and outdoor recordings taken from freely behaving rodents are shown to be comparable to a commercial wired system in sorting for neural populations. The module has low input referred noise, battery life of 1.5 hours and transmission losses of 0.1% up to a range of 10 m.
Resumo:
As the Journal of Media Innovations comes into existence, this article reflects on the first and most obvious question: just what do we mean by “media innovations”? Drawing on the examples of a range of recent innovations in media technologies and practices, initiated by a variety of media audiences, users, professionals, and providers, it explores the interplay between the different drivers of innovation and the effects of such innovation on the complex frameworks of contemporary society and the media ecology which supports it. In doing so, this article makes a number of key observations: first, it notes that media innovation is an innovation in media practices at least as much as in media technologies, and that changes to the practices of media both reflect and promote societal changes as well – media innovations are never just media technology innovations. Second, it shows that the continuing mediatisation of society, and the shift towards a more widespread participation of ordinary users as active content creators and media innovators, make it all the more important to investigate in detail these interlinked, incremental, everyday processes of media and societal change – media innovations are almost always also user innovations. Finally, it suggests that a full understanding of these processes as they unfold across diverse interleaved media spaces and complex societal structures necessarily requires a holistic perspective on media innovations, which considers the contemporary media ecology as a crucial constitutive element of societal structures and seeks to trace the repercussions of innovations across both media and society – media innovations are inextricably interlinked with societal innovations (even if, at times, they may not be considered to be improvements to the status quo).
Resumo:
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.
Resumo:
Background Timely diagnosis and reporting of patient symptoms in hospital emergency departments (ED) is a critical component of health services delivery. However, due to dispersed information resources and a vast amount of manual processing of unstructured information, accurate point-of-care diagnosis is often difficult. Aims The aim of this research is to report initial experimental evaluation of a clinician-informed automated method for the issue of initial misdiagnoses associated with delayed receipt of unstructured radiology reports. Method A method was developed that resembles clinical reasoning for identifying limb abnormalities. The method consists of a gazetteer of keywords related to radiological findings; the method classifies an X-ray report as abnormal if it contains evidence contained in the gazetteer. A set of 99 narrative reports of radiological findings was sourced from a tertiary hospital. Reports were manually assessed by two clinicians and discrepancies were validated by a third expert ED clinician; the final manual classification generated by the expert ED clinician was used as ground truth to empirically evaluate the approach. Results The automated method that attempts to individuate limb abnormalities by searching for keywords expressed by clinicians achieved an F-measure of 0.80 and an accuracy of 0.80. Conclusion While the automated clinician-driven method achieved promising performances, a number of avenues for improvement were identified using advanced natural language processing (NLP) and machine learning techniques.