851 resultados para user-profiling
Resumo:
The paper is an investigation of the exchange of ideas and information between an architect and building users in the early stages of the building design process before the design brief or any drawings have been produced. The purpose of the research is to gain insight into the type of information users exchange with architects in early design conversations and to better understand the influence the format of design interactions and interactional behaviours have on the exchange of information. We report an empirical study of pre-briefing conversations in which the overwhelming majority of the exchanges were about the functional or structural attributes of space, discussion that touched on the phenomenological, perceptual and the symbolic meanings of space were rare. We explore the contextual features of meetings and the conversational strategies taken by the architect to prompt the users for information and the influence these had on the information provided. Recommendations are made on the format and structure of pre-briefing conversations and on designers' strategies for raising the level of information provided by the user beyond the functional or structural attributes of space.
Resumo:
It is evident that quantitative information on different microbial groups and their contribution in terms of activity in the gastrointestinal (GI) tract of humans and animals is required in order to formulate functional diets targeting improved gut function and host health. In this work, quantitative information on levels and spatial distributions of Bacteroides spp, Eubacterium spp, Clostridium spp, Escherichia coli, Bifidobacterium spp and Lactobacillus/Enterococcus spp. along the porcine large intestine was investigated using 16S rRNA targeted probes and fluorescent in situ hybridisation (FISH). Caecum, ascending colon (AC) and rectum luminal digesta from three groups of individually housed growing pigs fed either a corn-soybean basal diet (CON diet) or a prebiotic diet containing 10 g/kg oligofructose (FOS diet) or trans-galactooligosaccharides (TOS diet) at the expense of cornstarch were analysed. DAPI staining was used to enumerate total number of cells in the samples. Populations of total cells, Bacteroides, Eubacterium, Clostridium and Bifidobacterium, declined significantly (P < 0.05) from caecum to rectum, and were not affected by dietary treatments. Populations of Lactobacillus/ Enterococcus and E coli did not differ throughout the large intestine. The relative percent (%) contribution of each bacterial group to the total cell count did not differ between caecum and rectum, with the exception of Eubacterium that was higher in the AC digesta. FISH analysis showed that the sum of all bacterial groups made up a small percentage of the total cells, which was 12.4%, 21.8% and 10.3% in caecum, AC and rectum, respectively. This supports the view that in swine, the diversity of GI microflora might be higher compared to other species. In terms of microflora metabolic activity, the substantially higher numerical trends seen in FOS and TOS treatments regarding total volatile fatty acid, acetate concentrations and glycolytic activities, it could be postulated that FOS and TOS promoted saccharolytic activities in the porcine colon. (c) 2006 Elsevier Ltd. All rights reserved.
Resumo:
Abstract. This paper presents the User-Intimate Requirements Hierarchy Resolution Framework (UI-REF) based on earlier work (Badii 1997-2008) to optimise the requirements engineering process particularly to support userintimate interactive systems co-design. The stages of the UI- EF framework for requirements resolution-and-prioritisation are described. UI-REF has been established to ensure that the most-deeply-valued needs of the majority of stakeholders are elicited and ranked, and the root rationale for requirements evolution is trace-able and contextualised so as to help resolve stakeholder conflicts. UI-REF supports the dynamically evolving requirements of the users in the context of digital economy as under-pinned by online service provisioning. Requirements prioritisation in UI-REF is fully resolved while a promotion path for lower priority requirements is delineated so as to ensure that as the requirements evolve so will their resolution and prioritisation.
Resumo:
An extensive set of machine learning and pattern classification techniques trained and tested on KDD dataset failed in detecting most of the user-to-root attacks. This paper aims to provide an approach for mitigating negative aspects of the mentioned dataset, which led to low detection rates. Genetic algorithm is employed to implement rules for detecting various types of attacks. Rules are formed of the features of the dataset identified as the most important ones for each attack type. In this way we introduce high level of generality and thus achieve high detection rates, but also gain high reduction of the system training time. Thenceforth we re-check the decision of the user-to- root rules with the rules that detect other types of attacks. In this way we decrease the false-positive rate. The model was verified on KDD 99, demonstrating higher detection rates than those reported by the state- of-the-art while maintaining low false-positive rate.
Resumo:
Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in building automation, healthcare and agriculture. In the EU project Hydra1 highlevel security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios especially in the user domains of building automation, healthcare, and agriculture. This paper gives a short introduction to the Hydra project, its user domains and its approach to ensure security by design. Based on the results of a focus group analysis of the building automation domain typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta Model. How concepts such as context security, semantic security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of a technical building automation scenario.
Resumo:
Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in different domains. In the EU project Hydra high-level security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the. Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios. This paper gives a short introduction to the Hydra project and its approach to ensure security by design. Based on the results of a focus group analysis of the user domain "building automation" typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta-Model. How concepts such as context, semantic resolution of security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of it technical building automation scenario.
Resumo:
The ENABLE project, which is partly funded by the European Commission, aims to assist elderly people to live well, independently and at case. In this project a wrist unit with both integrated and external sensors, and with a radio frequency link to a mobile phone. will be developed. ENABLE will provide a number of services for elderly people. among them also a remote control service for the home environment. This paper briefly describes the project in general and then focuses on the initial user needs investigation which was carried Out in early 2007 in six different European countries. The provisional findings are discussed and an outlook on the ongoing and future project work is given. A special focus of this paper is on the environmental control service.
Resumo:
Resource monitoring in distributed systems is required to understand the 'health' of the overall system and to help identify particular problems, such as dysfunctional hardware or faulty system or application software. Monitoring systems such as GridRM provide the ability to connect to any number of different types of monitoring agents and provide different views of the system, based on a client's particular preferences. Web 2.0 technologies, and in particular 'mashups', are emerging as a promising technique for rapidly constructing rich user interfaces, that combine and present data in intuitive ways. This paper describes a Web 2.0 user interface that was created to expose resource data harvested by the GridRM resource monitoring system.