906 resultados para Knowledge retrieval, Ontology, User information needs, User profiles, Information retrieval
Resumo:
A user manual for the GeoMedia software program, along with some discussion of digital orthophotos.
Resumo:
The UK’s historically low cost of energy has encouraged a culture that considers energy to be in limitless supply and excessive levels of consumption acceptable. Now that supplies are becoming restricted and costs rising, it is becoming recognised this energy culture has created a legacy stock of buildings with poor building fabric, limited energy efficiency equipment and even lower levels of energy awareness. Cost effective technologies are readily available but not adopted by UK SMEs in non-domestic buildings, as rational economic theory would expect. Policy-makers attribute this to inaccessibility of information and investment and design policies accordingly. However, as escalation of demand continues an alternative driver of this paradox must exist. This research hypothesises that this is the ownership structures of non-domestic buildings. Tenure of business premises is found to prevent adoption of energy conservation opportunities; 64% of SME surveyed encountered barriers to energy efficiency related to building ownership. When increased pro rata to reflect the UK SME population, almost 2.5 million businesses appear unable to benefit from energy improvements.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-07
Resumo:
Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.
Resumo:
Designing for users rather than with users is still a common practice in technology design and innovation as opposed to taking them on board in the process. Design for inclusion aims to define and understand end-users, their needs, context of use, and, by doing so, ensure that end-users are catered for and included, while the results are geared towards universality of use. We describe the central role of end-user and designer participation, immersion and perspective to build user-driven solutions. These approaches provided a critical understanding of the counterpart role. Designer(s) could understand what the user’s needs were, experience physical impairments, and see from other’s perspective the interaction with the environment. Users could understand challenges of designing for physical impairments, build a sense of ownership with technology and explore it from a creative perspective. The understanding of the peer’s role (user and designer), needs and perspective enhanced user participation and inclusion.
Resumo:
With the dramatic growth of text information, there is an increasing need for powerful text mining systems that can automatically discover useful knowledge from text. Text is generally associated with all kinds of contextual information. Those contexts can be explicit, such as the time and the location where a blog article is written, and the author(s) of a biomedical publication, or implicit, such as the positive or negative sentiment that an author had when she wrote a product review; there may also be complex context such as the social network of the authors. Many applications require analysis of topic patterns over different contexts. For instance, analysis of search logs in the context of the user can reveal how we can improve the quality of a search engine by optimizing the search results according to particular users; analysis of customer reviews in the context of positive and negative sentiments can help the user summarize public opinions about a product; analysis of blogs or scientific publications in the context of a social network can facilitate discovery of more meaningful topical communities. Since context information significantly affects the choices of topics and language made by authors, in general, it is very important to incorporate it into analyzing and mining text data. In general, modeling the context in text, discovering contextual patterns of language units and topics from text, a general task which we refer to as Contextual Text Mining, has widespread applications in text mining. In this thesis, we provide a novel and systematic study of contextual text mining, which is a new paradigm of text mining treating context information as the ``first-class citizen.'' We formally define the problem of contextual text mining and its basic tasks, and propose a general framework for contextual text mining based on generative modeling of text. This conceptual framework provides general guidance on text mining problems with context information and can be instantiated into many real tasks, including the general problem of contextual topic analysis. We formally present a functional framework for contextual topic analysis, with a general contextual topic model and its various versions, which can effectively solve the text mining problems in a lot of real world applications. We further introduce general components of contextual topic analysis, by adding priors to contextual topic models to incorporate prior knowledge, regularizing contextual topic models with dependency structure of context, and postprocessing contextual patterns to extract refined patterns. The refinements on the general contextual topic model naturally lead to a variety of probabilistic models which incorporate different types of context and various assumptions and constraints. These special versions of the contextual topic model are proved effective in a variety of real applications involving topics and explicit contexts, implicit contexts, and complex contexts. We then introduce a postprocessing procedure for contextual patterns, by generating meaningful labels for multinomial context models. This method provides a general way to interpret text mining results for real users. By applying contextual text mining in the ``context'' of other text information management tasks, including ad hoc text retrieval and web search, we further prove the effectiveness of contextual text mining techniques in a quantitative way with large scale datasets. The framework of contextual text mining not only unifies many explorations of text analysis with context information, but also opens up many new possibilities for future research directions in text mining.
Resumo:
We build a system to support search and visualization on heterogeneous information networks. We first build our system on a specialized heterogeneous information network: DBLP. The system aims to facilitate people, especially computer science researchers, toward a better understanding and user experience about academic information networks. Then we extend our system to the Web. Our results are much more intuitive and knowledgeable than the simple top-k blue links from traditional search engines, and bring more meaningful structural results with correlated entities. We also investigate the ranking algorithm, and we show that the personalized PageRank and proposed Hetero-personalized PageRank outperform the TF-IDF ranking or mixture of TF-IDF and authority ranking. Our work opens several directions for future research.
Resumo:
A presente investigação tem como objeto de estudo a Arte Nova nas cidades de Aveiro e Ílhavo, traduzindo-se posteriormente na criação de uma aplicação mobile de um roteiro diferenciador referente ao património Arte Nova localizado nas duas cidades. Existe em Aveiro, uma tomada de consciência notória relativa ao património que se enquadra no espírito e nas características do estilo Arte Nova. Isso em muito se deve à originalidade e diversidade de interpretações que a caracterizam localmente. No entanto, apesar dos melhoramentos efetuados na comunicação deste património, especialmente depois da reabilitação do edifício Mário Belmonte Pessoa e da sua transformação em Museu Arte Nova, o roteiro atual não contempla todos os artefactos do estilo existentes na cidade e exclui aqueles que se encontram fora do centro urbano da cidade de Aveiro. Em Ílhavo a realidade é completamente díspar da encontrada na cidade vizinha, Aveiro, não existindo grande decoro pelo tratamento da informação referente ao estilo Arte Nova, apenas algumas referencias breves em guias culturais e um roteiro limitado no site da Câmara Municipal de Ílhavo. Paralelamente a isto, a região de Aveiro tornou-se numa das regiões com o espólio mais significativo do país. Dada à sua importância cultural e local, o roteiro diferenciador que propomos nesta investigação irá intervir de forma a melhorar o que já existe, passando pelo aprofundamento de conhecimentos sobre o tema, catalogação, cruzamento e agrupamento de toda a informação dos artefactos que se encontrem dispersos pelas duas cidades, de forma a tornar mais fácil a procura e o acesso à informação. Numa primeira fase, a investigação irá focar-se nos conteúdos afetos a cada um dos artefactos, sendo estes metodologicamente trabalhados através do método triangular de Francisco Providência, a interpretação autoral (autoria) que se traduz na evolução dos edifícios (tecnologia) e a relevância da sua história (programa) para o património nacional. Posteriormente, os conteúdos anteriormente referidos serão adaptados a uma aplicação mobile que facilitará o acesso à informação previamente selecionada referente a cada artefacto, apresentando uma breve história sobre as manifestações da Arte Nova nas cidades de Aveiro e Ílhavo. Esta aplicação mobile permitirá perceber a evolução dos edifícios desde a sua construção até à atualidade, ao nível de recuperação estrutural ou da falta de reabilitação e recuperação dos mesmos. Contribuirá para conhecer se os edifícios mantiveram (ou não) as suas características originais relativas ao desenho e tecnologia, para tal fará valerse de tecnologias como Realidade Aumentada, assim como os princípios de elaboração e leitura de QR codes, para facilitar o acesso, localização e compreensão dessa mesma informação, permitindo ainda que o seu utilizador embarque numa viagem no tempo e experiencie o roteiro de uma forma diferente. Paralelamente, pretende-se que este roteiro funcione como um roteiro único do património Arte Nova nas duas cidades, com o intuito de se expandir a outras cidades e se tornar num roteiro único do património Arte Nova na região de Aveiro. A diversidade do património Arte Nova nesta região assenta no cunho pessoal e social que os proprietários atribuíram aos seus artefactos, assim como na formação e a capacidade artística fortemente influenciada pela técnica pessoal, temperamento e sensibilidade dos seus autores, fazendo destes artefactos autênticas obras de arte, que merecem o seu estudo. Constatou-se, ao nível dos resultados que o protótipo da aplicação mobile, se adequaram ao que foi anunciado, a nível investigativo, e por isso, interessou a este estudo confirmar a demonstração do que foi enunciado. No entanto, concluiu-se que o respetivo protótipo necessita de ser ‘afinado’ em estudos futuros. Independentemente, das fragilidades encontradas, considera-se que este protótipo de aplicação mobile poderá servir como meio de excelência para a integração de conteúdos que vão mais além do que a visualização dos artefactos. Assim, contribui-se para o adensamento e acesso ao conhecimento sobre a história da Arte Nova em Portugal.
Resumo:
Training in information competencies or information literacy is one of the current challenges of university libraries at the possibilities of access to vast information resources that facilitate digital media, which require a better understand and apply the selection and assessment criteria to retrieval the highest quality and relevance of information as needed. In this situation, Ibero-American university libraries (Latin-America, Spain and Portugal) have been slowly incorporating this training either from direct training programs, offered from the library or through collaborative work with teachers and schools in curricula of various universities as a whole or in specific disciplines. In this text, it was identified that, at present, from the information displayed on Web sites of universities-HEI in Costa Rica, a very small percentage of university libraries would find taking actions in a level 1 or 2 of incorporating information literacy, since a large most developed is still very focused programs and processes to the traditional user training, while another large majority, unfortunately, has no action-information about actions from the forming perspective that should be any library.
Resumo:
O Serviço de Referência (SR), incorporando na sua organização, funcionamento e comunicação com o utilizador um conjunto de potencialidades proporcionadas pela tecnologia, assume um papel fundamental na luta contra a desigualdade e o analfabetismo digital, no fomento da literacia da informação e na criação de conhecimento. A percepção do valor e das fragilidades do SR nas bibliotecas públicas em Portugal levanta a questão sobre como contribuir para o seu desenvolvimento. A presente investigação, visando a construção de alicerces numa perspectiva de evolução, parte da análise de documentos orientadores internacionais da RUSA/ALA (Reference and User Services Association / American Library Association) e da IFLA (International Federation of Library Association) e da observação de características estruturais da Rede Nacional de Biblioteca Públicas (RNBP), para a concepção de soluções de desenvolvimento do SR a aplicar a esta realidade concreta. Seguindo um paradigma compreensivo indutivo, com uma orientação baseada na Grounded Theory, esta pesquisa privilegia o contexto da descoberta e a construção de uma teoria. No plano empírico cumpre uma complementaridade de técnicas qualitativas e quantitativas, com recurso a uma triangulação metodológica. O campo de análise abrange a totalidade das bibliotecas públicas portuguesas integradas na RNBP em Portugal. Visando aspectos funcionais e materiais, são analisados dados preexistentes e aplicadas técnicas de observação directa e inquérito por questionário. Visando aspectos sociais, são efectuadas seis entrevistas semi-estruturadas. Os resultados apontam para uma situação de estagnação das bibliotecas da RNBP e para um funcionamento não estruturado e informal do SR, na maioria dos casos em que se verifica a sua disponibilização. Fundamentada a necessidade de evolução, e do investimento que nele possa ser feito, é construído um modelo, seguindo uma estratégia por níveis, flexíveis e adaptáveis às necessidades e aos recursos de cada biblioteca, que visa o desenvolvimento incremental e congruente daquele serviço; Abstract: The Reference Service in public libraries in Portugal. Development model from international guidelines. Incorporating in its organization, procedures and communication with the users a set of tools brought by technology, Reference Service (RS) plays a key role in the struggle against inequality and digital illiteracy, promoting information literacy and creating knowledge. The perception of the value of RS and the weaknesses in public libraries in Portugal raise the question on how to contribute to its development. In order to build RS foundations on an evolutionary perspective, this research analyzes RUSA / ALA (Reference and User Services Association / American Library Association) and IFLA (International Federation of Library Association) international guidelines and the structural characteristics of the Portuguese National Public Library Network (RNBP), with the objective of creating a solution for the development of that service to be applied to this reality. Following an inductive comprehensive paradigm, with an orientation based on Grounded Theory, this research focuses on the context of discovery and the construction of a theory. Empirically it fulfils complementary qualitative and quantitative techniques, using a methodological triangulation. The field of analysis covers Portuguese public libraries integrating the RNBP. Aiming at functional and material aspects, direct observation techniques and a survey by questionnaire are applied. Targeting social aspects, six semistructured interviews are carried out. The results point to a situation of stagnation in the RNBP as well as the unstructured and informal performance of the SR, which justifies the need for evolution and investment. A model is constructed, following a strategy based on levels, flexible and adaptable to the needs and resources of each library, with the perspective of an incremental and consistent development of this service.
Resumo:
Social-scientific analysis of public-participation initiatives has proliferated in recent years. This review article discusses some key aspects of recent work. Firstly, it analyses some of the justifications put forward for public participation, drawing attention to differences and overlaps between rationales premised on democratic representation/representativeness and those based on more technocratic ideas about the knowledge that the public can offer. Secondly, it considers certain tensions in policy discourses on participation, focusing in particular on policy relating to the National Health Service and other British public services. Thirdly, it examines the challenges of putting a coherent vision for public participation into practice, noting the impediments that derive from the often-competing ideas about the remit of participation held by different groups of stakeholders. Finally, it analyses the gap between policy and practice, and the consequences of this for the prospects for the enactment of active citizenship through participation initiatives.
Resumo:
Software updates are critical to the security of software systems and devices. Yet users often do not install them in a timely manner, leaving their devices open to security exploits. This research explored a re-design of automatic software updates on desktop and mobile devices to improve the uptake of updates through three studies. First using interviews, we studied users’ updating patterns and behaviors on desktop machines in a formative study. Second, we distilled these findings into the design of a low-fi prototype for desktops, and evaluated its efficacy for automating updates by means of a think-aloud study. Third, we investigated individual differences in update automation on Android devices using a large scale survey, and interviews. In this thesis, I present the findings of all three studies and provide evidence for how automatic updates can be better appropriated to fit users on both desktops and mobile devices. Additionally, I provide user interface design suggestions for software updates and outline recommendations for future work to improve the user experience of software updates.
Resumo:
The ever-increasing number and severity of cybersecurity breaches makes it vital to understand the factors that make organizations vulnerable. Since humans are considered the weakest link in the cybersecurity chain of an organization, this study evaluates users’ individual differences (demographic factors, risk-taking preferences, decision-making styles and personality traits) to understand online security behavior. This thesis studies four different yet tightly related online security behaviors that influence organizational cybersecurity: device securement, password generation, proactive awareness and updating. A survey (N=369) of students, faculty and staff in a large mid-Atlantic U.S. public university identifies individual characteristics that relate to online security behavior and characterizes the higher-risk individuals that pose threats to the university’s cybersecurity. Based on these findings and insights from interviews with phishing victims, the study concludes with recommendations to help similat organizations increase end-user cybersecurity compliance and mitigate the risks caused by humans in the organizational cybersecurity chain.
Resumo:
Libraries since their inception 4000 years ago have been in a process of constant change. Although, changes were in slow motion for centuries, in the last decades, academic libraries have been continuously striving to adapt their services to the ever-changing user needs of students and academic staff. In addition, e-content revolution, technological advances, and ever-shrinking budgets have obliged libraries to efficiently allocate their limited resources among collection and services. Unfortunately, this resource allocation is a complex process due to the diversity of data sources and formats required to be analyzed prior to decision-making, as well as the lack of efficient integration methods. The main purpose of this study is to develop an integrated model that supports libraries in making optimal budgeting and resource allocation decisions among their services and collection by means of a holistic analysis. To this end, a combination of several methodologies and structured approaches is conducted. Firstly, a holistic structure and the required toolset to holistically assess academic libraries are proposed to collect and organize the data from an economic point of view. A four-pronged theoretical framework is used in which the library system and collection are analyzed from the perspective of users and internal stakeholders. The first quadrant corresponds to the internal perspective of the library system that is to analyze the library performance, and costs incurred and resources consumed by library services. The second quadrant evaluates the external perspective of the library system; user’s perception about services quality is judged in this quadrant. The third quadrant analyses the external perspective of the library collection that is to evaluate the impact of the current library collection on its users. Eventually, the fourth quadrant evaluates the internal perspective of the library collection; the usage patterns followed to manipulate the library collection are analyzed. With a complete framework for data collection, these data coming from multiple sources and therefore with different formats, need to be integrated and stored in an adequate scheme for decision support. A data warehousing approach is secondly designed and implemented to integrate, process, and store the holistic-based collected data. Ultimately, strategic data stored in the data warehouse are analyzed and implemented for different purposes including the following: 1) Data visualization and reporting is proposed to allow library managers to publish library indicators in a simple and quick manner by using online reporting tools. 2) Sophisticated data analysis is recommended through the use of data mining tools; three data mining techniques are examined in this research study: regression, clustering and classification. These data mining techniques have been applied to the case study in the following manner: predicting the future investment in library development; finding clusters of users that share common interests and similar profiles, but belong to different faculties; and predicting library factors that affect student academic performance by analyzing possible correlations of library usage and academic performance. 3) Input for optimization models, early experiences of developing an optimal resource allocation model to distribute resources among the different processes of a library system are documented in this study. Specifically, the problem of allocating funds for digital collection among divisions of an academic library is addressed. An optimization model for the problem is defined with the objective of maximizing the usage of the digital collection over-all library divisions subject to a single collection budget. By proposing this holistic approach, the research study contributes to knowledge by providing an integrated solution to assist library managers to make economic decisions based on an “as realistic as possible” perspective of the library situation.