884 resultados para Popularity.
Resumo:
Open source software (OSS) popularity is growing steadily and many OSS systems could be used to preserve cultural heritage objects. Such solutions give the opportunity to organizations to afford the development of a digital collection. This paper focuses on reviewing two OSS tools, CollectionSpace and the Open Video Digital Library Toolkit and discuss on how these could be used for organizing digital replicas of cultural objects. The features of the software are presented and some examples are given.
Resumo:
The report presents the film 10th century. The South of the Royal Palace in Great Preslav. It consists of two parts – 10th century. The Royal Palace in Great Prelsav. The Square with the Pinnacle and The Ruler’s Lodgings. 3D and virtual reconstructions of an architectural ensemble – part of the Preslav Royal Court unearthed during archaeological researches are used in the film. 3D documentaries have already gained popularity around the world and are well received by both scholars and the public at large. One of the distinguished tourist destinations in Bulgaria is Great Preslav – capital of the mediaeval Bulgarian state and a significant cultural center of the European Southeast in 9th–10th centuries, too. The first part of the film is created with the financial support of America for Bulgaria Foundation and the second – with the funding of Bulgarian National Science Fund at the Ministry of Education, Youth and Science. A team of almost 20 members worked on the film, including computer specialists, professional actors, and translators in the four main European languages – English, German, French and Russian, Trima Sound Recording Studio. In the first part of the 3D film are shown a segment of the Royal Palace, the square with the water pinnacle and the adjacent buildings – an important structural element of the town-planning of the Preslav Court center in the 10th century. In the second part the accent is the southern part of the Royal Palace in Great Preslav, where the personal residence of the Preslav ruler’s dynasty is situated. The work on the virtual reconstruction was done by Virtual Archaeology club at the Mathematical School, Shumen. Due to the efforts of its members it is now clear how the square in front of the southern gate looked like.
Resumo:
The popularity of online social media platforms provides an unprecedented opportunity to study real-world complex networks of interactions. However, releasing this data to researchers and the public comes at the cost of potentially exposing private and sensitive user information. It has been shown that a naive anonymization of a network by removing the identity of the nodes is not sufficient to preserve users’ privacy. In order to deal with malicious attacks, k -anonymity solutions have been proposed to partially obfuscate topological information that can be used to infer nodes’ identity. In this paper, we study the problem of ensuring k anonymity in time-varying graphs, i.e., graphs with a structure that changes over time, and multi-layer graphs, i.e., graphs with multiple types of links. More specifically, we examine the case in which the attacker has access to the degree of the nodes. The goal is to generate a new graph where, given the degree of a node in each (temporal) layer of the graph, such a node remains indistinguishable from other k-1 nodes in the graph. In order to achieve this, we find the optimal partitioning of the graph nodes such that the cost of anonymizing the degree information within each group is minimum. We show that this reduces to a special case of a Generalized Assignment Problem, and we propose a simple yet effective algorithm to solve it. Finally, we introduce an iterated linear programming approach to enforce the realizability of the anonymized degree sequences. The efficacy of the method is assessed through an extensive set of experiments on synthetic and real-world graphs.
Resumo:
With the advent of GPS enabled smartphones, an increasing number of users is actively sharing their location through a variety of applications and services. Along with the continuing growth of Location-Based Social Networks (LBSNs), security experts have increasingly warned the public of the dangers of exposing sensitive information such as personal location data. Most importantly, in addition to the geographical coordinates of the user’s location, LBSNs allow easy access to an additional set of characteristics of that location, such as the venue type or popularity. In this paper, we investigate the role of location semantics in the identification of LBSN users. We simulate a scenario in which the attacker’s goal is to reveal the identity of a set of LBSN users by observing their check-in activity. We then propose to answer the following question: what are the types of venues that a malicious user has to monitor to maximize the probability of success? Conversely, when should a user decide whether to make his/her check-in to a location public or not? We perform our study on more than 1 million check-ins distributed over 17 urban regions of the United States. Our analysis shows that different types of venues display different discriminative power in terms of user identity, with most of the venues in the “Residence” category providing the highest re-identification success across the urban regions. Interestingly, we also find that users with a high entropy of their check-ins distribution are not necessarily the hardest to identify, suggesting that it is the collective behaviour of the users’ population that determines the complexity of the identification task, rather than the individual behaviour.
Resumo:
One of the greatest concerns related to the popularity of GPS-enabled devices and applications is the increasing availability of the personal location information generated by them and shared with application and service providers. Moreover, people tend to have regular routines and be characterized by a set of “significant places”, thus making it possible to identify a user from his/her mobility data. In this paper we present a series of techniques for identifying individuals from their GPS movements. More specifically, we study the uniqueness of GPS information for three popular datasets, and we provide a detailed analysis of the discriminatory power of speed, direction and distance of travel. Most importantly, we present a simple yet effective technique for the identification of users from location information that are not included in the original dataset used for training, thus raising important privacy concerns for the management of location datasets.
Resumo:
In recent years, the rapid spread of smartphones has led to the increasing popularity of Location-Based Social Networks (LBSNs). Although a number of research studies and articles in the press have shown the dangers of exposing personal location data, the inherent nature of LBSNs encourages users to publish information about their current location (i.e., their check-ins). The same is true for the majority of the most popular social networking websites, which offer the possibility of associating the current location of users to their posts and photos. Moreover, some LBSNs, such as Foursquare, let users tag their friends in their check-ins, thus potentially releasing location information of individuals that have no control over the published data. This raises additional privacy concerns for the management of location information in LBSNs. In this paper we propose and evaluate a series of techniques for the identification of users from their check-in data. More specifically, we first present two strategies according to which users are characterized by the spatio-temporal trajectory emerging from their check-ins over time and the frequency of visit to specific locations, respectively. In addition to these approaches, we also propose a hybrid strategy that is able to exploit both types of information. It is worth noting that these techniques can be applied to a more general class of problems where locations and social links of individuals are available in a given dataset. We evaluate our techniques by means of three real-world LBSNs datasets, demonstrating that a very limited amount of data points is sufficient to identify a user with a high degree of accuracy. For instance, we show that in some datasets we are able to classify more than 80% of the users correctly.
Resumo:
Report published in the Proceedings of the National Conference on "Education and Research in the Information Society", Plovdiv, May, 2015
Resumo:
This article presents a case study of the recent reform of the United Kingdom Equalities and Human Rights Commission, to address a critical gap in the literature on national human rights institutions (NHRIs) concerning the power of governments to exert control over these institutions through reform processes. Through this analysis, the article demonstrates, first, that NHRIs are affected by contextual factors not only related to the popularity of the human rights agenda but also to wider policy agendas which impact on their status and functions; and second, that attempts by government to exert more administrative control can be significantly problematic for the operational independence of NHRIs.
Resumo:
Online enquiry communities such as Question Answering (Q&A) websites allow people to seek answers to all kind of questions. With the growing popularity of such platforms, it is important for community managers to constantly monitor the performance of their communities. Although different metrics have been proposed for tracking the evolution of such communities, maturity, the process in which communities become more topic proficient over time, has been largely ignored despite its potential to help in identifying robust communities. In this paper, we interpret community maturity as the proportion of complex questions in a community at a given time. We use the Server Fault (SF) community, a Question Answering (Q&A) community of system administrators, as our case study and perform analysis on question complexity, the level of expertise required to answer a question. We show that question complexity depends on both the length of involvement and the level of contributions of the users who post questions within their community. We extract features relating to askers, answerers, questions and answers, and analyse which features are strongly correlated with question complexity. Although our findings highlight the difficulty of automatically identifying question complexity, we found that complexity is more influenced by both the topical focus and the length of community involvement of askers. Following the identification of question complexity, we define a measure of maturity and analyse the evolution of different topical communities. Our results show that different topical communities show different maturity patterns. Some communities show a high maturity at the beginning while others exhibit slow maturity rate. Copyright 2013 ACM.
Resumo:
Radio frequency identification (RFID) technology has gained increasing popularity in businesses to improve operational efficiency and maximise costs saving. However, there is a gap in the literature exploring the enhanced use of RFID to substantially add values to the supply chain operations, especially beyond what the RFID vendors could offer. This paper presents a multi-agent system, incorporating RFID technology, aimed at fulfilling the gap. The system is developed to model supply chain activities (in particular, logistics operations) and is comprised of autonomous and intelligent agents representing the key entities in the supply chain. With the advanced characteristics of RFID incorporated, the agent system examines ways logistics operations (i.e. distribution network) particular) can be efficiently reconfigured and optimised in response to dynamic changes in the market, production and at any stage in the supply chain. © 2012 IEEE.
Resumo:
In recent decades, a number of sustainable strategies and polices have been created to protect and preserve our water environments from the impacts of growing communities. The Australian approach, Water Sensitive Urban Design (WSUD), defined as the integration of urban planning and design with the urban water cycle management, has made considerable advances on design guidelines since 2000. WSUD stormwater management systems (e.g. wetlands, bioretentions, porous pavement etc), also known as Best Management Practices (BMPs) or Low Impact Development (LID), are slowly gaining popularity across Australia, the USA and Europe. There have also been significant improvements in how to model the performance of the WSUD technologies (e.g. MUSIC software). However, the implementation issues of these WSUD practices are mainly related to ongoing institutional capacity. Some of the key problems are associated with a limited awareness of urban planners and designers; in general, they have very little knowledge of these systems and their benefits to the urban environments. At the same time, hydrological engineers should have a better understanding of building codes and master plans. The land use regulations are equally as important as the physical site conditions for determining opportunities and constraints for implementing WSUD techniques. There is a need for procedures that can make a better linkage between urban planners and WSUD engineering practices. Thus, this paper aims to present the development of a general framework for incorporating WSUD technologies into the site planning process. The study was applied to lot-scale in the Melbourne region, Australia. Results show the potential space available for fitting WSUD elements, according to building requirements and different types of housing densities. © 2011 WIT Press.
Resumo:
It is already a truism that emerging communication technologies have changed the landscape of communication in every aspect of our lives, but this is specifically true for how we communicate at work. Advances in communication technologies have enabled a wide range of digital communication modes to be utilized for both internal and external business communication; including audio and visual communication and voice-over protocols, as well as text-based channels, such as email, forums, instant messaging and social media. In spite of the wide range of available audio-visual channels, and despite the ever-increasing popularity of email, real-time text-based communication technologies (instant messaging or IM) are also on the rise (see Mak, 2014; Pazos et al., 2013; Radicati & Levenstein, 2013; and Markman in this volume). The prominence of IM is evident in the rise of this mode of communication, not only as a tool for internal business communication, but as a front-stage channel, particularly for customer service encounters or professional-client conversations (Makarem et al., 2009; Pearce et al., 2013; L. Zhang et al., 2011).
Resumo:
Switched reluctance motors (SRMs) are gaining in popularity because of their robustness, low cost, and excellent high-speed characteristics. However, they are known to cause vibration and noise primarily due to the radial pulsating force resulting from their double-saliency structure. This paper investigates the effect of skewing the stator and/or rotor on the vibration reduction of the three-phase SRMs by developing four 12/8-pole SRMs, including a conventional SRM, a skewed rotor-SRM (SR-SRM), a skewed stator-SRM (SS-SRM), and a skewed stator and rotor-SRM (SSR-SRM). The radial force distributed on the stator yoke under different skewing angles is extensively studied by the finite-element method and experimental tests on the four prototypes. The inductance and torque characteristics of the four motors are also compared, and a control strategy by modulating the turn-ON and turn-OFF angles for the SR-SRM and the SS-SRM are also presented. Furthermore, experimental results validate the numerical models and the effectiveness of the skewing in reducing the motor vibration. Test results also suggest that skewing the stator is more effective than skewing the rotor in the SRMs.
Resumo:
The Leontief input-output model is widely used to determine the ecological footprint of consumption in a region or a country. It is able to capture spillover environmental effects along the supply change, thus its popularity is increasing in ecology related economic research. These studies are static and the dynamic investigations are neglected. The dynamic Leontief model makes it possible to involve the capital and inventory investment in the footprint calculation that projects future growth of GDP and environmental impacts. We show a new calculation method to determine the effect of capital accumulation on ecological footprint. Keywords: Dynamic Leontief model, Dynamic ecological footprint, Environmental management, Allocation method
Resumo:
The popularity of loyalty programs worldwide shows that this is one of the most efficient marketing tools in highly competitive markets to retain customers. The saturation of loyalty schemes themselves can lead to a fierce competition between firms to gain wider penetration for their cards. The experience of the customers regarding adoption of loyalty programs can affect their attitude towards the different attributes of the programs. We found that more experienced customers evaluate the importance of the soft attributes of the loyalty schemes higher.