9,651 research outputs found
CHORUS Deliverable 3.3: Vision Document - Intermediate version
The goal of the CHORUS vision document is to create a high level vision on audio-visual search engines in order to give guidance to the future R&D work in this area (in line with the mandate of CHORUS as a Coordination Action).
This current intermediate draft of the CHORUS vision document (D3.3) is based on the previous CHORUS vision documents D3.1 to D3.2 and on the results of the six CHORUS Think-Tank meetings held in March, September and November 2007 as well as in April, July and October 2008, and on the feedback from other CHORUS events.
The outcome of the six Think-Thank meetings will not just be to the benefit of the participants which are stakeholders and experts from academia and industry – CHORUS, as a coordination action of the EC, will feed back the findings (see Summary) to the projects under its purview and, via its website, to the whole community working in the domain of AV content search.
A few subjections of this deliverable are to be completed after the eights (and presumably last) Think-Tank meeting in spring 2009
From user browsing behaviour to user demographics
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies ManagementA Internet conta hoje com mais de 3 mil milhões de utilizadores e esse valor não para
de aumentar. Desta forma, proporcionar uma experiência online agradável aos seus
utilizadores é cada vez mais importante para as empresas. De modo a tirar partido
dos benefícios deste crescimento, as empresas devem ser capazes de identificar os
seus clientes-alvo dentro do total de utilizadores; e, subsequentemente, personalizar a
sua experiência online. Existem diversas formas de estudar o comportamento online
dos utilizadores; no entanto, estas não são ideais e existe uma ampla margem para
melhoria.
A inovação nesta área pode comportar um grande potencial comercial e até ser disruptiva.
Com isto em mente, proponho-me a estudar a possível criacão de um sistema
de aprendizagem automática (machine learning) que permita prever informa ações demográficas
dos utilizadores estritamente com base no seu comportamento online. Tal
sistema poderia constituir uma alternativa às atuais opções, que são mais invasivas;
mitigando assim preocupações ao nível da proteção de dados pessoais.
No primeiro capítulo (Introdução) explico a motivação para o estudo do comportamento
dos utilizadores online por parte de empresas, e descrevo as opções disponíveis
atualmente. Apresento também a minha proposta e o contexto em que assenta. O
capítulo termina com a identicação de limitações que possam existir a priori.
O segundo capítulo (Machine Learning) fornece uma introdução sobre machine
learning, com o estudo dos algoritmos que vão ser utilizados e explicando como analisar
os resultados.
O terceiro capítulo (Implementação) explica a implementação do sistema proposto
e descreve o sistema que desenvolvi no decorrer deste estudo, e como integra-lo em
sistemas já existentes.
No quarto capítulo (Análise e manipulação dos dados), mostro os dados compilados
e explico como os recolhi e manipulei para testar a hipótese.
No quinto capítulo (Análise de dados e discussão) vemos como e que os dados
recolhidos foram usados pelos vários algoritmos para descobrir como se correlacionam
com dados dos utilizadores e analiso e discuto os resultados observados.
Por fim, o sexto e último capítulo apresenta as conclusões. Dependendo dos
resultados, mostro como a hipótese poderia ser melhor testada, ou então discuto os
próximos passos para tornar o sistema realidade
A Review of Platforms for the Development of Agent Systems
Agent-based computing is an active field of research with the goal of
building autonomous software of hardware entities. This task is often
facilitated by the use of dedicated, specialized frameworks. For almost thirty
years, many such agent platforms have been developed. Meanwhile, some of them
have been abandoned, others continue their development and new platforms are
released. This paper presents a up-to-date review of the existing agent
platforms and also a historical perspective of this domain. It aims to serve as
a reference point for people interested in developing agent systems. This work
details the main characteristics of the included agent platforms, together with
links to specific projects where they have been used. It distinguishes between
the active platforms and those no longer under development or with unclear
status. It also classifies the agent platforms as general purpose ones, free or
commercial, and specialized ones, which can be used for particular types of
applications.Comment: 40 pages, 2 figures, 9 tables, 83 reference
Models for Learning (Mod4L) Final Report: Representing Learning Designs
The Mod4L Models of Practice project is part of the JISC-funded Design for Learning Programme. It ran from 1 May – 31 December 2006. The philosophy underlying the project was that a general split is evident in the e-learning community between development of e-learning tools, services and standards, and research into how teachers can use these most effectively, and is impeding uptake of new tools and methods by teachers. To help overcome this barrier and bridge the gap, a need is felt for practitioner-focused resources which describe a range of learning designs and offer guidance on how these may be chosen and applied, how they can support effective practice in design for learning, and how they can support the development of effective tools, standards and systems with a learning design capability (see, for example, Griffiths and Blat 2005, JISC 2006). Practice models, it was suggested, were such a resource.
The aim of the project was to: develop a range of practice models that could be used by practitioners in real life contexts and have a high impact on improving teaching and learning practice.
We worked with two definitions of practice models. Practice models are:
1. generic approaches to the structuring and orchestration of learning activities. They express elements of pedagogic principle and allow practitioners to make informed choices (JISC 2006)
However, however effective a learning design may be, it can only be shared with others through a representation. The issue of representation of learning designs is, then, central to the concept of sharing and reuse at the heart of JISC’s Design for Learning programme. Thus practice models should be both representations of effective practice, and effective representations of practice. Hence we arrived at the project working definition of practice models as:
2. Common, but decontextualised, learning designs that are represented in a way that is usable by practitioners (teachers, managers, etc).(Mod4L working definition, Falconer & Littlejohn 2006).
A learning design is defined as the outcome of the process of designing, planning and orchestrating learning activities as part of a learning session or programme (JISC 2006).
Practice models have many potential uses: they describe a range of learning designs that are found to be effective, and offer guidance on their use; they support sharing, reuse and adaptation of learning designs by teachers, and also the development of tools, standards and systems for planning, editing and running the designs.
The project took a practitioner-centred approach, working in close collaboration with a focus group of 12 teachers recruited across a range of disciplines and from both FE and HE. Focus group members are listed in Appendix 1. Information was gathered from the focus group through two face to face workshops, and through their contributions to discussions on the project wiki. This was supplemented by an activity at a JISC pedagogy experts meeting in October 2006, and a part workshop at ALT-C in September 2006. The project interim report of August 2006 contained the outcomes of the first workshop (Falconer and Littlejohn, 2006).
The current report refines the discussion of issues of representing learning designs for sharing and reuse evidenced in the interim report and highlights problems with the concept of practice models (section 2), characterises the requirements teachers have of effective representations (section 3), evaluates a number of types of representation against these requirements (section 4), explores the more technically focused role of sequencing representations and controlled vocabularies (sections 5 & 6), documents some generic learning designs (section 8.2) and suggests ways forward for bridging the gap between teachers and developers (section 2.6).
All quotations are taken from the Mod4L wiki unless otherwise stated
Recommended from our members
A data-driven agent based simulation platform for early health economics device evaluation
Health economics is a relatively new but growing field within the discipline of economics and is concerned with making the best use of scarce resources. Early health economic estimates of new medical devices, in particular, can assist producers of health technology in making appropriate product design and investment decisions. It allows companies to understand their likely market and possible reimbursement more thoroughly. Despite the many advantages of point-of-care testing the key problem facing decision makers at the moment is the poor understanding of the potential value gained from new or alternative product or service offerings. Understanding medical device features in the wider market place can be addressed used agent based modelling and simulation (ABMS). In this paper we examine the use of ABMS underpinned by a novel data-driven approach to model generation. A sepsis use case is presented where pathway and device characteristics are defined using the ‘headroom’ method and a semantic evidence capture application. Types and sub-types are automatically extracted into agent models and subsequently executed in our own data-driven agent based simulation platform (TEASIM). A highly typed data-driven approach is evaluated in a manner that clearly presents the technical aspects of TEASIM platform and its practical usage. Initial evaluation of a data-driven approach (and the TEASIM platform) is positive. The approach offers a viable guide to product development in a cost-effective manner, especially in the earlier stages when deciding between potential product configurations or features.Innovate UK provided the funding for the Tea-PoCT project
Review of Open Source Simulators in ICS/IIoT Security Context
In industrial control systems (ICS), simulation has found widespread use during system design and in tuning process control parameters or exploring the effects of new control algorithms. Simulation enables the assessment of performance at scale and allows research to be conducted by those with limited access to real physical infrastructures. However, as ICSs are often no longer isolated from other networks and the internet, hence are subject to security and safety issues, simulation is also required to understand the issues and their solution. To foster transparent, collaborative and cost-effective studies, demonstrations, and solution development, and attract the broadest interest base, simulation is indeed critical and Open Source is a good way to go since simulators in this category are less expensive to access, install, and use, and can be run with general purpose (non-proprietary) computing equipment and setups. Findings This research presents the following key findings: 1. A lot of Open Source simulation tools exist and span applications areas such as communications and sensor networks (C&WSNs), ICS/SCADA, and IIoT. 2. The functional structures and characteristics that appear common in Open Source simulators include: supported licence types, programming languages, operating systems platforms, user interface types, and available documentation and types. 3. Typical research around Open Source simulators is built around modelling, analysis and optimisation of operations in relations to factors such as flexibility, mobility, scalability, and active user support. No single Open Source simulator addresses all conceivable characteristics. While some are strong in specific contexts relative to their development, they are often weak in other purpose-based research capabilities, especially in the context of IoT. 4. Most of the reviewed Open Source tools are not designed to address security contexts. The few that address security such as SCADASim only consider very limited contexts such as testing and evaluating Denial-of-Service (DoS), Man-in-the-middle (Mitm), Eavesdropping, and Spoofing attacks. Recommendations The following key recommendations are presented: 1. Future developments of Open Source simulators (especially for IIoT) should explore the potential for functionalities that can enable the integration of diverse simulators and platforms to achieve an encompassing setup. 2. Developers should explore the capabilities of generic simulators towards achieving architectures with expansible capabilities into multi-class domains, support easier and faster modelling of complex systems, and which can attract varied users and contributors. 3. Functional characteristics such as; ease of use, degree of community acceptance and use, and suitability for industrial applications, should also be considered as selection and development criteria, and to emphasise simulator effectiveness. This can support consistency, credibility, and simulation system relevance within a domain that is continually evolving. 4. Future Open Source simulation projects developments should consider and adopt the more common structural attributes including; Platform Type, Open Source Licence Type, Programming Language, User Interfaces, Documentation, and Communication Types. These should be further complemented by appropriate editorial controls spanning quality coding, revision control and effective project disseminations and management, to boost simulation tool credibility and wide acceptance. 5. The range of publication dates (earliest to latest) for: citations, code commits, and number of contributors associated to Open Source simulator projects can also support the decision for interests and adoption of specific Open Source projects. 6. Research objectives for ICS/IIoT Open Source simulators should also include security performance and optimisation with considerations towards enhancing confidentiality, integrity and availability. 7. Further studies should explore the evaluation of security topics which could be addressed by simulation – more specifically, proposing how this may be achieved and identifying what can't be addressed by simulation. Investigations into simulation frameworks that can allow multi-mode simulations to be configured and operated are also required. Research into Industry 4.0 System-of-Systems (SoS) security evaluations, dependency, and cascading impacts method or analysis is another area of importanc
- …