79,254 research outputs found
Road traffic pollution monitoring and modelling tools and the UK national air quality strategy.
This paper provides an assessment of the tools required to fulfil the air quality management role now expected of local authorities within the UK. The use of a range of pollution monitoring tools in assessing air quality is discussed and illustrated with evidence from a number of previous studies of urban background and roadside pollution monitoring in Leicester. A number of approaches to pollution modelling currently available for deployment are examined. Subsequently, the modelling and monitoring tools are assessed against the requirements of Local Authorities establishing Air Quality Management Areas. Whilst the paper examines UK based policy, the study is of wider international interest
Bridging the Gap Between Traditional Metadata and the Requirements of an Academic SDI for Interdisciplinary Research
Metadata has long been understood as a fundamental component of any Spatial Data Infrastructure, providing information relating to discovery, evaluation and use of
datasets and describing their quality. Having good metadata about a dataset is fundamental to using it correctly and to understanding the implications of issues such as missing data or incorrect attribution on the results obtained for any analysis carried out.
Traditionally, spatial data was created by expert users (e.g. national mapping agencies), who created metadata for the data. Increasingly, however, data used in spatial analysis comes from multiple sources and could be captured or used by nonexpert users â for example academic researchers â many of whom are from nonâGIS disciplinary backgrounds, not familiar with metadata and perhaps working in geographically dispersed teams. This paper examines the applicability of metadata in this academic context, using a multiânational coastal/environmental project as a case study. The work to date highlights a number of suggestions for good practice, issues and research questions relevant to Academic SDI, particularly given the increased levels of research data sharing and reuse required by UK and EU funders
The future of Cybersecurity in Italy: Strategic focus area
This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
Recommended from our members
E-learning for Networked Living
Networked Living is a Level 1 course in Information and Communication Technologies (ICT) offered by the UK Open University. The first two presentation of the course, in 2005 and 2006, attracted over 3000 students between them. Networked Living introduces students to ICT concepts and issues in a range of contexts. The course adopts a blended learning approach, using printed texts, web resources, DVD and computer conferencing.
All the above media are used where appropriate to support students' learning. About 60% of the material is print-based â teaching texts, together with selected third-party articles. About 20% is web-based â using a comprehensive course web site, but also requiring students to find and use third-party sites. The remaining 20% is based on offline computer resources (e.g. spreadsheets) and collaborative activities using computer conferencing.
The course web site contains short animations, quizzes and several interactive activities where students contribute information and commentaries, and can then see the collated contributions of other students. The DVD contains longer animations, simulations and software. Computer conferencing is used for tutor-group and whole-cohort conferences, and for online tutorials, with both asynchronous and synchronous discussion. The course web site provides a new, shareable 'online journal' facility, where students can record their work for the course.
This paper discusses the various e-learning elements of Networked Living, based on the first two presentations of the course. The paper considers how e-learning can be combined with printed resources to create a successful blended learning experience for students
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
Understanding the Roots of Radicalisation on Twitter
In an increasingly digital world, identifying signs of online extremism sits at the top of the priority list for counter-extremist agencies. Researchers and governments are investing in the creation of advanced information technologies to identify and counter extremism through intelligent large-scale analysis of online data. However, to the best of our knowledge, these technologies are neither based on, nor do they take advantage of, the existing theories and studies of radicalisation. In this paper we propose a computational approach for detecting and predicting the radicalisation influence a user is exposed to, grounded on the notion of âroots of radicalisationâ from social science models. This approach has been applied to analyse and compare the radicalisation level of 112 pro-ISIS vs.112 âgeneral" Twitter users. Our results show the effectiveness of our proposed algorithms in detecting and predicting radicalisation influence, obtaining up to 0.9 F-1 measure for detection and between 0.7 and 0.8 precision for prediction. While this is an initial attempt towards the effective combination of social and computational perspectives, more work is needed to bridge these disciplines, and to build on their strengths to target the problem of online radicalisation
- âŠ