51 research outputs found

    Harnessing customizationinWeb Annotation: ASoftwareProduct Line approach

    Get PDF
    222 p.La anotación web ayuda a mediar la interacción de lectura y escritura al transmitir información, agregar comentarios e inspirar conversaciones en documentos web. Se utiliza en áreas de Ciencias Sociales y Humanidades, Investigación Periodística, Ciencias Biológicas o Educación, por mencionar algunas. Las actividades de anotación son heterogéneas, donde los usuarios finales (estudiantes, periodistas, conservadores de datos, investigadores, etc.) tienen requisitos muy diferentes para crear, modificar y reutilizar anotaciones. Esto resulta en una gran cantidad de herramientas de anotación web y diferentes formas de representar y almacenar anotaciones web. Para facilitar la reutilización y la interoperabilidad, se han realizado varios intentos durante las últimas décadas para estandarizar las anotaciones web (por ejemplo, Annotea u Open Annotation), lo que ha dado como resultado las recomendaciones de anotaciones del W3C publicadas en 2017. Las recomendaciones del W3C proporcionan un marco para la representación de anotaciones (modelo de datos y vocabulario) y transporte (protocolo). Sin embargo, todavía hay una brecha en cómo se desarrollan los clientes de anotación (herramientas e interfaces de usuario), lo que hace que los desarrolladores vuelvan a re-implementar funcionalidades comunes (esdecir, resaltar, comentar, almacenar,¿) para crear su herramienta de anotación personalizada.Esta tesis tiene como objetivo proporcionar una plataforma de reutilización para el desarrollo de herramientas de anotación web para la revisión. Con este fin, hemos desarrollado una línea de productos de software llamada WACline. WACline es una familia de productos de anotación que permite a los desarrolladores crear extensiones de navegador de anotación web personalizadas, lo que facilita la reutilización de los activos principales y su adaptación a su contexto de revisión específico. Se ha creado siguiendo un proceso de acumulación de conocimientos en el que cada producto de anotación aprende de los productos de anotación creados previamente. Finalmente, llegamos a una familia de clientes de anotación que brinda soporte para tres prácticas de revisión: extracción de datos de revisión sistemática de literatura (Highlight&Go), revisión de tareas de estudiantes en educación superior (Mark&Go), y revisión por pares de conferencias y revistas (Review&Go). Para cada uno de los contextos de revisión, se ha llevado a cabo una evaluación con partes interesadas reales para validar las mejoras de eficiencia y eficacia aportadas por las herramientas de anotación personalizadas en su práctica

    Formation and early development of wingtip vortices

    Get PDF
    Wingtip vortices are extremely important phenomena in fluid dynamics for their negative effects in many applications. Despite the many studies on this particular flow, the current understanding is still poor in providing a form base for the design of effective tip geometry modifications and vortex control devices. A rectangular wing with squared and rounded wingtips was tested in order to identify the main mechanisms involved in the formation of the vortex on the wing and in its early development in the wake. The complementarity of a number of experimental techniques adopted, such as surface flow visualizations, wall pressure measurements, smoke visualizations and stereoscopic particle image velocimetry (SPIV), gave a richer insight of the physics and the basic mechanisms of the vortex development. Furthermore, a large number of configurations were tested exploring the effects of several parameters such as wing chord, aspect ratio, wingtip geometry, angle of attack and Reynolds number. The development of the vortex along the wing showed the formation of several secondary vortices which interacted with the primary vortex generating low frequency fluctuations. The structure of the flow at this stage was analysed introducing a compact description through characteristic lines of the vortex system defined from the velocity vector field in the vicinity of the wing surface. The high spatial resolution achieved by the SPIV arrangement allowed a deeper understanding of the vortex structure in the early wake and the turbulence production and dissipation within the vortex core. The relaminarization process of the vortex core promoted by centrifugal motion was observed. The relation between vortex meandering, turbulence, secondary vortices and wake sheet was discussed. A comparison of different methods for the averaging of instantaneous planar vector fields was performed showing the effects and importance of the meandering. An axial acceleration of the flow within the vortex was observed and the formation of different axial flow distributions was discussed. A minimum wake-like flow of 0.62 and a maximum jet-like flow of 1.7 times the freestream velocity were measured and a linear relation between a vortex circulation parameter and the axial velocity peak was found

    Sustaining Security and Safety in ICT: A Quest for Terminology, Objectives, and Limits

    Full text link
    Security and safety are intertwined concepts in the world of computing. In recent years, the terms "sustainable security" and "sustainable safety" came into fashion and are being used referring to a variety of systems properties ranging from efficiency to profitability, and sometimes meaning that a product or service is good for people and planet. This leads to confusing perceptions of products where customers might expect a sustainable product to be developed without child labour, while the producer uses the term to signify that their new product uses marginally less power than the previous generation of that products. Even in research on sustainably safe and secure ICT, these different notions of terminology are prevalent. As researchers we often work towards optimising our subject of study towards one specific sustainability metric - let's say energy consumption - while being blissfully unaware of, e.g., social impacts, life-cycle impacts, or rebound effects of such optimisations. In this paper I dissect the idea of sustainable safety and security, starting from the questions of what we want to sustain, and for whom we want to sustain it. I believe that a general "people and planet" answer is inadequate here because this form of sustainability cannot be the property of a single industry sector but must be addressed by society as a whole. However, with sufficient understanding of life-cycle impacts we may very well be able to devise research and development efforts, and inform decision making processes towards the use of integrated safety and security solutions that help us to address societal challenges in the context of the climate and ecological crises, and that are aligned with concepts such as intersectionality and climate justice. Of course, these solutions can only be effective if they are embedded in societal and economic change towards more frugal uses of data and ICT

    Data-Driven Methods for Managing Anomalies in Energy Time Series

    Get PDF
    With the progressing implementation of the smart grid, more and more smart meters record power or energy consumption and generation as time series. The increasing availability of these recorded energy time series enables the goal of the automated operation of smart grid applications such as load analysis, load forecasting, and load management. However, to perform well, these applications usually require clean data that describes the typical behavior of the underlying system well. Unfortunately, recorded energy time series are usually not clean but contain anomalies, i.e., patterns that deviate from what is considered normal. Since anomalies thus potentially contain data points or patterns that represent false or misleading information, they can be problematic for any analysis of this data performed by smart grid applications. Therefore, the present thesis proposes data-driven methods for managing anomalies in energy time series. It introduces an anomaly management whose characteristics correspond to steps in a sequential pipeline, namely anomaly detection, anomaly compensation, and a subsequent application. Using forecasting as an exemplary subsequent application and real-world data with inserted synthetic and labeled anomalies, this thesis answers four research questions along that pipeline for managing anomalies in energy time series. Based on the answers to these four research questions, the anomaly management presented in this thesis exhibits four characteristics. First, the presented anomaly management is guided by well-defined anomalies derived from real-world energy time series. These anomalies serve as a basis for generating synthetic anomalies in energy time series to promote the development of powerful anomaly detection methods. Second, the presented anomaly management applies an anomaly detection approach to energy time series that is capable of providing a high anomaly detection performance. Third, the presented anomaly management also compensates detected anomalies in energy time series realistically by considering the characteristics of the respective data. Fourth, the proposed anomaly management applies and evaluates general anomaly management strategies in view of the subsequent forecasting that uses this data. The comparison shows that managing anomalies well is essential, as the compensation strategy, which detects and compensates anomalies in the input data before applying a forecasting method, is the most beneficial strategy when the input data contains anomalies

    Qualitative Methods and Hybrid Maps for Spatial Perception with an Example of Security Perception

    Get PDF
    The security/insecurity of our cities has become the subject of public debate in recent years. The individual intuitions about security or insecurity can vary with age, gender, social background, personal constitution and previous positive or negative experiences. They are also constantly (re)produced, as perceptions of space are individual and selective. Noting these variations, materialised factors also play a major role, e.g., recessed house entrances, dense or high hedges, poor orientation options, dark places, etc. Attributing meaning to these materialised factors, real constructs are formed which create positive or negative narratives about certain (urban) spaces, influencing the actual use and design of urban spaces. To investigate the importance attached to certain spaces, qualitative methods are required for examining socio-spatial situations, perceptual processes and attribution. Using different methods in an explorative and in-depth descriptive research phase, such as expert interviews, user observations, surveys on go-alongs, participatory mapping with detailed information on structural and spatial locations, the advantages and disadvantages of method selection are presented. Berlin’s Alexanderplatz was used as a case study area to determine perceptions of security in urban areas. We confirmed that despite variations, certain subjective perceptions concerning visibility, brightness, and audibility are collective. Additionally, hybrid maps are used to explain how subjective perceptions of space, combined with 3D graphics, can alert architects and city planners to uncertainty among users of public space

    Digital participation in the VisLab: Sketching urban visions for the harbour of Lachen (Switzerland) online

    Full text link
    For decades, citizen participation has been recognised as a crucial part of urban planning. Simultaneously, as our everyday life become more digital, digital tools are being increasingly used in the involvement of citizens and their perspectives on urban issues. In particular, 3D visualisation tools based on point cloud visualisations may have the potential to further enhance opportunities for citizen participation digitally. Yet, research on their application in digital participation processes has been limited. Therefore, this study attempts to bridge this gap by developing the Urban Sketch Tool (UST) and initiating a digital participation process VisLab with local stakeholders in Lachen (Switzerland). The aim was to investigate how the UST facilitates the sketching of urban visions for the harbour of Lachen, and how it supports a discussion between stakeholders. Furthermore, how stakeholders discuss their urban visions and whether they reach consensus or dissent was examined. The study’s findings indicate that the Urban Sketch Tool is simple to use and allows for the sketching of urban visions, which facilitates discussion about urban issues by providing a common language for participants. With regard to the stakeholder discussion, the results suggest that the stakeholder mainly reach consensus through an exchange of knowledge and perspectives. However, dissent rarely occurs, because participants tend to avoid conflict or shift their opinion toward consensus. Notably, the current findings do indicate some limitations associated with the use of the UST and digital participation. As it turns out, the UST and digital access to participation may introduce new barriers, particularly for stakeholder who experience technical difficulties during the process or have a deficiency in digital skills. This results in the exclusion of individuals and unequal access to the digital participation process, resulting in unbalanced outcomes. Thus, it is recommended that digital tools be developed for those who face the greatest barriers to digital participation in planning. Additionally, it is advised that in digital participation, particular attention is being paid to conflict and the voices of marginalised participants. Finally, it can be concluded that digital participation and digital tools such as the UST such as the UST should not replace more traditional forms of participation, but rather complement them and thereby enable them to reach their full potential

    Securing Natural Gas: Entity-Attentive Security Research

    Get PDF
    Natural gas is a troublesome and ‘wayward’ material (Bridge, 2004; 396). Amongst other qualities, it is invisible, intangible, naturally odorless, highly inflammable, and constantly resistant to the forces that contain it. This thesis provides an account of how these qualities both introduce a series of insecurities to everyday social environments, and also make it a challenging material to govern. Specifically, I examine the way that security is performed around gas circulations in the UK’s transmission and distribution pipelines, and I describe how a range of specialized security practices have been developed according to the particular challenges that gas’s materiality presents. In developing this account, I make two claims. First, I argue that performances of security cannot be adequately understood without attending to the specific qualities of the circulating elements around which it is practiced. Here I build upon Dillon’s (1996) observation that security has tended to be treated as a noun that is independent of the elements that it is practiced in relation to. As a consequence, it has typically been framed as a broadly transferrable set of practices that can be more-or-less unproblematically applied to very different elements. I suggest that this abstraction has resulted in the further reduction of security into two broad practices: acts of circulatory filtration (in which risky elements are separated from flows of safe bodies, materials and things), and acts of circulatory maintenance (whereby security is performed by ensuring the continuity of particular circulations). It is my contention in this thesis that security scholars need to pay better attention to the ways in which the specific material qualities of circulating elements are generative of particular forms of securing practice. Indeed, by examining the way that security is performed around gas, I describe a series of practices that far exceed those described in accounts that present security as a matter of circulatory filtration or maintenance. My second claim is that the spaces and scales at which security is analyzed need to be expanded. I demonstrate how the critical security studies and energy security literatures have both tended to focus on security’s practice within particular nodes, at the exclusion of the performances of security (and forms of insecurity) that develop across the journeys of circulating elements; as they move between nodes. Indeed, I suggest that circulation has often been reduced in these accounts to thin, straight, and featureless lines that are largely inconsequential for performances of security. I seek to trouble this reduction, following gas as it travels through the UK gas transport infrastructures, tracing the various forms of (in)security that develop across these journeys. As a consequence of these two claims, security takes quite a different form in this account to its various depictions in the existing security literatures. I describe it as consisting of a series of ontological projects that are enacted across the lengths and breadths of gas’s circulations, and through which the material reality of natural gas is constantly (re)organised in attempts to facilitate, ‘compensate for’, and ‘cancel out’ particular kinds of perceived potential phenomena (Foucault, 2007; 36). Significantly, these performances are shown to be structured, or ‘programmed’ (Latour, 1991), through the coming together of multiple interests that pertain to a variety of heterogeneous actors and manifold referent objects. Different interests are shown to come together across gas’s journeys, and to undergo ongoing processes of negotiation that result in a variety of security performances, through which different imperatives are pursued. As such, I suggest that gas becomes ‘modulated’ (Deleuze, 1992) – it is constantly transformed from moment to moment, across the full duration of its circulatory journeys

    Business process documentation in creative work systems:a design science study in television production

    Full text link
    Die vorliegende Arbeit untersucht den Einfluss von Kreativität auf die Modellierung und Dokumentation von Geschäftsprozessen. Dabei wird ausgehend von einer theoretischen Basis eine Methode entwickelt, die die Erfassung kreativitätsintensiver Prozesse ermöglicht. Deren Besonderheit ist, dass sie das in der Prozessmodellierung vorherrschende strenge Kontrollflussparadigma aufbricht, um so dem Anspruch kreativer Arbeitssysteme an Flexibilität gerecht zu werden. Ausgehend vom kreativen Produkt werden dabei sukzessiv kreative Teilprozesse von administrativen Aufgaben isoliert, um so ein angemessenes Management beider zu ermöglichen. Die Methode wird in einer umfassenden Studie im Kontext der Fernsehproduktion in Deutschland evaluiert. Auf Basis semi-strukturierter Interviews werden dabei umfassende Modelle für die Produktlinien TV-Film, Serie, Daily Soap und Entertainment diskutiert. Die Ergebnisse werden abschließend auf die Methode und die zu Grunde liegende Theorie zurückgespiegelt.This study investigates the influence of creativity on the modeling and documentation of business processes. Based on a substantive theory a modeling method is developed that allows for the capturing of creativity-intensive processes. This method discards a strict and formal interpretation of the predominant control-flow paradigm in process modeling and thus conforms to the flexibility requirements of creative work systems. Emanating from the creative product, creative and administrative subprocesses are successively revealed, thus enabling the adequate management of both process types. The method is applied to the context of German television production. Comprising process models for the product lines television movie, primetime series, daily soap and entertainment are derived from qualitative interview data. The results of this evaluation are fed back to both the method as well as the foundational theory

    Good research practices

    Get PDF
    In this dissertation, entitled “Good Research Practices”, I examine research practices and reform ideas aiming to combat the crisis of confidence in psychology (Pashler & Wagenmakers, 2012). I do so through theoretical contributions and empirical work, propose practical guidelines for researchers, and demonstrate how principles of good research can be conveyed to students. The research methods and statistical practices I present facilitate the adherence to the following three principles: (1) respect the empirical cycle; (2) acknowledge uncertainty; and (3) enrich statistical models with theoretical knowledge
    corecore