410 research outputs found

    Supporting the externalisation of thinking in criminal intelligence analysis

    Get PDF
    At the end of the criminal intelligence analysis process there are relatively well established and understood approaches to explicit externalisation and representation of thought that include theories of argumentation, narrative and hybrid approaches that include both of these. However the focus of this paper is on the little understood area of how to support users in the process of arriving at such representations from an initial starting point where little is given. The work is based on theoretical considerations and some initial studies with end users. In focusing on process we discuss the requirements of fluidity and rigor and how to gain traction in investigations, the processes of thinking involved including abductive, deductive and inductive reasoning, how users may use thematic sorting in early stages of investigation and how tactile reasoning may be used to externalize and facilitate reasoning in a productive way. In the conclusion section we discuss the issues raised in this work and directions for future work

    How analysts think: how do criminal intelligence analysts recognise and manage significant information?

    Get PDF
    The Criminal Intelligence Analyst's role is to create exhibits which are relevant, accurate and unbiased. Exhibits can be used as input to assist decision-making in intelligence-led policing. It may also be used as evidence in a court of law. The aim of this study was to determine how Criminal Intelligence Analysts recognise and manage significant information as a method to determine what is relevant for their attention and for the creation of exhibits. This in turn may provide guidance on how to design and incorporate loose and flexible argumentation schemas into sense-making software. The objective is to be informed on how to design software, which affords Criminal Intelligence Analysts with the ability to effortlessly determine the relevance of information, which subsequently could assist with the process of assessing and defending the quality of exhibits

    Understanding 3D mid-air hand gestures with interactive surfaces and displays: a systematic literature review

    Get PDF
    3D gesture based systems are becoming ubiquitous and there are many mid-air hand gestures that exist for interacting with digital surfaces and displays. There is no well defined gesture set for 3D mid-air hand gestures which makes it difficult to develop applications that have consistent gestures. To understand what gestures exist we conducted the first comprehensive systematic literature review on mid-air hand gestures following existing research methods. The results of the review identified 65 papers where the mid-air hand gestures supported tasks for selection, navigation, and manipulation. We also classified the gestures according to a gesture classification scheme and identified how these gestures have been empirically evaluated. The results of the review provide a richer understanding of what mid-air hand gestures have been designed, implemented, and evaluated in the literature which can help developers design better user experiences for digital interactive surfaces and displays

    How analysts think: navigating uncertainty – aspirations, considerations and strategies

    Get PDF
    While there has been considerable research in understanding the process of sense making in criminal intelligence analysis as well as the formulation of arguments in the domain of law, there remain gaps in our understanding of how to move seamlessly from the fluidity of the sense making activities to the rigour of argumentation construction. This matter is complicated further with high uncertainty which accompanies sense making and which propagates through to the rigour that accompanies argumentation. This paper attempts to understand how Criminal Intelligence Analysts navigate uncertainty from fluidity to rigour constructs and outlines some of the considerations and strategies deployed by the Criminal Intelligence Analyst to reach, or increase, certainty at a given point in time during the analysis process. This paper concludes by proposing preliminary suggestions with the aim to narrow the gaps in this journey from fluidity to rigour, at least, marginall

    How can we design tactile interactive software for argument construction in criminal intelligence analysis?

    Get PDF
    Argumentation construction refers to the different ways in which people can formulate a well defined argument that can withstand scrutiny in a court of law. Different domains have enhanced the research on argumentation construction, but each enhancement relates either to ‘evidence’ or to the ‘relevance of evidence’, thus making these elements the corner stone elements of argumentation construction. By attempting to understand how Criminal Intelligence Analysts understand and manage these corner stone elements, as well as how these elements differ to the law domain counterparts, we aspire to formulate design guidelines for a software program that is tailored to how Criminal Intelligence Analysts think and argue during sense-making activities. This paper outlines the relevant literature and why the researchers consider ‘evidence’ and the ‘relevance of evidence’ as the corner stone elements of argumentation construction. The results section summarises the outcomes of two qualitative studies. The first study aims to understand how Criminal Intelligence Analysts perceive and manage uncertain information and how this eventually leads to the creation of evidence (as exhibits) for a court of law. The second study aims to understand how Criminal Intelligence Analysts know which information is relevant for the task at hand, especially when uncertainty is high. The results of the two studies still need to be combined and put into practise (as design guidelines) to test the effectiveness and validity of the results obtained in the two studies. This is listed as future work in the conclusion section

    Peel and peel again

    Get PDF
    Aim: To determine if the internal limiting membrane (ILM) was present in the epiretinal membrane (ERM) when we deliberately tried to perform a "double peel" for macular pucker. Methods: Pars-plana vitrectomy and a "double peel" were carried out. The ERM and ILM were stained with Trypan Blue and peeled separately over the same area. The amount of ERM present in ILM specimens and the amount of ILM present in ERM specimens were evaluated by histological examination. Results: Seventeen eyes in 17 patients were included. It was possible to double peel in all cases. Five of 17 ERM specimens (29%) contained ILM fragments. When ILM was present on the ERM, it represented less than 50% of the sample. One ILM specimen was lost as result of an administrative error; of the remaining 16 specimens, residual ERM was found in six, and cellular remnants were observed on the vitreous surface in a further six of the ILMs. Clinically, no recurrence of ERM was found. Conclusion: ILM was present in some ERM specimens seemingly over the same area that an intact ILM was subsequently peel. We speculate that the ILM in the ERM represent a secondary basement membrane and that the surgical plane of dissection for most ERM peel is between the ERM and the native ILM, making it feasible to double peel routinely.published_or_final_versio

    Polar decompositions of quaternion matrices in indefinite inner product spaces

    Full text link
    Polar decompositions of quaternion matrices with respect to a given indefinite inner product are studied. Necessary and sufficient conditions for the existence of an HH-polar decomposition are found. In the process an equivalent to Witt's theorem on extending HH-isometries to HH-unitary matrices is given for quaternion matrices

    Acceptance of co-operative education practice by the academic staff at Technikon South Africa

    Get PDF
    ArticleTechnikons advocate the practice of co-operative education, which is an educational strategy that integrates learning through productive work with the theoretical curriculum. However, only 35% of theTechnikon SA programmes have a compulsory experiential learning component. Grounded theory research was undertaken to determine some of the basic assumptions of Technikon SA’s academic staff in this regard. Rather than starting out with a specific research problem, grounded theory explores an area of interest and allows what is relevant to emerge. Semi-structured interviews with four open-ended questions, were conducted with a stratified-random sample of 25 teaching staff at Technikon SA. It was found that, although there is some willing compliance and belief in co-operative education, it is not indicative of the organisational culture of Technikon SA.Technikons propageer die beoefening van ko˛peratiewe onderwys,’n opvoedkundige strategie wat leer deur produktiewe werkservaring integreer met die teoretiese kurrikulum. ByTechnikon SA egter, het slegs sowat 35% van die formele programme ’n verpligte leerervarings komponent.Teoretiese-begrondings navorsingsmetodologie is gebruik om sekere basiese veronderstellings van akademiese personeel te bepaal. Eerder as om’n spesi¢eke navorsingsprobleem as vertrekpunt te gebruik, ondersoek teoretiese-begronding’n area van belang en laat die metodiek die relevante sake toe om te voorskyn te kom. Semi-gestruktureerde onderhoude, met vier ope vrae, is gevoer met ’n gestrati¢seerde eweskansige steekproef van 25 akademiese personeellede vanTechnikon SA. Daar is bevind dat alhoewel daar beperkte oortuiging en gewillige uitlewing van ko˛peratiewe onderwys is, is dit nie beduidend as kenmerkend van die organisasie kultuur vanTechnikon SA nie.Educational Studie

    Fungal pathogens of Proteaceae

    Get PDF
    Species of Leucadendron, Leucospermum and Protea (Proteaceae) are in high demand for the international floriculture market due to their brightly coloured and textured flowers or bracts. Fungal pathogens, however, create a serious problem in cultivating flawless blooms. The aim of the present study was to characterise several of these pathogens using morphology, culture characteristics, and DNA sequence data of the rRNA-ITS and LSU genes. In some cases additional genes such as TEF 1-α and CHS were also sequenced. Based on the results of this study, several novel species and genera are described. Brunneosphaerella leaf blight is shown to be caused by three species, namely B. jonkershoekensis on Protea repens, B. nitidae sp. nov. on Protea nitida and B. protearum on a wide host range of Protea spp. (South Africa). Coniothyrium-like species associated with Coniothyrium leaf spot are allocated to other genera, namely Curreya grandicipis on Protea grandiceps, and Microsphaeropsis proteae on P. nitida (South Africa). Diaporthe leucospermi is described on Leucospermum sp. (Australia), and Diplodina microsperma newly reported on Protea sp. (New Zealand). Pyrenophora blight is caused by a novel species, Pyrenophora leucospermi, and not Drechslera biseptata or D. dematoidea as previously reported. Fusicladium proteae is described on Protea sp. (South Africa), Pestalotiopsis protearum on Leucospermum cuneiforme (Zimbabwe), Ramularia vizellae and R. stellenboschensis on Protea spp. (South Africa), and Teratosphaeria capensis on Protea spp. (Portugal, South Africa). Aureobasidium leaf spot is shown to be caused by two species, namely A. proteae comb. nov. on Protea spp. (South Africa), and A. leucospermi sp. nov. on Leucospermum spp. (Indonesia, Portugal, South Africa). Novel genera and species elucidated in this study include Gordonomyces mucovaginatus and Pseudopassalora gouriqua (hyphomycetes), and Xenoconiothyrium catenata (coelomycete), all on Protea spp. (South Africa)

    Finding needles in haystacks: linking scientific names, reference specimens and molecular data for Fungi

    Get PDF
    DNA phylogenetic comparisons have shown that morphology-based species recognition often underestimates fungal diversity. Therefore, the need for accurate DNA sequence data, tied to both correct taxonomic names and clearly annotated specimen data, has never been greater. Furthermore, the growing number of molecular ecology and microbiome projects using high-throughput sequencing require fast and effective methods for en masse species assignments. In this article, we focus on selecting and re-annotating a set of marker reference sequences that represent each currently accepted order of Fungi. The particular focus is on sequences from the internal transcribed spacer region in the nuclear ribosomal cistron, derived from type specimens and/or ex-type cultures. Re-annotated and verified sequences were deposited in a curated public database at the National Center for Biotechnology Information (NCBI), namely the RefSeq Targeted Loci (RTL) database, and will be visible during routine sequence similarity searches with NR_prefixed accession numbers. A set of standards and protocols is proposed to improve the data quality of new sequences, and we suggest how type and other reference sequences can be used to improve identification of Fungi
    • …
    corecore