This document describes QMUL's approach for social event detection in collaborative photo collections at the MediaEval 2012 challenge. The approach aims to find and detect social events and retrieve associated photos with the help of external information. It involves gathering external data like expanding topics and handling geographic locations. It also includes preprocessing steps like matching locations, translating terms, and composing textual features from photos. The approach then retrieves photos for detected events using classification and techniques like limiting the search space and expanding features. It evaluates this approach on the MediaEval 2012 dataset and achieves an F-score of 72.6% for detecting events and retrieving photos.
This is the .ppt presentation used in May 2012 by NASA chief information officer Adrian Gardner. It provides a wonderful insight to the approach that NASA uses at it thinks about STEM collaboration with young people in our efforts to 'win the future'.
This is the .ppt presentation used in May 2012 by NASA chief information officer Adrian Gardner. It provides a wonderful insight to the approach that NASA uses at it thinks about STEM collaboration with young people in our efforts to 'win the future'.
The Deck: a portable, low-power, full-on penetrating testing and forensics system. The Deck runs on the BeagleBoard-xM and BeagleBone. It provides hundreds of security tools
Slides from ThotCON 0x04 presentation on penetration testing with an army of small, low-powered devices running The Deck connect by 802.15.4 and/or Zigbee mesh networking.
John Richards: My Life Lessons As An EntrepreneurGrow America
John Richards, an entrepreneur and Angel Investor, presented at the Lehi Launch Event. Here is the video that accompanies the slides. http://bit.ly/Nl2INe
The Deck: a portable, low-power, full-on penetrating testing and forensics system. The Deck runs on the BeagleBoard-xM and BeagleBone. It provides hundreds of security tools
Slides from ThotCON 0x04 presentation on penetration testing with an army of small, low-powered devices running The Deck connect by 802.15.4 and/or Zigbee mesh networking.
John Richards: My Life Lessons As An EntrepreneurGrow America
John Richards, an entrepreneur and Angel Investor, presented at the Lehi Launch Event. Here is the video that accompanies the slides. http://bit.ly/Nl2INe
AddressingHistory - Crowdsourcing the Past - Stuart MacdonaldJISC GECO
Presentation given at the Geospatial in the Cultural Heritage Domain - Past, Present & Future event in London on 7th March 2012. The event was organised as part of the JISC GECO project.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Overview of the world of geospatial metadata, and the role of the EDINA service GoGeo in creating, saving, and discovering it. Presented on 19 June 2014 by Tony Mathys in Aberdeen, Scotland.
Functional and Architectural Requirements for Metadata: Supporting Discovery...Jian Qin
The tremendous growth in digital data has led to an increase in metadata initiatives for different types of scientific data, as evident in Ball’s survey (2009). Although individual communities have specific needs, there are shared goals that need to be recognized if systems are to effectively support data sharing within and across all domains. This paper considers this need, and explores systems requirements that are essential for metadata supporting the discovery and management of scientific data. The paper begins with an introduction and a review of selected research specific to metadata modeling in the sciences. Next, the paper’s goals are stated, followed by the presentation of valuable systems requirements. The results include a base-model with three chief principles: principle of least effort, infrastructure service, and portability. The principles are intended to support “data user” tasks. Results also include a set of defined user tasks and functions, and applications scenarios.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
QMUL @ MediaEval 2012: Social Event Detection in Collaborative Photo Collections
1. QMUL @ MediaEval 2012:
Social Event Detection in
Collaborative Photo Collections
Markus Brenner, Prof. Ebroul Izquierdo
Multimedia and Vision Research Group
Queen Mary University of London, UK
2. OBJECTIVE
In Collaborative Photo Collection …
1. Find and detect social events
2. Retrieve photos associated with the events
… with the help of additional, external information
3. INTRODUCTION AND
BACKGROUND
Internet enables people to host, access and share their
photos online; for example, through websites like Flickr
and Facebook
Collaborative annotations and tags as well as public
comments are commonplace
Information people assign varies greatly but often seems
to include some sort of references to what happened
where and who was involved
observed experiences or occurrences
simply referred to as events
4. INTRODUCTION AND
BACKGROUND
Easier to search through photo collections if photos are
grouped into events
Link events in photo collections to public social media
like online news feeds
Automatically link news with corresponding photos
Provide additional information that might be relevant to
users to facilitate their search, like the date and location
of an event
5. OVERVIEW OF FRAMEWORK
Query Preprocessing
Matching
Composing Textual Extracting Visual
Geographic
Features Features
Gathering External Data Locations
General
Detecting Events Limiting Search Space
Looking up
Translating Terms Geographic Google
Google
Locations Geocoding
Translate API
API By Date/Time By Date and
By Date and Time By Location
and Topic Location
Compiling Names
Expanding the
of Geographic
WordNet Topic GeoNames
Locations
Detected Retrieving Photos
Events
DBpedia
(via SPARQL) Topic-Specific Textual Features
Retrieved
Photos
Expanding Visual Pruning
Soccer Matches* Classification
Feature Space (Classification)
* Example. Framework extendable to other topics.
6. GATHERING EXTERNAL DATA
Expanding the topic
Handling geographic locations
(e.g. compiling names of locations)
7. Expanding the Topic
Social events often revolve around a topic
Examples: Festivals, sport events, …
Problem: Users to no adhere to a controlled vocabulary
Idea: Expand textual representation of a given topic
Example: Expand the term concert by relating terms like
festival, gig, band, sound, etc.
Accomplish through combination of WordNet, DBpedia
and some initial evidence
8. Handling Geographic Locations
Venue location of a social event is an important cue
Interested in gaining a more complete understanding
such as of the city and country a event takes place to
expand the query
Beneficial as users often refer to a different geographical
hierarchy, e.g. foreigner to a country but local to a city
Also consider geographic coordinates to later match
geo-tagged photos
Use Google Geocoding API
9. Compiling Names of Locations
Identify and understand any textual annotations in
photos that refer to geographic locations
Used in retrieval process to isolate photos that do not
likely correspond to the venue of a queried event
Extract all countries and larger cities from the
GeoNames dataset
12. Matching Geographic Locations
Geo-tagged photos are becoming more and more
popular
Identify photos as belonging and not belonging to a
venue (and an event when also considering the time)
For each venue compile two sets of photos
(within/outside its bounds)
13. Translating Terms and Stop-words
Photos get annotated and tagged in many different
languages
Translate topic-related terms and stop-words into other
languages
Limit to languages prevailing in the countries in which
the query venues are located
Use Google Translate API
14. Composing Textual Features
Concatenate all information into a combined textual
representation (title, description, keywords, username, …)
Also include information obtained from external sources
Use Roman preprocessor to converts text into lower
case, strip punctuation as well as whitespaces and remove
accents from Unicode characters
Eliminates common stop-words, numbers and terms
commonly associated with photography
Apply language-agnostic character-based tokenizer
Convert tokens into a matrix of occurrences (TF/IDF)
15. RETRIEVING PHOTOS OF AN EVENT
In the most basic case, we (already) know about a specific
event, and we wish to simply retrieve all photos associated
with it
Classification-based approach
Limiting search space
Expanding feature space
Visual pruning
16. Classification-based Approach: I
Treat each event independently (we instantiate a
separate classifier for each event for a series of events)
Train classifier on the textual features we compose
beforehand according to each event
No separate training dataset required
17. Classification-based Approach: II
Binary classification, but also introduce a third class that
reflects events of the same topic to improve results
Possible to include features of another query
Two different fusing strategies implemented
Experiment with multiple classifiers (Linear SVC, SGD, …)
Use spare data representation and sparse-adjusted classifier
18. Limiting Search Space
Generally, the date and time a photo was captured are
effective cues to bound the search space
For each event’s prediction step, we consider only those
photos that lie within the event’s temporal search
window
Specified by the query (e.g. New Year’s Eve)
Retrieved by the framework through external topic-specific
sources (e.g. the specific days of a concert tour)
Roughly estimated (based on a clustering scheme) in the
forthcoming event detection method
Exclude photos not matching geographic location
19. Expanding Feature Space
Expand feature space based on query information and
photo collection itself
Helpful when “training” information is sparse
(the case when there are few geo-tagged photos)
Iterative two-step process:
1. Train initial classifier on the few query terms available
2. Then compile new list of textual terms based on the
predicted outcome over all applicable photos
3. Finally, used gained terms to refine initial query terms
Example: Photos related to a specific music venue
contain terms of the playing band or artist
20. Visual Pruning
Mixing textual and visual features is not straightforward
Employ a cascade of two separate classifiers, each
separately adjusted to its feature space and data
representation
First fast textual classification, then visual binary
pruning on few remaining photos
Utilize MPEG-7 color and texture features
Experiment with several classifiers (Random
Forrest, SVC with RBF kernel, Linear SVC)
21. DETECTING EVENTS
Two proposals:
If the date but not time of day is known, apply a
clustering method on all candidates of a given day
largest clusters then reflect events
Otherwise: Expand approach by performing a prediction
step for any day instead of just selected days conforming
to the events will inadvertently grow the search space
In both cases apply a threshold (number of photos
relating to potential event) prior considering a new event
23. Dataset
2012 MediaEval SED Dataset – Challenge II
167.332 photos collected from Flickr
Metadata: unique Flickr ID, capture
timestamp, username, title, description, keywords and
partial geographic coordinates (in about a fifth of the
cases:)
Ground truth in the form of event clusters (specifying
associated photos) for two topics/challenges
“Training set”: 2011 MediaEval SED Dataset
24. Implementation Details and
Setup
Define event as a distinct combination of location and
date (one event per day at the same location)
Use English names of locations only
Bounding threshold of 500 meter
Default: Linear SVC, no feature expansion, no visual
pruning
Evaluation measures: Precision (P), Recall (R),
F-score, Normalized Mutual Information (NMI)
25. Dataset Setup
Focus on Challenge II
Challenge I/III: Current approach has limitation
No event/venue detection through social media websites
like Twitter
Only basic venue/location detection/clustering
issue when the destination covers a large area
(e.g. entire country)
26. Results: Challenge II
Detected: 32 events
Identified several thousand photos not belonging
to any relevant venue
substantial reduction of candidates
large amount of training samples
P R F NMI
Default configuration 79.0 67.1 72.6 0.65
Basic event detection 56.0 69.6 62.0 0.53 worse
With visual pruning 83.2 61.9 71.0 0.63
With feature expansion 79.0 66.9 72.5 0.65
27. CONCLUSION
External information, e.g. about a venue, helpful for
both event detection and retrieval of associated photos
Finding and linking external data in a uniform way
still challenging
Visual information does not improve results much
Future considerations:
Social media websites like Facebook and Twitter
Improved venue/location detection/clustering