One of the recent Web developments has focused on the opportunities it presents for social tagging through user participation and collaboration. As a result, social tagging has changed the traditional online communication process. The interpretation of tagging between humans and machines may create new problems if essential questions about how social tagging corresponds to online communications, what objects the tags refer to, who the interpreters are, and why they are engaged are not explored systematically. Since all reasoning is an interpretation of social tagging among humans, tags, and machines, it is a complex issue that calls for deep reflection. In this paper, we investigate the relevance of the potential problems raised by social tagging through the framework of C. S. Peirce’s semiotics. We find that general phenomena of social tagging can be well classified by Peirce’s ten classes of signs for reasoning. This suggests that regarding social tagging as a sign and systematically analyzing the interpretation are positively associated with the ten classes of signs. Peircean semiotics can be used to examine the dynamics and determinants of tagging; hence, the various uses of this categorization schema may have implications for the design and development of information systems and Web applications.
Preference Handling in Relational Query Languagesradned
The need for handling preferences arises, e.g., in design of autonomous systems that make choices generated by the environment where they act (context). This problem is addressed by representing the context as a database (DB) instance and a proposal of a fully declarative language capable of encoding various kinds of preferences studied in AI. Such preferences may order some pairs of choices nondeterministically, they may be extrinsic (when a dominance relationship between two choices depends also on other choices), and also context-dependent. The selection of most desirable choices can be augmented by other mandatory requirements encoded as a DB query that takes the DB instance as input. Semantics is well-defined even for conflicting preferences as it is based on the principle known in AI as minimal logic of preferences and on non-monotonic reasoning mechanism yielding a non-empty set of preference models. This set has a compact representation that can be encoded as a tractable disjunctive datalog program with optimal model semantics and exploited to denote most desirable choices as a DB query. The presented approach is flexible and promising in formulating policies to improve and automate preference based decision making in complex and dynamic contexts.
AI Therapist – Emotion Detection using Facial Detection and Recognition and S...ijtsrd
This paper presents an integrated system for emotion detection using facial detection and recognition. we have taken into account the fact that emotions are most widely represented with eyes and mouth expressions. In this research effort, we implement a general convolutional neural network CNN building framework for designing real time CNNs. We validate our models by creating a real time vision system that accomplishes the tasks of face detection, emotion classification, and generating the content according to the emotion or mood of the person simultaneously in one blended step using our proposed CNN architecture. Our proposed model consisted of modules such as image processing, Feature extraction, feature classification, and recommendation process. The images used in the experiment are pre processed with various image processing methods like canny edge detection, histogram equalization, fit ellipse, and FER dataset is mediated for conducting the experiments. With a trained profile that can be updated flexibly, a user can detect his her behavior on a real time basis. It utilizes the state of the art of face detection and recognition algorithms. Sanket Godbole | Jaivardhan Shelke "AI Therapist – Emotion Detection using Facial Detection and Recognition & Showing Content According to Emotions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33267.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/33267/ai-therapist-–-emotion-detection-using-facial-detection-and-recognition-and-showing-content-according-to-emotions/sanket-godbole
Learning and imitation in heterogeneous robot groupsWilli Richert
As robots become increasingly affordable, they are used in ever more
diverse areas in order to perform increasingly complex tasks. These
tasks are typically preprogrammed by a human expert. In some cases,
however, this is not feasible -- either because of the inherent
complexity of the task itself or due to the dynamics of the
environment. The only possibility then is to let the robot learn the
task by itself. This learning process usually involves a long training
period in which the robot experiments with its surroundings in order
to learn the desired behavior. If robots have to learn a shared goal
in a group, the robots should imitate each other in order to reduce
their individual learning time. The question how this can be done in a
robot group has been considered in this thesis, i.e., how robots in a
group can learn to achieve their shared goal and imitate
each other in order to increase the performance and the speed of
learning by spreading the learned knowledge in the group.
To allow for this intertwined learning and imitation, a dedicated
robot architecture has been developed. On the one hand, it fosters
autonomous and self-exploratory learning. On the other hand, it allows
for manipulating the learned knowledge and behavior to account for new
knowledge gathered by the imitation process. Learning of behavior is
achieved by separately learning at two levels of abstraction. At the
higher level, the strategy is learned as a mapping from abstract
states to symbolic actions. At the lower level, the symbolic actions
are grounded autonomously by learned low-level actions.
The approaches of imitation presented in this thesis are unique in
that they relieve the requirements that governed multi-robot imitation
so far. It enables robots in a robot group to imitate each other in a
non-obtrusive manner. The robots can thus increase their learning
speed and thereby the overall performance of the group by simply
observing the other group members without requiring them to stick to a
certain communication protocol that would provide the necessary
information. With the presented approach, a robot is able to infer the
behavior that the observed demonstrator is performing and to replay
the beneficial behavior with its own capabilities.
In addition, the presented approaches allow the robots to apply
imitation even if the group is heterogeneous. Normally, the
performance of a group degrades if robots with incompatible
capabilities imitate each other. Capability differences arise if robot
morphologies differ in a robot group. This is the case if different
robots from different manufacturers form a robot group that has to
achieve shared goals. This thesis presents an approach that is able to
determine similarities or differences between robots. This can guide
the robots in a heterogeneous robot group in order to determine those
robots for imitation that are most similar to themselves.
La autora principal de este manual es la trabajadora social Deborah MacArthur, ayudada por Aruna Khadka, una pionera en el campo de la desinstitucionalización. La filosofía principal de este documento es que los derechos (y el interés superior) de niños y niñas estén garantizados en las familias antes que en las instituciones.
George rossolatos seminar on branding, brand equity, brand semiotic models an...//disruptiVesemiOtics//
Seminar on Branding, brand equity, brand semiotic models and research methods
Tartu University, Estonia 13-14 May 2014
George Rossolatos MSc, MBA, PhD
//disruptiVesemiOtics// email: georgerossolatos123@gmail.com
http://uni-kassel.academia.edu/georgerossolatos
Student Affairs: Traditional Communication SucksJames Britton
Traditional student affairs communication in higher ed sucks. Learn how to engage a modern college audience through social media. This talk was given at SXSWedu 2014 in Austin,TX in March 2014.
An odd even block cipher based cryptosystem through modulo arithmatic techniq...eSAT Journals
Abstract In this paper, a new Cryptosystem based on block cipher has been proposed where the encryption is done through Odd Even Modulo Arithmetic Technique (OEMAT). The original message is considered as a stream of bits, which is then divided into a number of blocks, each containing n bits, where n is any one of 2, 4, 8, 16, 32, 64, 128, 256. The first and the penultimate blocks are then added where the modulus of addition is 2n. The result replaces the penultimate block (say (N-1th) block), first block remaining unchanged. In the next attempt the second and the ultimate blocks (say Nth block) are added and the result replaces the Nth block. This process continues until all the blocks are executed. The modulo addition has been implemented in a very simple manner where the carry out of the MSB is discarded to get the result. The technique is applied in a cascaded manner by varying the block size from 2 to 256. The whole technique has been implemented by using a modulo subtraction technique for decryption. Keywords: MFBOMAT, FBOMAT, Symmetric block cipher, Cryptosystem
Slides of presentation given to Organization of Information Resources class at University of Washington iSchool Saturday, Februray 10, 2007 by Michael Braly and Geoff Froh
Preference Handling in Relational Query Languagesradned
The need for handling preferences arises, e.g., in design of autonomous systems that make choices generated by the environment where they act (context). This problem is addressed by representing the context as a database (DB) instance and a proposal of a fully declarative language capable of encoding various kinds of preferences studied in AI. Such preferences may order some pairs of choices nondeterministically, they may be extrinsic (when a dominance relationship between two choices depends also on other choices), and also context-dependent. The selection of most desirable choices can be augmented by other mandatory requirements encoded as a DB query that takes the DB instance as input. Semantics is well-defined even for conflicting preferences as it is based on the principle known in AI as minimal logic of preferences and on non-monotonic reasoning mechanism yielding a non-empty set of preference models. This set has a compact representation that can be encoded as a tractable disjunctive datalog program with optimal model semantics and exploited to denote most desirable choices as a DB query. The presented approach is flexible and promising in formulating policies to improve and automate preference based decision making in complex and dynamic contexts.
AI Therapist – Emotion Detection using Facial Detection and Recognition and S...ijtsrd
This paper presents an integrated system for emotion detection using facial detection and recognition. we have taken into account the fact that emotions are most widely represented with eyes and mouth expressions. In this research effort, we implement a general convolutional neural network CNN building framework for designing real time CNNs. We validate our models by creating a real time vision system that accomplishes the tasks of face detection, emotion classification, and generating the content according to the emotion or mood of the person simultaneously in one blended step using our proposed CNN architecture. Our proposed model consisted of modules such as image processing, Feature extraction, feature classification, and recommendation process. The images used in the experiment are pre processed with various image processing methods like canny edge detection, histogram equalization, fit ellipse, and FER dataset is mediated for conducting the experiments. With a trained profile that can be updated flexibly, a user can detect his her behavior on a real time basis. It utilizes the state of the art of face detection and recognition algorithms. Sanket Godbole | Jaivardhan Shelke "AI Therapist – Emotion Detection using Facial Detection and Recognition & Showing Content According to Emotions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33267.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/33267/ai-therapist-–-emotion-detection-using-facial-detection-and-recognition-and-showing-content-according-to-emotions/sanket-godbole
Learning and imitation in heterogeneous robot groupsWilli Richert
As robots become increasingly affordable, they are used in ever more
diverse areas in order to perform increasingly complex tasks. These
tasks are typically preprogrammed by a human expert. In some cases,
however, this is not feasible -- either because of the inherent
complexity of the task itself or due to the dynamics of the
environment. The only possibility then is to let the robot learn the
task by itself. This learning process usually involves a long training
period in which the robot experiments with its surroundings in order
to learn the desired behavior. If robots have to learn a shared goal
in a group, the robots should imitate each other in order to reduce
their individual learning time. The question how this can be done in a
robot group has been considered in this thesis, i.e., how robots in a
group can learn to achieve their shared goal and imitate
each other in order to increase the performance and the speed of
learning by spreading the learned knowledge in the group.
To allow for this intertwined learning and imitation, a dedicated
robot architecture has been developed. On the one hand, it fosters
autonomous and self-exploratory learning. On the other hand, it allows
for manipulating the learned knowledge and behavior to account for new
knowledge gathered by the imitation process. Learning of behavior is
achieved by separately learning at two levels of abstraction. At the
higher level, the strategy is learned as a mapping from abstract
states to symbolic actions. At the lower level, the symbolic actions
are grounded autonomously by learned low-level actions.
The approaches of imitation presented in this thesis are unique in
that they relieve the requirements that governed multi-robot imitation
so far. It enables robots in a robot group to imitate each other in a
non-obtrusive manner. The robots can thus increase their learning
speed and thereby the overall performance of the group by simply
observing the other group members without requiring them to stick to a
certain communication protocol that would provide the necessary
information. With the presented approach, a robot is able to infer the
behavior that the observed demonstrator is performing and to replay
the beneficial behavior with its own capabilities.
In addition, the presented approaches allow the robots to apply
imitation even if the group is heterogeneous. Normally, the
performance of a group degrades if robots with incompatible
capabilities imitate each other. Capability differences arise if robot
morphologies differ in a robot group. This is the case if different
robots from different manufacturers form a robot group that has to
achieve shared goals. This thesis presents an approach that is able to
determine similarities or differences between robots. This can guide
the robots in a heterogeneous robot group in order to determine those
robots for imitation that are most similar to themselves.
La autora principal de este manual es la trabajadora social Deborah MacArthur, ayudada por Aruna Khadka, una pionera en el campo de la desinstitucionalización. La filosofía principal de este documento es que los derechos (y el interés superior) de niños y niñas estén garantizados en las familias antes que en las instituciones.
George rossolatos seminar on branding, brand equity, brand semiotic models an...//disruptiVesemiOtics//
Seminar on Branding, brand equity, brand semiotic models and research methods
Tartu University, Estonia 13-14 May 2014
George Rossolatos MSc, MBA, PhD
//disruptiVesemiOtics// email: georgerossolatos123@gmail.com
http://uni-kassel.academia.edu/georgerossolatos
Student Affairs: Traditional Communication SucksJames Britton
Traditional student affairs communication in higher ed sucks. Learn how to engage a modern college audience through social media. This talk was given at SXSWedu 2014 in Austin,TX in March 2014.
An odd even block cipher based cryptosystem through modulo arithmatic techniq...eSAT Journals
Abstract In this paper, a new Cryptosystem based on block cipher has been proposed where the encryption is done through Odd Even Modulo Arithmetic Technique (OEMAT). The original message is considered as a stream of bits, which is then divided into a number of blocks, each containing n bits, where n is any one of 2, 4, 8, 16, 32, 64, 128, 256. The first and the penultimate blocks are then added where the modulus of addition is 2n. The result replaces the penultimate block (say (N-1th) block), first block remaining unchanged. In the next attempt the second and the ultimate blocks (say Nth block) are added and the result replaces the Nth block. This process continues until all the blocks are executed. The modulo addition has been implemented in a very simple manner where the carry out of the MSB is discarded to get the result. The technique is applied in a cascaded manner by varying the block size from 2 to 256. The whole technique has been implemented by using a modulo subtraction technique for decryption. Keywords: MFBOMAT, FBOMAT, Symmetric block cipher, Cryptosystem
Slides of presentation given to Organization of Information Resources class at University of Washington iSchool Saturday, Februray 10, 2007 by Michael Braly and Geoff Froh
Mobile Tagging: Bridging the Gap - Mobile PortlandPaul Dockter
Mobile Tagging creates a bridge between traditional media and mobile lifestyles by using 2D barcodes which can be read from a mobile phone camera. The potential applications of this are wide-spread and have been successfully used in Japan for years, but there are barriers to adoption in the US.
Despite these barriers, both Microsoft and Google have recently announced plans to utilize 2D barcodes. Businesses are warming to the idea of using these codes to help people get to mobile content quickly. The question is how quickly consumers will warm to the idea.
Asia has traditionally led the way when it comes to mobile technology, and if this continues to hold true, it won't be long before we see mobile tagging spread in the U.S.
Enhancing social tagging with a knowledge organization systemMichael Day
Presentation slides associated with the paper "Enhancing Social Tagging with a Knowledge Organization System" written by Koraljka Golub, Jim Moon, Douglas Tudhope and Marianne Lykke Nielsen, accepted for the IFLA Satellite Meeting, Emerging Trends in Technology: Libraries Between Web 2.0, Semantic Web and Search, Florence, 19-20 August 2009. Much of the content of the slides is taken from previous presentations given by Koraljka Golub of UKOLN and Brian Matthews of STFC
JESS3's Point of View on Mobile Tagging Technology for NikeJESS3
As one of Nike's trusted social media strategy, content production and design firms, we frequently produce POV documents that provide the client (1) sourced insights and (2) actionable recommendations.
In the Mobile Tagging POV, we explore QR, Microsoft Tag and NFC technologies as it relates to mobile-based, in-store commerce.
A presentation with 80% new content on social tagging. This covers "faces of perception", "depth of perception", and perception matrix, which greatly helps to analyze, research, and build social software. Enterprise uses of social bookmarking and their concerns are also included.
Our research aims to propose a global approach for specification, design and verification of context awareness Human Computer Interface (HCI). This is a Model Based Design approach (MBD). This methodology describes the ubiquitous environment by ontologies. OWL is the standard used for this purpose. The specification and modeling of Human-Computer Interaction are based on Petri nets (PN). This raises the question of representation of Petri nets with XML. We use for this purpose, the standard of modeling PNML. In this paper, we propose an extension of this standard for specification, generation and verification of HCI. This extension is a methodological approach for the construction of PNML with Petri nets. The design principle uses the concept of composition of elementary structures of Petri nets as PNML Modular. The objective is to obtain a valid interface through verification of properties of elementary Petri nets represented with PNML.
PATENT DOCUMENT SUMMARIZATION USING CONCEPTUAL GRAPHSkevig
In this paper a methodology to mine the concepts from documents and use these concepts to generate an
objective summary of the claims section of the patent documents is proposed. Conceptual Graph (CG)
formalism as proposed by Sowa (Sowa 1984) is used in this work for representing the concepts and their
relationships. Automatic identification of concepts and conceptual relations from text documents is a
challenging task. In this work the focus is on the analysis of the patent documents, mainly on the claim’s
section (Claim) of the documents. There are several complexities in the writing style of these documents as
they are technical as well as legal. It is observed that the general in-depth parsers available in the open
domain fail to parse the ‘claims section’ sentences in patent documents. The failure of in-depth parsers
has motivated us, to develop methodology to extract CGs using other resources. Thus in the present work
shallow parsing, NER and machine learning technique for extracting concepts and conceptual
relationships from sentences in the claim section of patent documents is used. Thus, this paper discusses i)
Generation of CG, a semantic network and ii) Generation of abstractive summary of the claims section of
the patent. The aim is to generate a summary which is 30% of the whole claim section. Here we use
Restricted Boltzmann Machines (RBMs), a deep learning technique for automatically extracting CGs. We
have tested our methodology using a corpus of 5000 patent documents from electronics domain. The results
obtained are encouraging and is comparable with the state of the art systems.
PATENT DOCUMENT SUMMARIZATION USING CONCEPTUAL GRAPHSijnlc
In this paper a methodology to mine the concepts from documents and use these concepts to generate an
objective summary of the claims section of the patent documents is proposed. Conceptual Graph (CG)
formalism as proposed by Sowa (Sowa 1984) is used in this work for representing the concepts and their
relationships. Automatic identification of concepts and conceptual relations from text documents is a
challenging task. In this work the focus is on the analysis of the patent documents, mainly on the claim’s
section (Claim) of the documents. There are several complexities in the writing style of these documents as
they are technical as well as legal. It is observed that the general in-depth parsers available in the open
domain fail to parse the ‘claims section’ sentences in patent documents. The failure of in-depth parsers
has motivated us, to develop methodology to extract CGs using other resources. Thus in the present work
shallow parsing, NER and machine learning technique for extracting concepts and conceptual
relationships from sentences in the claim section of patent documents is used. Thus, this paper discusses i)
Generation of CG, a semantic network and ii) Generation of abstractive summary of the claims section of
the patent. The aim is to generate a summary which is 30% of the whole claim section. Here we use
Restricted Boltzmann Machines (RBMs), a deep learning technique for automatically extracting CGs. We
have tested our methodology using a corpus of 5000 patent documents from electronics domain. The results
obtained are encouraging and is comparable with the state of the art systems.
A N E XTENSION OF P ROTÉGÉ FOR AN AUTOMA TIC F UZZY - O NTOLOGY BUILDING U...ijcsit
The process of building ontology is a very
complex and time
-
consuming process
especially when dealing
with huge amount of data. Unfortunately current
marketed
tools are very limited and don’t meet
all
user
needs.
Indeed, t
hese software build the core of the ontology from initial data that generates
a
big number of
information.
In this paper, we
aim to resolve these problems
by adding an extension to the well known
ontology editor Protégé in order to work towards a complete
FCA
-
based framework
which resolves the
limitation of other tools in
building fuzzy
-
ontology
.
W
e will give
, in this paper
, some
details on
our
sem
i
-
automat
ic collaborative tool
called FOD Tab Plug
-
in
which
takes into consideration another degree of
granularity in the process of generation
.
In fact, i
t follows a bottom
-
up strategy based on conceptual
clustering, fuzzy logic and Formal Concept Analysis (FCA) a
nd it defines ontology between classes
resulting from a preliminary classification of data and not from the initial large amount of data
.
The presentation of our Journal First (J1ST) paper entitled "Conceptualisation, measurement, and application of semantic transparency in visual notations" on MODELS 2021: ACM/IEEE 24th International Conference on Model Driven Engineering Languages and Systems (MODELS)
Stanford Center for Biomedical Informatics Research, Colloquium, Stanford University, Palo Alto, CA, Jan 6th, 2010
Presenter: Markus Strohmaier, Graz University of Technology, Austria
A Comparative Study of Recent Ontology Visualization Tools with a Case of Dia...IJORCS
Ontology is a conceptualization of a domain into machine readable format. Ontologies are becoming increasingly popular modelling schemas for knowledge management services and applications. Focus on developing tools to graphically visualise ontologies is rising to aid their assessment and analysis. Graph visualisation helps to browse and comprehend the structure of ontologies. A number of ontology visualizations exist that have been embedded in ontology management tools. The primary goal of this paper is to analyze recently implemented ontology visualization tools and their contributions in the enrichment of users’ cognitive support. This work also presents the preliminary results of an evaluation of three visualization tools to determine the suitability of each method for end user applications where ontologies are used as browsing aids with a case of Diabetes data
Ontology Evaluation Methods and Metrics - This is work I did while I was at The MITRE Corporation. I came up with a framework to support ontology evaluation for reuse that could also be used for ontology construction. I was the sole author of the approach, which was intended to begin a research program and a community of practice around it. It's been on hold and would like that to change. I'm now at the Tetherless World Constellation at Rensselaer Polytechnic Institute, if interested contact me there.
Reuse of Structured Data: Semantics, Linkage, and Realizationandrea huang
In order to increase the reuse value of existing datasets, it is now becoming a general practice to add semantic links among the records in a dataset, and to link these records to external resources. The enriched datasets are published on the web for both human and machine to consume and re‐purpose.
In this paper, we make use of publicly available structured records from a digital archive catalogue, and we demonstrate a principled approach to converting the records into semantically rich and interlinked resources for all to reuse. While exploring the various issues involved in the process of reusing and
re‐purposing existing datasets, we review the recent progress in the field of Linked Open Data (LOD), and examine twelve well‐known knowledge bases built with a Linked Data approach.
We also discuss the general issues of data quality, metadata vocabularies, and data provenance. The concrete outcome
of this research work is the following:
(1) a website data.odw.tw that hosts more than 840,000
semantically enriched catalogue records across multiple subject areas,
(2) a lightweight ontology voc4odw for describing data reuse and provenance, among others, and
(3) a set of open source software tools available to all to perform the kind of data conversion and enrichment we did in this research. We have used and extended CKAN (The Comprehensive Knowledge Archive Network) as a platform to host and publish Linked Data. Our extensions to CKAN is open sourced as well.
As the records we drawn from the originally catalogue are released under the Creative Commons licenses, the semantically enriched resources we now re‐publish on the Web are free for all to reuse as well.
Metadata as Linked Data for Research Data Repositoriesandrea huang
“Every man has his own cosmology and who can say that his own is right.” said by Einstein. This is also true when we come to understand data semantics that one data may be different interpreted by different data creators, curators and re-users. Then, how do we build a better research data repository?
We start with the point made by Willis, C., Greenberg, J., & White, H. (2012) that the metadata of research data increases the access to and reuse of the data. And Stanford, Harvard, and Cornell believe the use of linked data technologies is a promising method to gather contextual information about research resources.
To look for inspiration tools that can meet the urgent needs of innovative solutions providing feature-rich services for helping data publishing such as visualization, validation & reuse in different applications by research repositories (Assante, et.al, 2016), the CKAN (Comprehensive Knowledge Archive Network) as a major solution that makes linked metadata available, citable, and validated becomes our first choice.
Original file: http://m.odw.tw/u/odw/m/metadata-as-linked-data-for-research-data-repositories/
20161004 “Open Data Web” – A Linked Open Data Repository Built with CKANandrea huang
Our team is in Madrid (#CKANCon) to introduce our #LODLAM implementation. The http://data.odw.tw just out. (Slides at https://goo.gl/KJApV8 ) If you are at #IODC16, you are also welcome to discuss with our team in person. #opendata
More introduction about data.odw.tw can be accessed at https://goo.gl/YUSI74 (chinese) and https://goo.gl/2u07Ap (english).
A Linked Data Prototype for the Union Catalog of Digital Archives Taiwanandrea huang
Linked data paradigm has provided the potential for any data to link or to be linked with structural information, internally and externally. To improve on current cultural
service of the Union Catalog of Digital Archives Taiwan (catalog.digitalarchives.tw), a linked data prototype is developed and benefited by extending the Art & Architecture Thesaurus (AAT) for a machine-understandable catalog service.
However, knowledge engineering is time and labor consuming, especially for an archive that is non-western based in culture and multidisciplinary in natural. This
makes data semantics of the UCdaT are extremely challenged for mapping to international standards and vocabularies.
At this stage, the triple store is an experimental addition to the existing Union Catalog of Digital Archives Taiwan architecture, and provides semantic links to target collections for relative suggestions. This will guide us in creating a future technical architecture that is scalable to the whole archive level, compliant with learning by doing
guidelines, and preserves the data even that is difficult to be understood fully at present, but at least to be linked by others that may provide third-party’s understandings for their own reuse.
Relations for Reusing (R4R) in A Shared Context: An Exploration on Research P...andrea huang
Will the rich domain knowledge from research publications and the implicit cross-domain metadata of cultural objects be compliant with each other? A contextual framework is proposed as dynamic and relational in supporting three different contexts: Reusing, Publication and Curation, which are individually constructed but overlapped with major conceptual elements. A Relations for Reusing (R4R) ontology has been devised for modeling these overlapping
conceptual components (Article, Data, Code, Provence, and License) for interlinking research outputs and cultural heritage data. In particular, packaging and citation relations are key to build up interpretations for dynamic contexts. Examples are provided for illustrating how the linking mechanism can be constructed and represented as a result to reveal the data linked in different contexts.
101203 An event ontology for crisis-disaster informationandrea huang
Information management in the event of a crisis/disaster is a challenging problem as often the information is incomplete or inaccurate, while the public and the government both need to access to critical information in order to plan for crisis prevention and disaster relief. In addition, as communication networks and their bandwidth can be rather limited or overloaded in such events, it can be very difficult in aggregating, summarizing, and disseminating the relevant information in timely and useful ways. An ontology for the representation, processing, and integration of event information would be very useful in the application domain of crisis prevention and disaster relief. We have surveyed several event ontologies, and will propose some guidelines for the design of an event ontology for crisis-disaster information management.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
081016 Social Tagging, Online Communication, and Peircean Semiotics
1. A Conceptual Framework
To appear in Journal of Information Science. 2008.
Post-print full paper:
http://guava.iis.sinica.edu.tw/_media/papers/semiotics/jis0799.pdf
2. What? What? What?
A Conceptual Framework
• Social Tagging… sounds familiar.
• Online Communication… looks no problem.
• Peircean Semiotics…?...?...?
systematic
abstract dynamic pragmatic
2
Huang & Chuang, 2008
3. Put it in two chemical metaphors…
A Conceptual Framework
• P i ’ one sign ~ one b i chemical element (
Peirce’s i basic h i l l t (proton).
t )
Representation Interpretant
I t t t
In Peircean semiotics, the formal
condition of a sign
must contain three parts,
{Representation, Object, Interpretant},
Object One proton is
to be considered composed of three
a complete sign.
quarks.
3
Huang & Chuang, 2008
4. Put it in two metaphors
metaphors…
A Conceptual Framework
• Peirce’s ten class of signs ~the Periodic Table.
Peirce s Table
providing a framework
to classify,
to systematize and
to compare all the many different forms of
sign/ information/tag/(chemical) behavior.
4
Huang & Chuang, 2008
5. users act like lightweight system designers in
the new online communication process
A Conceptual Framework
General users are
Writing wiki…
General users are
blogging…
General users are
mashing web
services…
5
Huang & Chuang, 2008: introduction
6. The changing Of
Online Communication Process … A Conceptual Framework
dimensions interpretations
the difficulty lies in the
interpretation along
technical and social
dimensions.
dimensions
tags
6
Huang & Chuang, 2008: research problems
7. Lack of a systematical exploration
of the overall picture
picture… A Conceptual Framework
Why are people engaged in social tagging?
Who are the interpreters?
What objects do the tags refer to ? Human
How does social tagging correspond to
online communications ?
Information
Machine
(tag)
7
Huang & Chuang, 2008: research problems
8. The k
Th keys t analyze these questions are:
to l th ti
The framework
of Peirce’s A Conceptual Framework
semiotics:
(1) Triadic sign
theory.
(2) Ten classes
of Signs.
8
Huang & Chuang, 2008: section 3,4,5
9. A Conceptual Framework
Our three conclusions
machine
are: meaning
i
human
meaning
Tagging
T i
( )
(1) we regard tagging as sign that
g gg g g as
conveys human and machine
meanings in the online
Sign
communication process.
process
9
Huang & Chuang, 2008
10. (2) we identify ten classes of social tagging signs to
offer a semiotic solution to the vagueness and
ambiguity of tagging in the online communication
g y gg g
process.
process. A Conceptual Framework
10
Huang & Chuang, 2008
11. (3.1) a systematic approach is offered here to explore the
interrelationships between social tagging, online
communication and the concepts of Peircean semiotics;
A Conceptual Framework
11
Huang & Chuang, 2008
12. (3.2) some practical implications for user-community
user-
designs and the use of tagging technologies are
discussed.
A Conceptual Framework
For pragmatic designs the properties of the 6 Open signs direct
designs,
the use for community of interest design; the 3 Informational
signs fall into personal preference; and the 1 Formal sign is
completed as a powerful constraints on the relative properties of
other signs
signs.
For semantic implications, the properties of the 3 Iconic signs
implications
demonstrate the possibility or appearance with similar properties of
th referred objects; th 4 I d i l signs are grouped t d
the f d bj t the Indexical i d to draw
users’ attentions to the existence or existential relation of objects;
and the 3 Symbolic signs is completed as a powerful constraints
on th relative properties of other signs.
the l ti ti f th i
The main value of the ten class of signs is the ability to predict the
sign characters of an element based on its location on the sign
class; as well as the relationship between each signs such as the
Replica relations of Signs (2,5); Signs (3,6,8); and Signs
(4,7,9,10).
12
Huang & Chuang, 2008
13. Open Questions (1)…
A Conceptual Framework
wants to
design
designer Web (3)Tag List
Ten class of “Tag list” as a
Tag List broad Sign.
re-classify
Can this dynamic application be done? 13
Huang & Chuang, 2008
14. Open Questions (2)…
A Conceptual Framework
search
terms re-cast
Web Keyword
user Archives
personal
preference
review
pre-classify
auto-
recommen
dation tags
d ti t
Will this application be seen ? 14
Huang & Chuang, 2008
16. 1
1. introduction
2. problems A Conceptual Framework
triadic sign
3. triadic sign
interpretant of
social t
i l tagging
i
4. three
content universal
categories
5. ten classes
of signs
6. discussions
& implications
7.
7 conclusion
16
Huang & Chuang, 2008
17. no essential direct relationship between R &O
A Conceptual Framework
According t P i
A di to Peirce, a sign
i
“ is something, A, which
brings something B its
something, B,
interpretant sign determined
or created by it, into the
same sort of
correspondence with
something, C,
something C its object, as
object,
that in which itself stands to
C.”
17
Huang & Chuang, 2008: triadic sign
19. A Conceptual Framework
Open
informational
Formal
• Mark • Mark • Mark
Iconic • Token Iconic • Token Iconic • Token
• Type
T • Type • Type
• Token • Token • Token
Open Indexical
Informational Formal
• Type Indexical
•TType
Indexical
•TType
Symbolic • Type Sy bo c
Symbolic • Type Symbolic
Sy bo c • Type
19
Huang & Chuang, 2008: ten classes of signs
21. The sign deals with the possibility of first
observation in order to determine the possible
evidence for future acts. A Conceptual Framework
• it is a feeling of something.
In social tagging, the terms of “tagging”, “social tagging”,
“ folksonomy” or “tagsonomy” initially any possible
feeling of social tagging concepts.
g gg g p
a feeling no determined Representation of “How” tag
should represent it.
“What” the icon sign refers to some characters or
likeness of tagging Objects whether any such Object exist or
not.
The sign is interpreted by user community openly for their
community of interest according to their past experience. This
Interpretation is itself of a sign for social tagging by “Wh and
I t t ti i it lf f i f i lt i b “Who d
Why” questions.
21
Huang & Chuang, 2008: ten classes of tagging signs
22. The second sign is the actual existence of the
Sign (1); an individual or particular copy of a tag
(Type); in theory there can be lots of tokens of a
theory,
single type (tag). A Conceptual Framework
Tag clouds resemble their likeness of characters
as tagging, but represent in the actual form of the
cloud diagram; the visualization of the most used
tags of a folksonomy.
Sinclair and Cardew-Hall (2008): a “visual
summary of contents” / it serves as a broad and
y
general categorization of information.
Hearst and Rosner (2008): “social signallers”
Sign (2) is a sign of an individual diagram, which
allows several copies of a single tag; however, it
only determines the idea or feeling of an object,
irrespective of whether any such object exists. From
this perspective, tag clouds are not meant to be, and
are not noted for, their information accuracy.
t t d f th i i f ti
22
Huang & Chuang, 2008: ten classes of tagging signs
23. In theory this sign is any object of direct
theory,
connection or existential relation, as it directs A Conceptual Framework
attention to an Object by which its existence is
caused.
caused
The sign deals with possible evidence as some
relations have been connected
connected.
It is the sign to indicate some past state of affairs.
It forces the attention to the particular object intended
without describing it.
Tag clustering, in social tagging cases, indicates
g g, gg g ,
some past state of tag connection. Its Object deals
with existential relation for the Index while
Representing forms are still remain in the level of
Token. Tag Clusters are the actual existence of some
single tag copies according to a certain degree of
similarity like related tags or patterns.
23
Huang & Chuang, 2008: ten classes of tagging signs
24. Tag Clustering of “web” in flickr
A Conceptual Framework
Before
Clustering
Clustering
with
related
words
24
Huang & Chuang, 2008: ten classes of tagging signs
25. any object of direct experience, connection or
existential relation.
Personomy: the collection of personal tags acrossConceptual Framework
A
different web systems.
Tag RSS: The tag acts as an indexical token that
finds web resources related to the token in various
web services.
25
Huang & Chuang, 2008: ten classes of tagging signs
26. deals with the operation of Representation to
create or discover a possible rule.
The mode of being of Sign (5) is that of
governing single R li
i i l Replicas, each of which will b
h f hi h ill be
A Conceptual Framework
a Sign (2) of a peculiar kind.
26
Huang & Chuang, 2008: ten classes of tagging signs
27. any general law or type that requires each
instance of it to be strongly influenced by its
indexical Object
Object.
Each Replica of Sign (6) will be a Sign (3) of a
A Conceptual Framework
peculiar kind.
tags with specific forms that are not in the
t ith ifi f th t t i th
vocabulary, e.g., “DSC-R1 for he Sony DSC-R1
camera fans; “ACIA” are used differently in
different comm nities
communities.
(1) community knowledge can be explored by
using specific tags.
tags
(2) non-vocabulary tags prevent public
understanding and provide identification for
specific events
(3) a tool to express or promote a community’s
campaigns or interests.
27
Huang & Chuang, 2008: ten classes of tagging signs
28. any general type or law. Sign(7) requires each
case of the sign to be really affected by its
Object and provides definite information about
the Object.
A Conceptual Framework
Each Replica of Sign (7) will be a Sign (4) of a
peculiar kind
personal tags as
indexical objects in
system.
one s stem
“semantic web” as a
tag used by different
g y ff
users for grouping
their own objects
28
Huang & Chuang, 2008: ten classes of tagging signs
29. connected with its Object by any connection
of general ideas; The Replica of Sign (8) is
Sign (3) of a peculiar kind.
common words are usually embedded with A Conceptual Framework
conventional rules for linguistic meanings, but
without any specific explanation in p
y p p practice.
Noll & Meinel (2007):
tags,
popular tags which
account for half the
tags in use, are
general rather than
specific.
29
Huang & Chuang, 2008: ten classes of tagging signs
30. its intended Interpretant represents as an
existential relation that must be connected with
the indicated Object; the Replica of Sign (9) is a
Sign (4) of a peculiar kind
kind.
A Conceptual Framework
tagging is mainly for personal purposes (Golder
& Huberman, 2006; Zollers, 2007)
, ; , )
tags’ linguistic forms of non-nominal
representations ( g verbs and adjectives) are
p (e.g., j )
regarded as supplements of categories that take
their meanings from the categories’ descriptions
(Veres, 2006)
Personal tagging as
personal statement by
The K
Th KronoNaut at
N t t
Flickr
30
Huang & Chuang, 2008: ten classes of tagging signs
31. the t l i
th most complex sign restricted b certain
t i t d by t i
rules, which is mainly restricted by designers
for logical reasoning process.
A Conceptual Framework
Three levels of Interpreters with their interpretation tags are provided
by del.icio.us system designers as a recommendation mechanism for
del icio us
users to tag their bookmarks.
31
Huang & Chuang, 2008: ten classes of tagging signs
32. A Conceptual Framework
the emergence of online communication
systems can be understood as a sign
within
“a communication of programs between
computers from man to computers from
computers, computers,
man to man, as well as from man to
himself
himself” …..by Heinz Zemanek (1965)
32
Huang & Chuang, 2008: ten classes of tagging signs