This document presents the objectives and methodology of the Socialoscope project. The project aims to develop a smartphone application that can passively detect user loneliness levels based on social interactions sensed from the phone. It explores using machine learning models to correlate phone sensor data with scores from validated loneliness and personality scales. The author conducted a pilot study collecting phone data and survey responses from participants. Statistical analysis identified several phone usage features significantly correlated with loneliness. Future work includes implementing feedback and tracking features in the Socialoscope app to help users and mental health professionals monitor loneliness levels.
This systematic review examined 110 studies that used Facebook for participant recruitment in health, medical or psychosocial research. The majority of studies were cross-sectional (80%) and addressed physical health issues (57%). Half of the studies reported details on the Facebook recruitment process. Researchers spent between $1.36 and $110 per participant, with a mean of $17.48. Among studies examining sample representativeness, most (86%) concluded samples recruited through Facebook were similarly representative to those from traditional methods. The review found Facebook can be an effective and cost-efficient recruitment method when considering factors like the target group, advertisement content, incentives, and no-cost recruitment strategies.
This document summarizes a presentation on using Google Forms for online surveys. It discusses the evolution of survey tools, how online surveys are useful compared to other methods, features of online survey tools like Google Forms, and a case study of how to conduct an online survey using Google Forms. The presentation covers steps to design, develop, host, collect data, analyze and present results from an online survey created with Google Forms. It also discusses some issues with online surveys like technological variations and low response rates.
This document discusses a study conducted on the impact of social networking sites as information dissemination tools of government agencies, as perceived by second year Foreign Service students at Lyceum of the Philippines University – Cavite Campus. The study aimed to determine the role of social networking in communication and information dissemination, assess how they impact government information dissemination, and identify potential benefits to students. The findings hoped to increase awareness among students, instructors, and government agencies of using social media for public relations and engaging citizens. The scope was limited to a survey of second year Foreign Service students during the second semester of the 2011-2012 academic year.
Online survey tools_google-forms_nv_nsh (2) (2)Vasantha Raju N
Google Forms is a free online survey tool that allows users to design and distribute web-based questionnaires. The paper discusses how Google Forms was used to design and distribute a survey on employability of library science graduates. A questionnaire on graduates' employment status and skills was created in Google Forms and distributed via an online forum and Facebook. Over 70 graduates responded online, with their responses automatically recorded in a spreadsheet for analysis. While online surveys have advantages, issues like sample selection, technology variations, and privacy must be considered, especially in developing countries with lower internet access.
This document summarizes a presentation given by PhD student Yimei Zhu on her research into how PhD students use blogs, Twitter, and Facebook for scholarly communication. She conducted interviews and participant observation of 7 PhD students to understand their use of social media and strategies employed. Key findings included blogs, Twitter, and Facebook being helpful for networking and dissemination but concerns around lack of academic rewards and privacy. Future work will include a survey and more interviews.
Social Media Use by Canadian Academic LibrariansCARLsurvey2010
The document describes the design of a phase II survey of Canadian academic librarians that builds on findings from a previous phase I survey. The phase II survey aims to elicit qualitative data through open-ended questions about librarians' motivation, attitudes, and behaviors regarding social media use. Responses will be analyzed using grounded theory and triangulation approaches to identify major factors influencing social media adoption among academic librarians.
FACEBOOK AS A MEDIUM FOR POLITICAL CAMPAIGNS DURING THE LAST MAY 2013 LOCAL E...Alyssa Louise Lozanes
This study examined how first-time voters at the University of St. La Salle assessed the use of Facebook for political campaigns during the May 2013 midterm elections in Bacolod City, Philippines. Most respondents were 19 years old and spent 1-3 hours per day on Facebook, accessing it 3-5 days a week. The most common political content on Facebook included campaign posters and photos of activities. Congressman Anthony Golez and Mayor Monico Puentevella had the most Facebook presence among candidates. However, over 50% of respondents said Facebook did not influence their voting decisions. While candidates used Facebook for visibility, it did not necessarily lead to election success.
This systematic review examined 110 studies that used Facebook for participant recruitment in health, medical or psychosocial research. The majority of studies were cross-sectional (80%) and addressed physical health issues (57%). Half of the studies reported details on the Facebook recruitment process. Researchers spent between $1.36 and $110 per participant, with a mean of $17.48. Among studies examining sample representativeness, most (86%) concluded samples recruited through Facebook were similarly representative to those from traditional methods. The review found Facebook can be an effective and cost-efficient recruitment method when considering factors like the target group, advertisement content, incentives, and no-cost recruitment strategies.
This document summarizes a presentation on using Google Forms for online surveys. It discusses the evolution of survey tools, how online surveys are useful compared to other methods, features of online survey tools like Google Forms, and a case study of how to conduct an online survey using Google Forms. The presentation covers steps to design, develop, host, collect data, analyze and present results from an online survey created with Google Forms. It also discusses some issues with online surveys like technological variations and low response rates.
This document discusses a study conducted on the impact of social networking sites as information dissemination tools of government agencies, as perceived by second year Foreign Service students at Lyceum of the Philippines University – Cavite Campus. The study aimed to determine the role of social networking in communication and information dissemination, assess how they impact government information dissemination, and identify potential benefits to students. The findings hoped to increase awareness among students, instructors, and government agencies of using social media for public relations and engaging citizens. The scope was limited to a survey of second year Foreign Service students during the second semester of the 2011-2012 academic year.
Online survey tools_google-forms_nv_nsh (2) (2)Vasantha Raju N
Google Forms is a free online survey tool that allows users to design and distribute web-based questionnaires. The paper discusses how Google Forms was used to design and distribute a survey on employability of library science graduates. A questionnaire on graduates' employment status and skills was created in Google Forms and distributed via an online forum and Facebook. Over 70 graduates responded online, with their responses automatically recorded in a spreadsheet for analysis. While online surveys have advantages, issues like sample selection, technology variations, and privacy must be considered, especially in developing countries with lower internet access.
This document summarizes a presentation given by PhD student Yimei Zhu on her research into how PhD students use blogs, Twitter, and Facebook for scholarly communication. She conducted interviews and participant observation of 7 PhD students to understand their use of social media and strategies employed. Key findings included blogs, Twitter, and Facebook being helpful for networking and dissemination but concerns around lack of academic rewards and privacy. Future work will include a survey and more interviews.
Social Media Use by Canadian Academic LibrariansCARLsurvey2010
The document describes the design of a phase II survey of Canadian academic librarians that builds on findings from a previous phase I survey. The phase II survey aims to elicit qualitative data through open-ended questions about librarians' motivation, attitudes, and behaviors regarding social media use. Responses will be analyzed using grounded theory and triangulation approaches to identify major factors influencing social media adoption among academic librarians.
FACEBOOK AS A MEDIUM FOR POLITICAL CAMPAIGNS DURING THE LAST MAY 2013 LOCAL E...Alyssa Louise Lozanes
This study examined how first-time voters at the University of St. La Salle assessed the use of Facebook for political campaigns during the May 2013 midterm elections in Bacolod City, Philippines. Most respondents were 19 years old and spent 1-3 hours per day on Facebook, accessing it 3-5 days a week. The most common political content on Facebook included campaign posters and photos of activities. Congressman Anthony Golez and Mayor Monico Puentevella had the most Facebook presence among candidates. However, over 50% of respondents said Facebook did not influence their voting decisions. While candidates used Facebook for visibility, it did not necessarily lead to election success.
An Exploratory Study on Using Social Information Networks for Flexible Litera...Lamjed Ben Jabeur
It is well known that the fundamental intellectual problems of information access are the production and consumption of information. In this paper, we investigate the use of social network of information producers (authors) within relations in data (co-authorship and citation) in order to improve the relevance of information access. Relevance is derived from the network by levraging the usual topical similarity between the query and the document with the target author’s authority. We explore various social network based measures for computing social information importance and show how this kind of contextual information can be incorporated within an information access model. We experiment with a collection issued from SIGIR proceedings and show that combining topical, author and citation based evidences can significantly improve retrieval access precision, measured in terms of mean reciprocal rank.
Fuzzy AndANN Based Mining Approach Testing For Social Network AnalysisIJERA Editor
Fast and Appropriate Social Network Analysis (SNA) tools ,techniques, are required to collect and classify
opinion scores on social networksites , as a grouping on wrong opinion may create problems for a society or
country . Social Network Analysis (SNA) is popular means for researcher as the number of users and groups
increasing day by day on that social sites , and a large group may influence other.In this paper, we
recommendhybrid model of opinion recommendation systems, for single user and for collective community
respectively, formed on social liking and influence network theory. By collecting thedata of user social networks
and preferenceslike, we designed aimproved hybrid prototype to imitate the social influence by like and sharing
the information among groups.The significance of this paper to analyze the suitability of ANN and Fuzzy sets
method in a hybrid manner for social web sites classifications, First, we intend to use Artificial Neural
Network(ANN)techniques in social media data classification by using some contemporary methods different
than the conventional methods of statistics and data analysis, in next we want to propagate the fuzzy approach
as a way to overcome the uncertainity that is always present in social media analysis . We give a brief overview
of the main ideas and recent results of social networks analysis , and we point to relationships between the two
social network analysis and classification approaches .This researchsuggests a hybrid classification model build
on fuzzy and artificial neural network (HFANN). Information Gain and three popular social sites are used to
collect information depicting features that are then used to train and test the proposed methods . This neoteric
approach combines the advantages of ANN and Fuzzy sets in classification accuracy with utilizing social data
and knowledge base available in the hate lexicons.
Millenial Mythology: Putting suppositions to the test in an academic library, from Pascal Lupien, Academic Liaison Librarian, University of Guelph, and Randy Oldham, System Support Technician, University of Guelph; Presented at Computers in Libraries Conference 2008
Social Networking in Libraries: Do Students want Librarians in Their Turf?Jenny Emanuel
The document discusses a study conducted on whether students want librarians involved in their social networks. A survey of 50 students at the University of Central Missouri found that 80% had social media accounts but only 34% would add a librarian as a friend. While some students were open to receiving library resources through social media, focus group discussions revealed that students see social media as personal space and do not want authority figures to have access to personal details. The conclusion is that libraries should have a presence on social media but not force interaction, and it's important for librarians to maintain a hierarchical relationship with students.
The document discusses an action research project that evaluated academics' views of an academic librarian's role and investigated ways to promote partnerships between librarians and faculty. Semi-structured interviews found that academics viewed the librarian's role as either reactive, supportive, or an equal partner. Follow-up one-on-one and group sessions with academics led to new plans for integrating information literacy instruction into courses. While the sample was too small to generalize, questionnaires indicated the sessions positively changed academics' views of the librarian's role and generated new ideas about how the library could support their courses.
Really do university students believe that facebook is a useful tool to mobil...BO TRUE ACTIVITIES SL
The use of information and communication technologies pervades our lives. A specific type of social media that is playing a crucial role in this upsurge of participation in cyber-collective social movements (CSMs) is the social networking sites (SNS). We employ an extended model from the Unified Theory of Acceptance and Use of Technology (UTAUT) as our theoretical framework to understand student perceptions of SNS use expectations (performance expectancy and effort expectancy), social acceptance (social influence), and their perceptions about resource availability (facilitating conditions) for expressive social participation. This extended model introduces social variables (SNS mobilization effort and offline civic participation) that researchers have identified as important in explaining behaviors. In doing so, it advances a model of how activities in the online domain can ‘spill’ over to the offline domain. We have provided empirical support for the applicability of UTAUT to the expressive participation in CSMs via a survey of 214 SNS users. Our results confirm that expectancy and social influence significantly affect student intentions to use SNS for expressive participation in CSMs. Likewise, SNS mobilization effort emerged as a strong significant predictor of both intention and the use of SNS for expressive participation, but not for offline civic participation. Last, the use of SNS for expressive participation was a significant predictor for offline civic participation, which suggests that users who publicly express their socio-political opinions in SNS are more likely than others to participate in demonstrations.
Cj525 unit4 dqtopic #1 the research literature reviewparSONU61709
The document discusses two parts of a discussion question for a course on criminal justice. Part 1 asks the student to describe their systematic search process for prior research on their topic, including keywords, databases, and filters. Part 2 asks the student to analyze and critique four studies on the use of the Incident Command System, identifying strengths and weaknesses and discussing themes. The student responds by outlining their search process and criteria for domestic violence in police agencies and reviews the four studies presented, noting strengths and weaknesses of methodology and findings.
Human: You are an expert at summarizing documents. You provide concise summaries in 3 sentences or less that provide the high level and essential information from the document. Summarize the following document.
S16_MAP_Using Data Science to Model Relationships Between Educational Levels ...Peiyun Zhang
This project aims to model relationships between educational levels and crime rates in New York City and St. Louis using machine learning techniques. The team will analyze data from the NYPD Stop, Question, and Frisk database, New York City Department of Education, St. Louis Police Department crime files, and Missouri education data to develop statistical models and interactive visualizations exploring the potential connections between education and crime rates. Each team member brings relevant coursework in mathematics, statistics, and computer science to apply statistical and coding skills to interpret the datasets using R software.
Forecasting General Election Results in Poland 2011 on the Basis of Social Me...Pawel Kuczma
This document summarizes a study that analyzed social media content from Poland during the pre-election period in 2011 to predict the results of the country's general election. The study found that the amount and sentiment of content about different political parties on blogs and forums correctly identified the top two parties that went on to gain the most votes. Quantitative analysis showed the most discussion was on blogs and forums, while qualitative analysis found content focused more on essential policy areas than just media topics. The results supported using social media content analysis to forecast election outcomes. Further research is needed to better understand influencers and advance sentiment analysis techniques.
This document summarizes interviews conducted with researchers and librarians in biomedical sciences about their use of digital technologies for scientific work. Researchers primarily use traditional databases like PubMed but have little awareness of open science resources. They disseminate work through traditional publications but are unsure when sharing data is appropriate. Evaluation of work focuses on impact factors but understanding of bibliometrics is lacking. Interviewees identified needs for improved data management skills, understanding open science, evaluating scientific quality, and adopting social networks for dissemination. Overall, training is needed to help researchers see value in participatory digital scholarship.
This document provides an overview of qualitative research methods, with a focus on document analysis and using secondary data sources. It discusses that qualitative research aims to understand why and how through exploratory analysis of words and context. Document analysis involves systematically analyzing documents to identify themes and patterns. Secondary data sources for qualitative research can include archives, academic papers, government reports, newspapers, media, websites, blogs, and social media. The benefits and challenges of using different data sources like newspapers and social media in criminology and policing research are also reviewed.
Predicting Response Mode Preferences of Survey RespondentsMickeyJackson3
This document compares different methods for predicting survey respondents' mode preferences in a mixed-mode survey. It finds that traditional regression, random forests, and model-based recursive partitioning all perform similarly well at identifying respondents who disproportionately prefer paper surveys to web surveys. Targeting paper surveys only to the estimated 35% most likely to prefer paper could increase initial response rates by 3-4 percentage points compared to using only web, or 1-2 points compared to random paper assignment.
Influence of internet and social media on citizens’ political choicesPawel Kuczma
Presentation by Pawel Kuczma, Institute of Journalism, University of Warsaw presented at General Online Research Conference - GOR 14, 5-7 March 2014Cologne University of Applied Sciences, Germany
Subconscious Crowdsourcing: A Feasible Data Collection Mechanism for Mental D...Elvis Saravia
1) The document proposes a method called "subconscious crowdsourcing" to collect social media data from users with mental disorders in order to build predictive models for mental disorder detection.
2) It extracts linguistic and behavioral features from Twitter data like emotion transitions and social interactions to train models for bipolar disorder and borderline personality disorder classification.
3) Experimental results show the TF-IDF model achieves the best performance in 10-fold cross validation tests and addresses the selection bias problem of prior work by detecting actual disorder sufferers rather than just those discussing mental health topics.
The biometric network system developed by Semlex (BNS) centralizes all biometric information in order to produce and organize the issuance of all national documents needed by the State.
As oil prices continue to drop, most energy companies are looking at their space needs and responding in one of three ways. See more at http://bit.ly/1lJfyb0
Google docs allows users to send feedback by writing, saving, and sharing their feedback using the online document editor. Users can write up their feedback, save it in their Google drive, and then share it with the relevant parties. Once shared, the feedback process is complete.
This document is a resume for Alexander Maule seeking a position as a Project Manager/Estimator. It summarizes his education in Construction Management from South Dakota State University, previous work experience as a Project Manager/Estimator and Heavy Machinery Operator for Knife River Co., and lists the transferable skills and community service he can offer.
The document provides instructions for a Valentine's Tribute Poetry Contest. Students are prompted to write a poem expressing their love or admiration for a non-living object. The document gives examples of tribute poems and guides students through brainstorming, writing, and revising their own poems to perform for the contest. Students are encouraged to use literary devices like similes, metaphors, personification and rhyme scheme.
La estudiante Jenny Barrionuevo Mejía presenta un resumen sobre el Sistema Nervioso Autónomo (SNA) para su clase de Fisiología en la Facultad de Ciencias de la Salud de la Universidad Técnica de Ambato en Ecuador, bajo la guía del Dr. Gustavo Moreno.
Cognizant_Introduction to management consulting in Switzerlandaudrey miguel
Cognizant is launching management consulting services in Switzerland to help clients with strategy, business transformation, customer relationships, and risk management. Since 2004, Cognizant has provided these services primarily to banking, financial services, and insurance clients. The document outlines Cognizant's five specialized consulting practices and experience assisting clients with regulations like IFRS 9, Basel III, BCBS 239, and PRIIPS.
The document discusses how the media product challenges conventions of horror films. Specifically:
- It shows the identity of the killer ghost girl early on, leaving the audience to wonder who she is and why she kills.
- It uses the point-of-view shot from the killer's perspective, which is uncommon as POV shots usually show the victim's perspective.
- Lighting and a night effect were used to create an eerie feeling and follow the horror convention of scenes being set at night.
- Shots from CCTV footage were included to further challenge conventions by showing both the footage and the security guard watching it.
An Exploratory Study on Using Social Information Networks for Flexible Litera...Lamjed Ben Jabeur
It is well known that the fundamental intellectual problems of information access are the production and consumption of information. In this paper, we investigate the use of social network of information producers (authors) within relations in data (co-authorship and citation) in order to improve the relevance of information access. Relevance is derived from the network by levraging the usual topical similarity between the query and the document with the target author’s authority. We explore various social network based measures for computing social information importance and show how this kind of contextual information can be incorporated within an information access model. We experiment with a collection issued from SIGIR proceedings and show that combining topical, author and citation based evidences can significantly improve retrieval access precision, measured in terms of mean reciprocal rank.
Fuzzy AndANN Based Mining Approach Testing For Social Network AnalysisIJERA Editor
Fast and Appropriate Social Network Analysis (SNA) tools ,techniques, are required to collect and classify
opinion scores on social networksites , as a grouping on wrong opinion may create problems for a society or
country . Social Network Analysis (SNA) is popular means for researcher as the number of users and groups
increasing day by day on that social sites , and a large group may influence other.In this paper, we
recommendhybrid model of opinion recommendation systems, for single user and for collective community
respectively, formed on social liking and influence network theory. By collecting thedata of user social networks
and preferenceslike, we designed aimproved hybrid prototype to imitate the social influence by like and sharing
the information among groups.The significance of this paper to analyze the suitability of ANN and Fuzzy sets
method in a hybrid manner for social web sites classifications, First, we intend to use Artificial Neural
Network(ANN)techniques in social media data classification by using some contemporary methods different
than the conventional methods of statistics and data analysis, in next we want to propagate the fuzzy approach
as a way to overcome the uncertainity that is always present in social media analysis . We give a brief overview
of the main ideas and recent results of social networks analysis , and we point to relationships between the two
social network analysis and classification approaches .This researchsuggests a hybrid classification model build
on fuzzy and artificial neural network (HFANN). Information Gain and three popular social sites are used to
collect information depicting features that are then used to train and test the proposed methods . This neoteric
approach combines the advantages of ANN and Fuzzy sets in classification accuracy with utilizing social data
and knowledge base available in the hate lexicons.
Millenial Mythology: Putting suppositions to the test in an academic library, from Pascal Lupien, Academic Liaison Librarian, University of Guelph, and Randy Oldham, System Support Technician, University of Guelph; Presented at Computers in Libraries Conference 2008
Social Networking in Libraries: Do Students want Librarians in Their Turf?Jenny Emanuel
The document discusses a study conducted on whether students want librarians involved in their social networks. A survey of 50 students at the University of Central Missouri found that 80% had social media accounts but only 34% would add a librarian as a friend. While some students were open to receiving library resources through social media, focus group discussions revealed that students see social media as personal space and do not want authority figures to have access to personal details. The conclusion is that libraries should have a presence on social media but not force interaction, and it's important for librarians to maintain a hierarchical relationship with students.
The document discusses an action research project that evaluated academics' views of an academic librarian's role and investigated ways to promote partnerships between librarians and faculty. Semi-structured interviews found that academics viewed the librarian's role as either reactive, supportive, or an equal partner. Follow-up one-on-one and group sessions with academics led to new plans for integrating information literacy instruction into courses. While the sample was too small to generalize, questionnaires indicated the sessions positively changed academics' views of the librarian's role and generated new ideas about how the library could support their courses.
Really do university students believe that facebook is a useful tool to mobil...BO TRUE ACTIVITIES SL
The use of information and communication technologies pervades our lives. A specific type of social media that is playing a crucial role in this upsurge of participation in cyber-collective social movements (CSMs) is the social networking sites (SNS). We employ an extended model from the Unified Theory of Acceptance and Use of Technology (UTAUT) as our theoretical framework to understand student perceptions of SNS use expectations (performance expectancy and effort expectancy), social acceptance (social influence), and their perceptions about resource availability (facilitating conditions) for expressive social participation. This extended model introduces social variables (SNS mobilization effort and offline civic participation) that researchers have identified as important in explaining behaviors. In doing so, it advances a model of how activities in the online domain can ‘spill’ over to the offline domain. We have provided empirical support for the applicability of UTAUT to the expressive participation in CSMs via a survey of 214 SNS users. Our results confirm that expectancy and social influence significantly affect student intentions to use SNS for expressive participation in CSMs. Likewise, SNS mobilization effort emerged as a strong significant predictor of both intention and the use of SNS for expressive participation, but not for offline civic participation. Last, the use of SNS for expressive participation was a significant predictor for offline civic participation, which suggests that users who publicly express their socio-political opinions in SNS are more likely than others to participate in demonstrations.
Cj525 unit4 dqtopic #1 the research literature reviewparSONU61709
The document discusses two parts of a discussion question for a course on criminal justice. Part 1 asks the student to describe their systematic search process for prior research on their topic, including keywords, databases, and filters. Part 2 asks the student to analyze and critique four studies on the use of the Incident Command System, identifying strengths and weaknesses and discussing themes. The student responds by outlining their search process and criteria for domestic violence in police agencies and reviews the four studies presented, noting strengths and weaknesses of methodology and findings.
Human: You are an expert at summarizing documents. You provide concise summaries in 3 sentences or less that provide the high level and essential information from the document. Summarize the following document.
S16_MAP_Using Data Science to Model Relationships Between Educational Levels ...Peiyun Zhang
This project aims to model relationships between educational levels and crime rates in New York City and St. Louis using machine learning techniques. The team will analyze data from the NYPD Stop, Question, and Frisk database, New York City Department of Education, St. Louis Police Department crime files, and Missouri education data to develop statistical models and interactive visualizations exploring the potential connections between education and crime rates. Each team member brings relevant coursework in mathematics, statistics, and computer science to apply statistical and coding skills to interpret the datasets using R software.
Forecasting General Election Results in Poland 2011 on the Basis of Social Me...Pawel Kuczma
This document summarizes a study that analyzed social media content from Poland during the pre-election period in 2011 to predict the results of the country's general election. The study found that the amount and sentiment of content about different political parties on blogs and forums correctly identified the top two parties that went on to gain the most votes. Quantitative analysis showed the most discussion was on blogs and forums, while qualitative analysis found content focused more on essential policy areas than just media topics. The results supported using social media content analysis to forecast election outcomes. Further research is needed to better understand influencers and advance sentiment analysis techniques.
This document summarizes interviews conducted with researchers and librarians in biomedical sciences about their use of digital technologies for scientific work. Researchers primarily use traditional databases like PubMed but have little awareness of open science resources. They disseminate work through traditional publications but are unsure when sharing data is appropriate. Evaluation of work focuses on impact factors but understanding of bibliometrics is lacking. Interviewees identified needs for improved data management skills, understanding open science, evaluating scientific quality, and adopting social networks for dissemination. Overall, training is needed to help researchers see value in participatory digital scholarship.
This document provides an overview of qualitative research methods, with a focus on document analysis and using secondary data sources. It discusses that qualitative research aims to understand why and how through exploratory analysis of words and context. Document analysis involves systematically analyzing documents to identify themes and patterns. Secondary data sources for qualitative research can include archives, academic papers, government reports, newspapers, media, websites, blogs, and social media. The benefits and challenges of using different data sources like newspapers and social media in criminology and policing research are also reviewed.
Predicting Response Mode Preferences of Survey RespondentsMickeyJackson3
This document compares different methods for predicting survey respondents' mode preferences in a mixed-mode survey. It finds that traditional regression, random forests, and model-based recursive partitioning all perform similarly well at identifying respondents who disproportionately prefer paper surveys to web surveys. Targeting paper surveys only to the estimated 35% most likely to prefer paper could increase initial response rates by 3-4 percentage points compared to using only web, or 1-2 points compared to random paper assignment.
Influence of internet and social media on citizens’ political choicesPawel Kuczma
Presentation by Pawel Kuczma, Institute of Journalism, University of Warsaw presented at General Online Research Conference - GOR 14, 5-7 March 2014Cologne University of Applied Sciences, Germany
Subconscious Crowdsourcing: A Feasible Data Collection Mechanism for Mental D...Elvis Saravia
1) The document proposes a method called "subconscious crowdsourcing" to collect social media data from users with mental disorders in order to build predictive models for mental disorder detection.
2) It extracts linguistic and behavioral features from Twitter data like emotion transitions and social interactions to train models for bipolar disorder and borderline personality disorder classification.
3) Experimental results show the TF-IDF model achieves the best performance in 10-fold cross validation tests and addresses the selection bias problem of prior work by detecting actual disorder sufferers rather than just those discussing mental health topics.
The biometric network system developed by Semlex (BNS) centralizes all biometric information in order to produce and organize the issuance of all national documents needed by the State.
As oil prices continue to drop, most energy companies are looking at their space needs and responding in one of three ways. See more at http://bit.ly/1lJfyb0
Google docs allows users to send feedback by writing, saving, and sharing their feedback using the online document editor. Users can write up their feedback, save it in their Google drive, and then share it with the relevant parties. Once shared, the feedback process is complete.
This document is a resume for Alexander Maule seeking a position as a Project Manager/Estimator. It summarizes his education in Construction Management from South Dakota State University, previous work experience as a Project Manager/Estimator and Heavy Machinery Operator for Knife River Co., and lists the transferable skills and community service he can offer.
The document provides instructions for a Valentine's Tribute Poetry Contest. Students are prompted to write a poem expressing their love or admiration for a non-living object. The document gives examples of tribute poems and guides students through brainstorming, writing, and revising their own poems to perform for the contest. Students are encouraged to use literary devices like similes, metaphors, personification and rhyme scheme.
La estudiante Jenny Barrionuevo Mejía presenta un resumen sobre el Sistema Nervioso Autónomo (SNA) para su clase de Fisiología en la Facultad de Ciencias de la Salud de la Universidad Técnica de Ambato en Ecuador, bajo la guía del Dr. Gustavo Moreno.
Cognizant_Introduction to management consulting in Switzerlandaudrey miguel
Cognizant is launching management consulting services in Switzerland to help clients with strategy, business transformation, customer relationships, and risk management. Since 2004, Cognizant has provided these services primarily to banking, financial services, and insurance clients. The document outlines Cognizant's five specialized consulting practices and experience assisting clients with regulations like IFRS 9, Basel III, BCBS 239, and PRIIPS.
The document discusses how the media product challenges conventions of horror films. Specifically:
- It shows the identity of the killer ghost girl early on, leaving the audience to wonder who she is and why she kills.
- It uses the point-of-view shot from the killer's perspective, which is uncommon as POV shots usually show the victim's perspective.
- Lighting and a night effect were used to create an eerie feeling and follow the horror convention of scenes being set at night.
- Shots from CCTV footage were included to further challenge conventions by showing both the footage and the security guard watching it.
Airbnb is an online marketplace that connects people who want to list space in their homes to travelers looking for accommodations. It began in 2007 as a way for hosts to rent out air mattresses in their homes. Over time, it grew into a global platform focused on enabling a sense of belonging through travel. Airbnb redefined its mission in 2014 to focus on cultural experiences beyond just accommodations. It launched new services like Experiences and Places to help travelers immerse themselves in local cultures through activities and destinations recommended by hosts. Airbnb's brand is centered around the concepts of belonging, adventure, and authenticity to fulfill people's basic need for connection and create memorable cultural experiences outside the standard tourism model.
The document outlines the development of the Second Party System in the United States between 1828-1854, including the decline of the Federalist party and the rise of the Whig and Democratic parties. It describes the Whig party as aristocratic and in favor of the American System and anti-slavery, while the Democratic party appealed more to the common man and included many pro-slavery members who supported states' rights. Key leaders of each party like Henry Clay, Daniel Webster, and Andrew Jackson are also mentioned.
The document summarizes ancient Egyptian civilization. It describes how the Egyptians relied on the Nile River for survival, developing irrigation systems and geometry. Egyptian society was stratified with pharaohs and nobles at the top. The Old Kingdom saw construction of the pyramids, while the Middle Kingdom expanded Egypt's territory. The New Kingdom included female ruler Hatshepsut and military leader Thutmose III, who grew the empire through conquest. Two notable pharaohs were religious reformer Akhenaten and the young King Tut. By the late New Kingdom, Egypt's power declined as it lost control of its empire and territory.
Rockit Summit, Rares Florea - Wearables in 2016: Context, Trends and Opportun...Rockit Conference
The document discusses trends in the wearable technology market. It notes that the global wearable market is estimated to reach $1.6 trillion by 2020. It also mentions that adoption of smartwatches is predicted to be twice as fast as smartphones. The document reviews market segments for wearables and provides an overview of the Vector smartwatch, including its features, operating system, and value proposition. It closes by discussing future opportunities in wearable technology.
This document outlines the stages for completing a Scratch project. It includes 6 stages: 1) deciding on an idea, 2) planning, 3) development, 4) testing, 5) evaluating, and 6) feedback. Some examples of past student projects include a virtual aquarium, house made of shapes, and car maze game. The goals are to understand programming is done in stages, and to analyze, design, create, test, and evaluate a Scratch project.
The Missouri Compromise of 1820 allowed Missouri to enter the union as a slave state while Maine entered as a free state. It also prohibited slavery in any new states north of the 36°30' parallel, helping to balance the number of free and slave states in the nation for a time.
This document provides tips for data scientists on preparing for and passing a hiring interview. It discusses that data scientists need a strong academic background in areas like math, statistics, and computer science, as well as skills in communication, curiosity, storytelling, and creativity. It recommends continuously learning new technologies through online courses, white papers, conferences, and communities. Other tips include keeping profiles up to date, building a network, customizing applications, and practicing interview questions and techniques like maintaining eye contact and asking questions. The document stresses that the best approach is to show previous work through competitions, samples, or trials rather than relying solely on an interview.
Viller Hsiao presents information on Linux vsyscall and vDSO. vDSO (virtual dynamic shared object) is mapped into userspace and contains implementations of common system calls to make them faster. It gets benefits from ASLR and allows additional system calls compared to the older vsyscall method. The kernel generates the vDSO shared object which is then loaded and accessed by the glibc dynamic linker to provide optimized system call implementations to applications.
IAB - The CMR Agency | gdpr introduction for marketeers The CMR Agency
Presentatie van The CMR Agency op de IAB ledenvergadering januari 2017 over de bedreigingen en kansen die de nieuwe Europese privacy wet AVG/GDPR met zich meebrengt voor het gebruiken van persoonlijke data van klanten en consumenten.
Imad Naser Shadid is a Jordanian statistician and instructor based in Sharjah, UAE. He holds an MSc in Mathematical Statistics from Middle East Technical University and has over 25 years of experience teaching statistics and conducting research. His career includes positions as an instructor at several universities in Jordan, Libya, UAE, and as a statistician and researcher for the Sharjah Chamber of Commerce. He is currently an instructor of statistics at Ajman University of Science and Technology and has taught courses in introduction to statistics, mathematical statistics, sampling techniques, and business statistics.
The document discusses various user research methods used in task analysis including surveys, interviews, focus groups, ethnography, and user research. It then defines personas as composite profiles of typical users, provides an example persona, and explains why personas are used. Scenarios and use cases are described as specific stories and step-by-step descriptions of how personas accomplish tasks. Hierarchical task analysis and requirements definition are also summarized as breaking down tasks into sub-tasks and defining the requirements personas need to achieve their goals.
Week 2 - What is Social Research & Planning a Research Project.pptxNathan Kerrigan
This document provides an overview of key concepts in social research. It discusses what social research is, why it is conducted, and its various elements and processes. Some key points covered include:
- Social research draws on social sciences and allows the study of everyday life from new perspectives.
- The research process involves developing research questions, reviewing literature, selecting methods, collecting and analyzing data, and writing up results.
- Research can take quantitative, qualitative, or mixed-methods approaches across a range of designs like experiments, surveys, case studies, and comparisons.
- Researchers must consider ontology, epistemology, and theory in designing their approach.
- Developing a clear research question is important for
This document provides an overview of quantitative research approaches. It discusses the use of theories and variables, including independent, dependent, mediating, moderating, and control variables. It also covers research questions, strategies like surveys and experiments, and methods of data collection including questionnaires, structured observations, and interviews. Experiments are described in detail, including components, threats to validity, and procedures. The goal of quantitative research is to test or support hypotheses and theories through objective and systematic data collection and analysis.
Developing media literacy indicators for EuropeMonica Bulger
This document discusses testing and refining criteria to assess media literacy levels in Europe. It outlines the objectives to develop a tool to measure media literacy across age groups and countries. The approach includes reviewing literature, validating measures statistically, testing the tools, and providing recommendations. It identifies challenges in connecting individual and country-level measures and in measuring critical media analysis. The process of validation involves mapping indicators to data, identifying gaps and redundancies, and proposing a more focused set of variables. Recommendations include additional measures of credibility evaluation and critical understanding.
The ABCI anti-bullying initiative seeks to develop a school-community partnership to report and eliminate bullying through identifying all forms of bullying and aggressive behavior. The program goals are to send a clear message that bullying won't be tolerated, empower students to prevent bullying, create a program for stakeholders to prevent bullying, promote a sense of belonging, and provide intervention for bullies and bullying victims. Data collection methods will include interviews, observations, surveys, discipline and counselor referrals, and attendance data. Analysis will use coding, identifying themes, t-tests, chi-squares, and Pearson's correlation. Threats include lack of funding, human error, and poor survey response rates. Findings will be shared through the school
The document discusses planning a research study, including identifying the target population and sample, deciding on the appropriate level and size of sampling, and selecting appropriate data collection methods. Some key points covered are:
1) Researchers must identify the target population and determine whether to study individuals, organizations, or a combination. They must also decide how many people or organizations to include in the sample.
2) Researchers select a sampling method depending on rigor needed, population characteristics, and participant availability. Common methods include simple random sampling, stratified sampling, cluster sampling, and convenience/snowball sampling.
3) Researchers identify what data needs to be collected to measure the study variables. Common methods are tests, questionnaires, interviews, observations
Jessica Lee Drum is a PhD candidate in Community Psychology at Wichita State University. She has extensive experience in program development, evaluation, prevention research, and teaching. Her research focuses on relationships, social networks, computer-mediated communication, and health factors. She is currently the primary investigator on a project examining how social media undermines romantic commitment and a co-investigator on a project assessing campus sexual assault perceptions. Drum has authored several journal publications and presentations and teaches courses in research methods, social psychology, and personality psychology.
A description of my research on the effects of open access on monographs. I have examined the effects on sales, usage by developing countries, the role of open licenses, and citations/altmetrics.
The sheets contain links to the articles, which are freely available online.
The document summarizes a study that evaluated two design interventions - goal reminders and removing the newsfeed - for supporting self-control on Facebook. The study found that both interventions reduced the amount of time spent and passive use of Facebook. Goal reminders led participants to question their reasons for using Facebook and engage in more active and intentional behaviors. Removing the newsfeed decreased browsing and passive behaviors like scrolling. Some effects of the interventions persisted after they were removed, such as maintaining habits of reflecting on intentions before using Facebook. The study provided insights into how interface designs could help users regain control over social media use.
Experimental research designs aim to test hypotheses by manipulating variables and observing the effects of the changes. There are different types of experimental designs such as pre-experimental, true experimental, and quasi-experimental designs which vary in how tightly they control variables and the strength of conclusions that can be drawn. The goal of experimental designs is to establish causal relationships between independent and dependent variables through control and random assignment.
"The Influence of Online Studies and Information using Learning Analytics"Fahmi Ahmed
This research will help people with inadequate knowledge to get
a better understanding of online study or e-learning. Through this
study, the social impact of online users or learners can be
increased, and the users can have a clear idea of online study. In
this research, the graphs will be presented according to country,
gender, age, online resources, etc. showing the impact of online
study and information on online users. The learners will get an
understandable knowledge of the type of sources, what is their
purpose, and resources people can use in online study. From this,
the learners will get a guide or path that how easily they can learn
online for study in a more flexible way. The outcomes are
visualized using the R language and Tableau with pre-processed
data.
4th OpenAIRE Workshop - Legal and Sustainability Issues for Open Access Infrastructures
Nov. Vilnius
Preliminary Results of the OpenAIRE Sustainability Study - Phoebe Koundouri, Associate Professor - Athens University of Economic and Business
EVERFI Webinar: Building Your Exemplary Sexual Assault Prevention Plan: Real-...Michele Collu
This document provides information from a summit on building exemplary sexual assault prevention plans. It includes sections on institutionalization at Williams College, critical processes at Rutgers University, and programming at Dartmouth College. Each section describes specific prevention strategies, resources, and initiatives used at the respective institutions. The final section introduces the Campus Prevention Network, which aims to support colleges through professional development, research-based guidance, and benchmarking of prevention efforts.
Poster presentation of 'Socialoscope: Sensing User Loneliness and Its Interactions with Personality Types' for Graduate Research Innovation Exchange at Worcester Polytechnic Institute.
The document outlines a proposed sex education program for adults that takes a feminist perspective and focuses on consent, with the goals of providing scientific information about sexuality and relationships, discussing communication and consent, and empowering participants to advocate for social change. It details the program's structure, topics, activities and assignments across its 8 weekly sessions. Evaluations of the initial design suggested expanding assessments to all participants and better justifying assignments.
There are many applications of social media outreach, and this session will look at its application to non-profit objectives such as public relations, constituency building, citizen engagement, health behavioral change campaign, or fundraising.
The workshop will comprise presentations with case studies, one paper-based exercise, and open question time. We wish to run a needs assessment before the workshop to ensure the workshop meets participants' expectations.
The workshop will provide participants with a brief overview of communication models, social media trends, and a bigger picture view on how social media has changed the rules of online engagement. It will help participants better appreciate social media, assess its pros and cons, and evaluate if their organization should use or expand the scope of their social media activities.
Topics will include background information on social media; how traditional (one-way) communication paradigms no longer work in interactive media; and how two-way communication models operate online.
A key focus will be to help organization evaluate the pros and cons of social media, and then assess if social media offers any benefits to their organization. Participants will be asked to assess how social media can advance their organization's mandate, whether it is a viable channel for their constituents, its pros and cons for their situation, and then to review other relevant assessment criteria. Midway through the workshop, participants will be invited to complete a paper-based form to help them assess if social media offers enough benefits for their organization to adopt or expand the scope of their social media outreach.
The remainder of the presentation will focus on practical guidance for organizations that wish to implement or expand the scope of their social media outreach. Topics covered will include reassessing organizational goals; researching constituents; starting an incremental approach to social media outreach; defining the scope of your social media activities; mainstreaming into institutions; daily operations; responding protocols; institutional policies; tools of the trade; and methods for prioritizing resource allocations.
1) The study aims to determine if personal learning networks (PLNs) built using Twitter can support teachers' individual professional development needs. Teachers will develop PLNs over six weeks to support goals related to improving their practice.
2) Data collection includes analyses of teachers' Twitter feeds, focus group interviews, meetings between the researcher and teachers, and a final survey. The researcher will code and analyze qualitative data for themes about how teachers used their PLNs and their perceptions of Twitter for professional learning.
3) Findings may provide implications for using informal learning theories and PLNs to individualize professional development for teachers.
This is a 2-hour presentation and workshop given to the residents at Boston University as part of the Dental Public Health program. Topic presents one of the useful tools for program planning and evaluation in any field. A list of useful websites for online courses and worksheets are provided at the end.
ACTIVITY 1
Chosen Research Design: Qualitative
Why do you think this design is appropriate to your research interest?
Based on my understanding of qualitative research, I believe it can be appropriate for certain types of research questions. In my view, qualitative research is particularly useful for exploring complex phenomena, gaining insights into people's experiences and perspectives, and developing theory. I also recognize that it can be valuable in applied settings, such as healthcare or social work, where understanding people's experiences is crucial for improving practice.
Guide Questions
1. Did you remember the research design listed in the table?
YES, I have remembered all the research design listed in the table.
2. What other research designs did you recall which is/ are not listed in the table?
Longitudinal Study
Cross-sectional Study
Survey Research
Action Research
Participatory Action Research
Grounded Theory
Ethnographic Research
3. Was it easy or hard to determine the research design to be used in your selected topic or interest?
For me, it is easy because in the first place I already have an idea where to start. I believe when you select a topic, you already considered what design you will use.
4. What are the factors that you consider in selecting a research design for your study?
As a researcher, I must consider various factors when selecting a qualitative research design for my study. These include the research question, the purpose of the study, the nature of the phenomenon being studied, and the available resources and time frame. Additionally, I must reflect on my own philosophical and theoretical perspectives to ensure that the chosen design aligns with my worldview and research goals.
Reflection
How does research design make your study colorful/ interesting?
As a researcher, I have come to appreciate how qualitative research design can add color and interest to a study. By using methods such as open-ended interviews, observations, and document analysis, I can capture the rich and complex experiences, perspectives, and contexts of the participants. This type of research allows me to delve deeper into the phenomenon being studied and gain a more nuanced understanding of it.
One of the benefits of using qualitative research is the ability to create vivid descriptions, quotes, and narratives that add depth and meaning to the study. It's fascinating to see how the data can come to life and offer a unique perspective on the topic. Additionally, I've found that unexpected findings often emerge during qualitative research, which can add to the intrigue and interest of the study.
Overall, I believe that qualitative research design offers a powerful way to explore the intricacies and nuances of human experience. It enables me to create a study that is more compelling and engaging, as well as provides insights that cannot be obtained through other research methods.
ACTIVITY 2: TELL ME THE QUANTITY
Directions: Read the qu
This document describes a study that investigated developing a smartphone app called Socialoscope that can passively detect loneliness in users based on their social interactions and smartphone usage as sensed by the phone's sensors. The study collected smartphone usage data and survey responses from 9 participants over 2 weeks. It analyzed correlations between various smartphone usage features and scores on loneliness and personality questionnaires. Machine learning classifiers were developed and evaluated to detect different levels of loneliness while accounting for differences in personality traits. The goal was to intelligently detect lonely users and help address the negative impacts of loneliness.
This document describes Pathlet Routing, an alternative routing protocol proposed to address scalability and multipath routing issues with BGP. Pathlet Routing constructs pathlets, which are sequences of virtual nodes (vnodes) leading to a destination. Routers exchange pathlet information using a path vector algorithm similar to BGP. This allows multiple pathlets to a destination for traffic engineering. The document outlines the key components of Pathlet Routing, including an implementation with routers running pathlet dissemination and a controller determining path installation. It provides timelines for scaling the implementation and comparing it to BGP behavior.
The document summarizes the history and details of the Christmas Tree worm, one of the earliest computer worms. It spread via email in 1987 by sending itself as a Christmas greeting card. Though intended as a harmless Christmas tree screen display, it overloaded networks by replicating to every email contact. This unintentionally denied service and brought down the IBM and BITNET networks for a period. Countermeasures involved manually purging the worm from network queues. It highlighted worms as a new computer security threat and sparked debate on how to classify such self-replicating programs.
This document provides information about a student paper competition exploring unknown areas of electronics, computer, and IT engineering. Students are invited to write papers not exceeding 20 pages to present new knowledge in these fields. Papers must follow IEEE formatting standards and include the author's name, college, and contact details. Selected teams will participate in an interview round and give a 15-minute presentation followed by questions from judges. The event requires one classroom with benches, a projector, and 6 volunteers including two student leaders who provide their contact information.
This document summarizes 7 experiments conducted to design and test a user-friendly online quiz interface. The experiments focused on domain analysis, conceptual modeling, screen design effectiveness, direct and indirect manipulation strategies, human consideration factors, menu types, window selection, and screen navigation/flow. The goal was to reduce cognitive workload and ensure intuitive, predictable, and visually pleasing interaction for users with only basic English skills.
The document summarizes a presentation on a Skill Set Assessment System created for a company. The system comprehensively assesses employees' skill sets through online exams. It is integrated with the company's learning management system and can be used to analyze employee performance for appraisals. The system has administrative and user modes, supports different question formats and papers, and allows scheduling exams, viewing results, and registering users. It was created using the MVC architecture pattern in Visual Studio with a .NET Framework and SQL Server backend.
Automatically Characterizing Places with Opportunistic CrowdSensing using Sma...Gauri Pulekar
This document summarizes research on automatically characterizing places using opportunistic crowdsensing with smartphones. A framework called CrowdSense@Place uses sensors like GPS, WiFi, microphones and cameras on smartphones to collect location data and audio/visual hints about places. These hints are classified to identify place categories like restaurants, shops etc. Evaluations with 36 users across 1300 places achieved 69% accuracy in place categorization. While effective for analyzing large-scale patterns, limitations include slow learning rates, energy usage and privacy concerns when collecting and sharing sensor data.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
2. Loneliness And The Hype Around It!
Man is a social animal
Rewarding social
contact and
relationships [33]
April 4, 2016 Worcester Polytechnic Institute 2
Effects of Loneliness:
Increasing levels of stress
Anxiety, panic attacks
Drug or alcohol addiction
Depression
3. Why Is Loneliness Increasing At An Alarming Rate? [32]
Increasing rates of
divorce
Early deaths that leave
the significant other
alone
Longer working hours
April 4, 2016 Worcester Polytechnic Institute 3
Older adults
Loss of a spouse, loss of friends
Distant family members, health
issues and age
International students
Distant family members, culture
shock
4. How Is Loneliness Tackled Today? How Efficient Are These
Methods? [32, 34]
Psychotherapy:
Use of psychological
methods based on regular
personal interaction to help a
person change and overcome
problems
Types: Group, Artistic,
Cognitive-behavioral
April 4, 2016 Worcester Polytechnic Institute 4
Reasons for inefficiency:
Reach less than half of those
afflicted with loneliness
worldwide
Social stigma associated with
mental disorders
Lack of resources
Lack of skilled therapists
Misdiagnosis
6. Objective Of Socialoscope
Mobile app that passively detects loneliness in smartphone users based on the
user’s social interactions sensed by the smartphone’s built-in sensors
Phone calls, text messages, Wi-Fi, Bluetooth, web browsing and app usage
Are certain personality types more prone to loneliness?
Potentially large impact of ubiquitous ownership of smartphones
Cost effective
Global reach
Feedback to users, help in tracking activity, therapist monitoring
April 4, 2016 Worcester Polytechnic Institute 6
7. Hypothesis [23]
Decrease
in the
number
of calls
and
messages
‘I have
nobody
to talk to’
April 4, 2016 Worcester Polytechnic Institute 7
High usage
of social
media, and
low usage of
calls and
messages
‘My social
relationship
s are
superficial’ Reduced
calls and
messages
incoming
from
contacts
marked as
favorite
‘I feel shut
out and
excluded by
others’
Loneliness is generally related to:
- Communications with people you feel connected with
- Proximity with people you feel connected with
8. Goal Of Socialoscope
1. Investigate what sensed smartphone features are statistically correlated with
loneliness questions on the clinically validated UCLA loneliness scale
2. Extend the list of features explored by prior work on smartphone loneliness
and personality sensing
3. Explore whether smartphone sensed loneliness is correlated with the Big-Five
personality types
4. Synthesize machine learning classifiers
5. Research, develop and evaluate the intelligent Socialoscope smartphone
application
April 4, 2016 Worcester Polytechnic Institute 8
10. Related Work: Sociometer & SociableSense
Sociometer: [19,20]
Wearable IR based device
Creates models of human
communication networks to
identity leaders and connections
Communicates only with another
individual wearing the same
device
Power consumption, limited
distance and obstacle hindrances
April 4, 2016 Worcester Polytechnic Institute 10
SociableSense: [22]
Detects the sociability levels,
strength of relations with
colleagues
Uses Accelerometer, Bluetooth,
microphone
11. Related Work: StudentLife, Vive [25], Chittaranjan et al [28]
April 4, 2016 Worcester Polytechnic Institute 11
StudentLife: [23]
Correlates sensor data from smartphones
with mental wellbeing and academic
performance
Performs activity detection, conversation
detection and sleep detection
Based on UCLA loneliness scale
Vive: [25]
Detects loneliness levels in older adults
Gives encouragement messages to boost
morale
Chittaranjan et al: [28]
Detects relationship between smartphone
usage and self-perceived personality type
Based on Big-Five personality traits
13. Our Approach
Build data gathering tools
Run study to gather data
Analyze collected data
Train machine learning classifiers
Use best classifiers to build machine learning app
April 4, 2016 Worcester Polytechnic Institute 13
14. Mobile App
Automatically monitor various user
activities through smartphone sensors,
communication and interactions of
users
April 4, 2016 Worcester Polytechnic Institute 14For illustration purposes
15. Feature List
April 4, 2016 Worcester Polytechnic Institute 15
Data Type Measured By What it measures
Phone Calls
Call count If user has any phone communication channel
Call type If the user is the one calling or receiving calls, or is
trying to avoid calls
Call from/to If user has any phone communication with favorite
contacts
Call duration If user has any prolonged phone communications,
or keeps them to the minimum
16. Feature List
April 4, 2016 Worcester Polytechnic Institute 16
Data
Type
Measured By
SMS SMS count
SMS character count
SMS from/to
SMS type
App No of launches
App duration
App category
Emails Number of emails
Data Type Measured By
Bluetooth No of unique BT IDs
No of times saved BT IDs are seen
Duration of availability
Wi-Fi No of SSIDs
Duration of SSIS connectivity
Type: Public/Home/Work
Browser Browser favorites
Browsing time of day
Browsing duration
17. Pilot Study
Android app automatically sensing and
recording smartphone data
Using Funf in a Box [26]
Implemented social media usage,
starred contacts, browser usage, app
usage
Uploaded to a Dropbox account daily
April 4, 2016 Worcester Polytechnic Institute 17
18. Pilot Study
2 weeks
SONA Participant Pool, Publicity,
StudentLife, MechTurk
Target: 30+ users, Current: 9
Demographics:
6 males, 3 females
9 international students
9 graduate students
Age range: 23 – 28 years
April 4, 2016 Worcester Polytechnic Institute 18
19. Personality Detection
A one-time personality detection survey
Based on Big-Five Personality Traits [25]
Extraversion, Agreeableness, Conscientiousness, Neuroticism, Openness to experience
Provided using WPI Qualtrics
50 questions
I am the life of the party
I feel comfortable around people
April 4, 2016 Worcester Polytechnic Institute 19
21. Loneliness Detection
A daily user survey which would take user’s input on his projection of his
loneliness levels
Based on the UCLA Loneliness Levels [21]
Scale to measure one’s subjective feelings of loneliness and social isolation
Provided using WPI Qualtrics
20 questions
How often do you feel that you lack companionship?
How often do you feel outgoing and friendly?
April 4, 2016 Worcester Polytechnic Institute 21
22. UCLA Loneliness Scale - Version 3 [21]
April 4, 2016 Worcester Polytechnic Institute 22
24. Analysis Steps
April 4, 2016 Worcester Polytechnic Institute 24
Pre-
Processing
Compute
loneliness
scores,
personality
scores,
decryption
Feature
extraction
Features are
extracted from
the sensed
data, averages
and moving
averages are
computed.
Statistical
analysis
• Correlation
based feature
selection
• Good feature
subsets contain
features highly
correlated with
classification,
yet uncorrelated
with each other.
[37]
Synthesize
machine
learning
classifiers
• Most
correlated
features
• Weka Machine
Learning
library
• Various types
of classifiers
are compared
Develop the
Socialoscope
Intelligent
Smartphone
app
Synthesized
classifiers are
added to an
Android sensing
app
Message log, Call
log, Bluetooth,
Contacts, Browser
Usage
27. Analysis Steps
April 4, 2016 Worcester Polytechnic Institute 27
Pre-
Processing
Compute
loneliness
scores,
personality
scores,
decryption
Feature
extraction
Features are
extracted from
the sensed
data, averages
and moving
averages are
computed.
Statistical
analysis
• Correlation
based feature
selection
• Good feature
subsets contain
features highly
correlated with
classification,
yet uncorrelated
with each other.
[37]
Synthesize
machine
learning
classifiers
• Most
correlated
features
• Weka Machine
Learning
library
• Various types
of classifiers
are compared
Develop the
Socialoscope
Intelligent
Smartphone
app
Synthesized
classifiers are
added to an
Android sensing
app
Message log, Call
log, Bluetooth,
Contacts, Browser
Usage
33. Results
Feature Correlation
Coefficient
Standard error of
correlation
coefficient
T-score p-Value Significance at
p < 0.05
Number of calls -0.626 0.07003 -8.939 < 0.00001 Significant
Number of messages -0.793 0.05468 -14.5025 < 0.00001 Significant
Number of browser searches 0.471 0.079 5.9620 < 0.00001 Significant
Number of auto-joined Wi-Fi
SSIDS
-0.3087 0.08541 -3.6146 0.00437 Significant
Percentage of missed calls 0.3262 0.08489 3.84262 0.000193 Significant
Difference in outgoing and
incoming messages
0.3384 0.084504 -4.00454 0.000107 Significant
April 4, 2016 Worcester Polytechnic Institute 33
35. Research Progress
Build data gathering tools
Run study to gather data: SONA, Publicity, MechTurk,
StudentLife
Analyze collected data: Modules made to analyze data from all
sources
Train machine learning classifiers
Use best classifiers to build machine learning app
April 4, 2016 Worcester Polytechnic Institute 35
37. Future Work
Feedback to users
Encouragement messages
Tracking
Feedback to close ones
Parents of international students
Children to old adults
Therapist, psychologists, psychiatrists
Tracking activity
Helps to backtrack during consultation
April 4, 2016 Worcester Polytechnic Institute 37
38. Conclusion
Loneliness increases at an alarming rate
Proposed Socialoscope, a smartphone app that passively monitors users’ social
activity and loneliness
Explore previously discovered relationships between personality and loneliness
April 4, 2016 Worcester Polytechnic Institute 38
39. References
1. N. D. Lane, M. Mohammod, M Lin, X Yang, H Lu, S Ali, A Doryab, E Berke, T Choudhury, A T. Campbell, “BeWell: A Smartphone Application to Monitor, Model and Promote
Wellbeing", in Proc. Pervasive Health Conference 2011, May 2011, pp. 23-26.
2. H Lu, W Pan, N D. Lane, T Choudhury and A T. Campbell, “SoundSense: Scalable Sound Sensing for People-Centric Applications on Mobile Phones”. In Proc MobiSys 2009
(2009), 165-178.
3. N. Eagle, A. Pentland, and D. Lazer, "Inferring Social Network Structure Using Mobile Phone Data”, in Proc National Academy of Sciences (PNAS) Vol. 106(36), pp. 15274-
15278.
4. M C Gonzalez, C Hidalgo and A Barabasi (2008), “Understanding individual human mobility patterns”, Nature 453 (7196), 779-782.
5. D. Olguin, P. Gloor, and A. Pentland (2009), “Capturing Individual and Group Behavior Using Wearable Sensors”, in Proc AAAI Spring Symposium on Human Behavior
Modeling, Palo Alto.
6. T. Abdelzaher, Y. Anokwa, P. Boda, J. Burke, D. Estrin, L. Guibas, A. Kansal, S. Madden, and J. Reich (2007), “Mobiscopes for human spaces”, in IEEE Pervasive Computing, pp
20-29.
7. S. Avancha, A. Baxi, and D. Kotz (2012), “Privacy in mobile technology for personal healthcare”, ACM Computing Surveys.
8. N. Christakis and J. Fowler (2007), “The spread of obesity in a large social network over 32 years”, New England Journal of Medicine, 357(4):370.
9. N. Christakis and J. Fowler (2008), “The collective dynamics of smoking in a large social network”, New England Journal of Medicine, 358(21):2249.’
10. J. Fowler and N. Christakis, “Dynamic Spread of Happiness in a Large Social Network: longitudinal analysis over 20 years” in Framingham Heart Study British Medical Journal.
April 4, 2016 Worcester Polytechnic Institute 39
40. References
11. K. George, D.G. Blazer, D.C. Hughes, and N. Fowler (1989), “Social Support and the Outcome of Major Depression”, in British Journal of Psychiatry, vol. 154. No. 4, pp 478.
12. George Forman (2003), “An extensive empirical study of feature selection metrics for text classification”, Journal of Machine Learning Research 3, 1289-1305.
13. “AudioRecord Android Media Recording”, http://developer.android.com/reference/android/media/AudioRecord.html
14. M Hojat, Loneliness as a function of selected personality variables, Journal of Clinical Psychology, Volume 38, Issue 1, pages 137–141, January 1982.
15. “Android Service Component”, http://developer.android.com/guide/ components/services.html
16. T Choudhury, A Pentland (2004), “Characterizing Social Networks using the Sociometer”, in Proc NAACOS 2004.
17. T Choudhury, A Pentland (2002), “The Sociometer: A Wearable Device for Understanding Human Networks”, In Proc CSCW 2012.
18. A Ghose, C Bhaumik and T Chakravarty (2013), “BlueEye - A system for Proximity Detection Using Bluetooth on Mobile Phones”, in Proc UbiComp 2013.
19. K Rachuri, C Mascolo, M Musolesi, P Rentfrow (2011), “SocialableSense: Exploring the Trade-Off ofAdaptive Sampling and Computation Offloading for Social Sensing”, in Proc
MobiCom 2011.
20. R Wang, F Chen, Z Chen, T Li, G Harari, S Tignor, X Zhou, D Ben-Zeev, and A T. Campbell (2014), “StudentLife: Assessing Mental Health, Academic Performance and Behavioural
Trends of College Students using Smartphones”, in Proc Ubicomp 2014.
April 4, 2016 Worcester Polytechnic Institute 40
41. References
21. D Russell (1996), “UCLA Loneliness Scale (Version 3): Reliability, Validity, and Factor Structure”, in Journal of Personality Assessment, 66(1):20-40.
22. A Ong, B Uchino and E Wethington, “Loneliness and the health of older people” in Gerontology.
23. “Determining if one is a social butterfly”, Unpublished manuscript.
24. W Lane, C Manner, “The Impact of Personality Traits on Smartphone Ownership and Use”, Int’l Journal Business and Social Science, Vol. 2 No. 17.
25. G Chittaranjan, J BlomDaniel, and Gatica-Perez (2011), “Who’s Who with Big-Five: Analyzing and Classifying Personality Traits with Smartphones”,
in Proc ISWC 2011, Washington, DC, USA.
26. “Funf Sensing Framework”, https://code.google.com/p/funf-open-sensing-framework/source/checkout
27. Ohmage open mobile data collection platform, http://ohmage.org
28. “5 Medical Technologies Revolutionizing Healthcare”by Forbes (2013), http://www.forbes.com/sites/stevenkotler/2013/12/19/5-medical-
technologies-revolutionizing-healthcare/2
29. “Top 10 Medical Gadgets” by Technology Personalized” (2012), http://techpp.com/2012/03/26/top-medical-gadgets
30. D Howard, Effect of Temperature on the Intracellular Growth of Histoplasma Capsulatum, J Bacteriol. 1967, Jan; 93 (1): 438-444.
April 4, 2016 Worcester Polytechnic Institute 41
42. References
31. “Depression Toolkit”, by University of Michigan Depression Center http://www.depressiontoolkit.org/aboutyourdiagnosis/depression.asp
32. “The Loneliness of American Society” by The American Spectator, http://spectator.org/articles/59230/loneliness-american-society
33. “Campaign to End Loneliness”, http://www.campaigntoendloneliness.org
34. “Mind for Better Mental Health”, http://www.mind.org.uk/information-support/tips-for-everyday-living/loneliness/about-loneliness
35. “Psychologist Anywhere Anytime”, "http://www.psychologistanywhereanytime.com/relationships_psychologist/psychologist_loneliness.htm
36. “Thought Catalog”, http://thoughtcatalog.com/lorenzo-jensen-iii/2015/03/36-absolutely-heartbreaking-quotes-about-loneliness
37. “Feature Selection” by Wikipedia, https://en.wikipedia.org/wiki/Feature_selection
April 4, 2016 Worcester Polytechnic Institute 42
45. Pilot Study - Security Aspects
First level of encryption encrypts all the uploaded data, and will be decrypted by
the investigators.
Second level of encryption is a one-way hash that cannot be decrypted by
the investigators
Private data like message text, website URL, message text, calling number, etc.
All the personal level information is hidden
Thus, we will have details of how many calls you made, but now which contact or number you
called
Anonymized using random user ids
April 4, 2016 Worcester Polytechnic Institute 45
Editor's Notes
When this need is not met, he feels isolated, leading to thoughts of not fitting in, not being understood, feeling empty and isolated [33].
One can be alone and very happy at the same time. Being alone, can be experienced as a positive emotion. On the other hand, one can be surrounded by people and still feel lonely.
Need to add more Stats
To increase each individual's well-being and mental health, to resolve or mitigate troublesome behaviors, beliefs, compulsions, thoughts, or emotions, and to improve relationships and social functioning.
Where did you get these hypotheses? Were they inspired
by any other sources? Citations? If not, then make it
cleaer they are yours. PEDS folks like everything cited.
.
Learning library where classification will be investigated. Various types of machine learning classifiers (SVM, Naïve Bayes, etc.) will be compared. The performance of various classifier types will be compared using standard measures such as classification accuracy, F-scores, ROC curves, and confusion matrices.
Learning library where classification will be investigated. Various types of machine learning classifiers (SVM, Naïve Bayes, etc.) will be compared. The performance of various classifier types will be compared using standard measures such as classification accuracy, F-scores, ROC curves, and confusion matrices.
S. Avancha, A. Baxi, and D. Kotz (2012), “Privacy in mobile technology for personal healthcare”, ACM Computing Surveys.
N. Christakis and J. Fowler (2007), “The spread of obesity in a large social network over 32 years”, New England Journal of Medicine, 357(4):370.
N. Christakis and J. Fowler (2008), “The collective dynamics of smoking in a large social network”, New England Journal of Medicine, 358(21):2249.’
J. Fowler and N. Christakis, “Dynamic Spread of Happiness in a Large Social Network: longitudinal analysis over 20 years” in Framingham Heart Study British Medical Journal.
“Depression Toolkit”, by University of Michigan Depression Center http://www.depressiontoolkit.org/aboutyourdiagnosis/depression.asp
“The Loneliness of American Society” by The American Spectator, http://spectator.org/articles/59230/loneliness-american-society
“Campaign to End Loneliness”, http://www.campaigntoendloneliness.org
“Mind for Better Mental Health”, http://www.mind.org.uk/information-support/tips-for-everyday-living/loneliness/about-loneliness
“Psychologist Anywhere Anytime”, "http://www.psychologistanywhereanytime.com/relationships_psychologist/psychologist_loneliness.htm
“Thought Catalog”, http://thoughtcatalog.com/lorenzo-jensen-iii/2015/03/36-absolutely-heartbreaking-quotes-about-loneliness