1 Adaptive User Profiling Carolina Bailey

Slides:



Advertisements
Similar presentations
Recommender Systems & Collaborative Filtering
Advertisements

Google Chrome & Search C Chapter 18. Objectives 1.Use Google Chrome to navigate the Word Wide Web. 2.Manage bookmarks for web pages. 3.Perform basic keyword.
System Design and Memory Limits. Problem  If you were integrating a feed of end of day stock price information (open, high, low, and closing price) for.
George Lee User Context-based Service Control Group
Internet Sellouts Final Presentation Enterprise Architecture Group.
Web- and Multimedia-based Information Systems. Assessment Presentation Programming Assignment.
Chapter 4 DECISION SUPPORT AND ARTIFICIAL INTELLIGENCE
Search Engines and Information Retrieval
The Research Project - Preliminary Proposal Presentation Contextual Suggestion Track: Travel Plan Recommendation System Based on Open-web Information Presenter:
T.Sharon - A.Frank 1 Internet Resources Discovery (IRD) Classic Information Retrieval (IR)
WebMiningResearch ASurvey Web Mining Research: A Survey Raymond Kosala and Hendrik Blockeel ACM SIGKDD, July 2000 Presented by Shan Huang, 4/24/2007.
Chapter 3: System design. System design Creating system components Three primary components – designing data structure and content – create software –
PAWN: A Novel Ingestion Workflow Technology for Digital Preservation
Web Mining Research: A Survey
WebMiningResearchASurvey Web Mining Research: A Survey Raymond Kosala and Hendrik Blockeel ACM SIGKDD, July 2000 Presented by Shan Huang, 4/24/2007 Revised.
Web Accessibility for Users with Motor Disabilities Audrey Le August 19, 2002.
Video Mining Learning Patterns of Behaviour via an Intelligent Image Analysis System.
Neural Technology and Fuzzy Systems in Network Security Project Progress Group 2: Omar Ehtisham Anwar Aneela Laeeq
University of Kansas Data Discovery on the Information Highway Susan Gauch University of Kansas.
Information Filtering LBSC 796/INFM 718R Douglas W. Oard Session 10, November 12, 2007.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Chapter 11 Databases.
Ethics of personalized information filtering Ansgar Koene, Elvira Perez, Christopher J. Carter, Ramona Statache, Svenja Adolphs, Claire O’Malley, Tom Rodden,
Search Engines and Information Retrieval Chapter 1.
ITEC224 Database Programming
Chapter 7 Web Content Mining Xxxxxx. Introduction Web-content mining techniques are used to discover useful information from content on the web – textual.
Mark Levene, An Introduction to Search Engines and Web Navigation © Pearson Education Limited 2005 Slide 8.1 Chapter 8 : The Mobile Web Mobile computing.
So far, we have…
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
1 Welcome to the GrameneMart Tutorial A tool for batch data sequence retrieval 1.Select a Gramene dataset to search against. 2.Add filters to the dataset.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Data Mining Chapter 1 Introduction -- Basic Data Mining Tasks -- Related Concepts -- Data Mining Techniques.
Introduction to the Adapter Server Rob Mace June, 2008.
1 NSS DEVELOPERS. Group Members Group Members NSS DEVELOPERS2  Anurag Sharma  Devesh Kumar Gupta  Alok Gangwar  Kuldeepak Panday Project Guide: Mr.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
10/10/2012ISC239 Isabelle Bichindaritz1 Physical Database Design.
Toward A Session-Based Search Engine Smitha Sriram, Xuehua Shen, ChengXiang Zhai Department of Computer Science University of Illinois, Urbana-Champaign.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
Microsoft ® Office Excel 2003 Training Using XML in Excel SynAppSys Educational Services presents:
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Personalized Interaction With Semantic Information Portals Eric Schwarzkopf DFKI
Copyright © 2012 UNICOM Systems, Inc. Confidential Information z/Ware Product Overview illustro Systems International A Division of UNICOM Global.
Lars Perner, Instructor 1 MKTG 476RELATIONAL DATABASES Relational Databases “Flat” databases and spreadsheets Relational databases Uses –Record keeping.
Introduction to Information Retrieval Example of information need in the context of the world wide web: “Find all documents containing information on computer.
Contact : Bernadette Bouchon-Meunier, Patrick Gallinari, Jean-Gabriel Ganascia LIP6, UPMC, 8 rue du Capitaine Scott, Paris, France
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
User Modeling and Recommender Systems: Introduction to recommender systems Adolfo Ruiz Calleja 06/09/2014.
PowerPoint Presentation by Charlie Cook Copyright © 2004 South-Western. All rights reserved. Chapter 5 Business Intelligence and and Knowledge Management.
Fundamentals of Web DevelopmentRandy Connolly and Ricardo HoarFundamentals of Web DevelopmentRandy Connolly and Ricardo Hoar Fundamentals of Web DevelopmentRandy.
Feb 24-27, 2004ICDL 2004, New Dehli Improving Federated Service for Non-cooperating Digital Libraries R. Shi, K. Maly, M. Zubair Department of Computer.
SOCSAMS e-learning Dept. of Computer Applications, MES College Marampally FILE SYSTEM.
CS798: Information Retrieval Charlie Clarke Information retrieval is concerned with representing, searching, and manipulating.
Calibrating a Complex Environmental Model to Historic Data San Francisco, October 25-26, Goldsim User Conference Presented By: Alan Keizur, P.E.
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
Artificial Intelligence, simulation and modelling.
Developing GRID Applications GRACE Project
Briefing and Planning meeting on INSPIRE validator implementation – Discussion 16/12/2015.
Smart Web Search Agents Data Search Engines >> Information Search Agents - Traditional searching on the Web is done using one of the following three: -
Adaptivity, Personalisation and Assistive Technologies Hugh Davis.
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
Recommender Systems & Collaborative Filtering
Resource Management / Acquisitions
XML QUESTIONS AND ANSWERS
Web Mining Ref:
Database Environment Transparencies
Personal Assistants for the Web: An MIT Perspective
Data Model.
HP ALM Defects Module To protect the confidential and proprietary information included in this material, it may not be disclosed or provided to any third.
Web Mining Research: A Survey
WJEC GCSE Computer Science
Presentation transcript:

1 Adaptive User Profiling Carolina Bailey

2 User Profiling: Areas Information Retrieval  Personalised Search  Personalised TV Listings  Recommendation Systems  Expert Finding Systems – profile matching Information Filtering  Spam Filters  News Filtering E-Learning  Learner Profiles Intelligent Environments  Intelligent Agents  Behaviour Prediction

3 User Profiling  A user profile can be used like a filter on a set of data, with various sets of data: Search Engine results Environment variables such as lighting settings and temperature settings Recipes News feeds… etc. … any collection of data items that could be personalised  Any information available about the user can be incorporated into the profile Likes, dislikes – specified or implied Various histories e.g. past behaviour, purchasing, browsing, TV watching, bookmarks Disabilities and/or medical details Future data sources

4 User Profiling: Steps

5 Building a User Profile Various Data Source Applications Examples of Data Sources  HTML file (e.g. bookmarks)  XML files  Text files (e.g. rules) Various Methods of Processing Various Representations of Profiles Some Example Personalised Applications and Data Sources…

6 Data Source Applications Search Engine

7 Data Source Applications Question Answering System

8 Data Source Applications Personalised TV

9 Data Source Applications Intelligent Environment

10 Data Sources - XML Recipe Ref: Recipe example from

11 Data Sources – Fuzzy Logic Example

12 Methods of processing data

13 Representations of Profiles

14 A Global, Unified Profile Potentially, one single profile could be used anywhere, for any application. Currently, the common theme in previous research, is that there is no common theme!  Different data storage methods, data processing methods and algorithms, representation of profiles etc. What is the most efficient of these different methods and processes? Can a user profile from one application be used within another application?

15 A Global, Unified Profile

16 A Global, Unified Profile

17 Global Profile - Considerations Mapping and categorising items to the Global Profile  E.g. a generic term for temperature, heating, radiators etc. Extensible way to add new data (and data sources) to the profile  Textual data  Fuzzy data  Future data items and sources – e.g. SatNav Data storage choices  Main Server  Distributed Transparency of the profile Updating and synchronising

18 Security, Privacy and Legal Implications The User must be in ultimate control! What data should be used in a profile? Purchasing history? Criminal record? Who and what should be allowed access to a profile? The Police? The Government? Could it be used against their wishes? Fine balance between what is good-intentioned personalisation and what is a complete loss of privacy As people lose more and more control of what information is stored about them, their personal freedom may feel encroached upon, resulting in a strong resistance to further developments towards user profiling

19 The End To be continued…