236 resultados para Information Search and Retrieval


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The presence of spam in a document ranking is a major issue for Web search engines. Common approaches that cope with spam remove from the document rankings those pages that are likely to contain spam. These approaches are implemented as post-retrieval processes, that filter out spam pages only after documents have been retrieved with respect to a user’s query. In this paper we suggest to remove spam pages at indexing time, therefore obtaining a pruned index that is virtually “spam-free”. We investigate the benefits of this approach from three points of view: indexing time, index size, and retrieval performances. Not surprisingly, we found that the strategy decreases both the time required by the indexing process and the space required for storing the index. Surprisingly instead, we found that by considering a spam-pruned version of a collection’s index, no difference in retrieval performance is found when compared to that obtained by traditional post-retrieval spam filtering approaches.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the current business world which companies’ competition is very compact in the business arena, quality in manufacturing and providing products and services can be considered as a means of seeking excellence and success of companies in this competition arena. Entering the era of e-commerce and emergence of new production systems and new organizational structures, traditional management and quality assurance systems have been challenged. Consequently, quality information system has been gained a special seat as one of the new tools of quality management. In this paper, quality information system has been studied with a review of the literature of the quality information system, and the role and position of quality Information System (QIS) among other information systems of a organization is investigated. The quality Information system models are analyzed and by analyzing and assessing presented models in quality information system a conceptual and hierarchical model of quality information system is suggested and studied. As a case study the hierarchical model of quality information system is developed by evaluating hierarchical models presented in the field of quality information system based on the Shetabkar Co.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Sustainability is a global issue that urgently needs addressing, the most serious consequences of which concern children and future generations. This insightful research text tackles one of the most significant contemporary issues of our times – the nexus between society and environment – and how early childhood education can contribute to sustainable living. By offering international and multidisciplinary research perspectives on Early Childhood Education for Sustainability, each chapter explores and investigates the complex topic of sustainability and its relationship to early childhood education. A particular emphasis that runs through this text is young children as empowered citizens, capable of both contributing to and creating change for sustainability. The chapter authors work from, or are aligned with, a transformative education paradigm that suggests the socio-constructivist frameworks currently underpinning Early Childhood Education require reframing in light of the social transformations necessary to address humanity’s unsustainable, unjust and unhealthy living patterns. This research text is designed to be provocative and challenging; in so doing it seeks to encourage exploration of current understandings about Early Childhood Education for Sustainability, offers new dimensions for more deeply informed practice, and proposes avenues for further research in this field.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This book attempts to persuade a new generation of scholars, criminologists, activists, and policy makers sympathetic to the quest for global justice to open the envelope, to step out of their comfort zones and typical frames of analysis to gaze at a world full of injustice against the female sex, much of it systemic, linked to culture, custom and religion. In some instances the sources of these injustices intersect with those that produce global inequality, imperialism and racism. This book also investigates circumstances where the globalising forces cultivate male on male violence in the anomic spaces of supercapitalism – the border zones of Mexico and the United States, and the frontier mining communities in the Australian desert. However systemic gendered injustices, such as forced marriage of child female brides, sati the cremation of widows, genital cutting, honour crimes, rape and domestic violence against women, are forms of violence only experienced by the female sex. The book does not shirk away from female violence either. Carrington argues that if feminism wants to have a voice in the public, cultural, political and criminological debates about heightened, albeit often exaggerated, social concerns about growing female violence and engagement in terrorism, then new directions in theorising female violence are required. Feminist silences about the violent crimes, atrocities and acts of terrorism committed by the female sex leave anti-feminist explanations uncontested. This allows a discursive space for feminist backlash ideologues to flourish. This book contests those ideologies to offer counter explanations for the rise in female violence and female terrorism, in a global context where systemic gendered violence against women is alarming and entrenched. The world needs feminism to take hold across the globe, now more than ever.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information security and privacy in the healthcare domain is a complex and challenging problem for computer scientists, social scientists, law experts and policy makers. Appropriate healthcare provision requires specialized knowledge, is information intensive and much patient information is of a particularly sensitive nature. Electronic health record systems provide opportunities for information sharing which may enhance healthcare services, for both individuals and populations. However, appropriate information management measures are essential for privacy preservation...

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper reports on the 2nd ShARe/CLEFeHealth evaluation lab which continues our evaluation resource building activities for the medical domain. In this lab we focus on patients' information needs as opposed to the more common campaign focus of the specialised information needs of physicians and other healthcare workers. The usage scenario of the lab is to ease patients and next-of-kins' ease in understanding eHealth information, in particular clinical reports. The 1st ShARe/CLEFeHealth evaluation lab was held in 2013. This lab consisted of three tasks. Task 1 focused on named entity recognition and normalization of disorders; Task 2 on normalization of acronyms/abbreviations; and Task 3 on information retrieval to address questions patients may have when reading clinical reports. This year's lab introduces a new challenge in Task 1 on visual-interactive search and exploration of eHealth data. Its aim is to help patients (or their next-of-kin) in readability issues related to their hospital discharge documents and related information search on the Internet. Task 2 then continues the information extraction work of the 2013 lab, specifically focusing on disorder attribute identification and normalization from clinical text. Finally, this year's Task 3 further extends the 2013 information retrieval task, by cleaning the 2013 document collection and introducing a new query generation method and multilingual queries. De-identified clinical reports used by the three tasks were from US intensive care and originated from the MIMIC II database. Other text documents for Tasks 1 and 3 were from the Internet and originated from the Khresmoi project. Task 2 annotations originated from the ShARe annotations. For Tasks 1 and 3, new annotations, queries, and relevance assessments were created. 50, 79, and 91 people registered their interest in Tasks 1, 2, and 3, respectively. 24 unique teams participated with 1, 10, and 14 teams in Tasks 1, 2 and 3, respectively. The teams were from Africa, Asia, Canada, Europe, and North America. The Task 1 submission, reviewed by 5 expert peers, related to the task evaluation category of Effective use of interaction and targeted the needs of both expert and novice users. The best system had an Accuracy of 0.868 in Task 2a, an F1-score of 0.576 in Task 2b, and Precision at 10 (P@10) of 0.756 in Task 3. The results demonstrate the substantial community interest and capabilities of these systems in making clinical reports easier to understand for patients. The organisers have made data and tools available for future research and development.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Expert searchers engage with information in a variety of professional settings, as information brokers, reference librarians, information architects and faculty who teach advanced searching. As my recent research shows, the expert searcher’s information experience is defined by profound discernment of critical concepts about information, and a fluid ability to apply this knowledge to their engagement with the information environment. The information experience of the expert searcher means active and intentional participation with the processes and players that created that information environment. Expert searchers become an integral and seamless part of their information environment and also play a role in facilitating the information experiences of others. In this chapter, after discussing my understanding of the concept of information experience, I outline how I used threshold concept theory to explore the information experience of expert searchers. Through the findings, I identify four threshold concepts in the acquisition of search expertise that provide new perspectives on the information experience of the expert searcher. These new perspectives have implications for search engine design and how advanced search skills are taught. Finally, I consider how the fresh insights about the expert searcher’s experiences contribute to wider understanding about information experience.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recommender systems provide personalized advice for customers online based on their own preferences, while reputation systems generate a community advice on the quality of items on the Web. Both systems use users’ ratings to generate their output. In this paper, we propose to combine reputation models with recommender systems to enhance the accuracy of recommendations. The main contributions include two methods for merging two ranked item lists which are generated based on recommendation scores and reputation scores, respectively, and a personalized reputation method to generate item reputations based on users’ interests. The proposed merging methods can be applicable to any recommendation methods and reputation methods, i.e., they are independent from generating recommendation scores and reputation scores. The experiments we conducted showed that the proposed methods could enhance the accuracy of existing recommender systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this chapter we consider how the iPad and selected applications such as Draw and Tell (Duck Duck Moose, 2013), Popplet (Notion Inc., 2013) and Puppet Pals (Polished Play LLC, 2013) can assist children in collaborative storying, retelling and sequencing story moments that can assist young children in their acquisition of oracy and their understanding of the world, both real and imagined, and their personal relationships. The data gathered from the project will also analysed through the lense of “critical and creative thinking” (ACARA, 2013, p.20-21) skills articulated as one of the general capabilities required in all subject areas of the Australian national curriculum, but which has particular application to The Arts subject areas. In this chapter, we consider artefacts created by preschool children using iPads and selected apps and interviews conducted with preschool children and their caregivers during our research project. We then offer examples of practice to assist preschool teachers in supporting children in their storymaking using the iPad and discuss approaches for engagement that twins the live and mediatised representation of a story.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a field study of the Queensland Information Technology and Telecommunications Industry Strategy (QITIS), and of the Information Industries Board (IIB), a joint industry-state government body established in 1992 to oversee the implementation of that strategy for the development of the IT&T Industry in Queensland. The aim of the study was to analyse differing stakeholder perspectives on the strategy and on its implementation by the IIB. The study forms part of a longer-term review which aims to develop methodologies for the selection of appropriate strategies for the IT&T Industry, and for the evaluation of outcomes of strategy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Strategic searching for invasive pests presents a formidable challenge for conservation managers. Limited funding can necessitate choosing between surveying many sites cursorily, or focussing intensively on fewer sites. While existing knowledge may help to target more likely sites, e.g. with species distribution models (maps), this knowledge is not flawless and improving it also requires management investment. 2.In a rare example of trading-off action against knowledge gain, we combine search coverage and accuracy, and its future improvement, within a single optimisation framework. More specifically we examine under which circumstances managers should adopt one of two search-and-control strategies (cursory or focussed), and when they should divert funding to improving knowledge, making better predictive maps that benefit future searches. 3.We use a family of Receiver Operating Characteristic curves to reflect the quality of maps that direct search efforts. We demonstrate our framework by linking these to a logistic model of invasive spread such as that for the red imported fire ant Solenopsis invicta in south-east Queensland, Australia. 4.Cursory widespread searching is only optimal if the pest is already widespread or knowledge is poor, otherwise focussed searching exploiting the map is preferable. For longer management timeframes, eradication is more likely if funds are initially devoted to improving knowledge, even if this results in a short-term explosion of the pest population. 5.Synthesis and applications. By combining trade-offs between knowledge acquisition and utilization, managers can better focus - and justify - their spending to achieve optimal results in invasive control efforts. This framework can improve the efficiency of any ecological management that relies on predicting occurrence. © 2010 The Authors. Journal of Applied Ecology © 2010 British Ecological Society.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Emergency Response Teams increasingly use interactive technology to help manage information and communications. The challenge is to maintain a high situation awareness for different interactive devices sizes. This research specifically compared a handheld interactive device in the form of an iPad with a large interactive multi-touch tabletop. A search and rescue inspired simulator was designed to test operator situation awareness for the two sized devices. The results show that operators had better situation awareness on the tabletop device when the operation related to detecting of moving targets, searching target locations, distinguishing target types, and comprehending displayed information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information security and privacy in the healthcare domain is a complex and challenging problem for computer scientists, social scientists, law experts and policy makers. Appropriate healthcare provision requires specialized knowledge, is information intensive and much patient information is of a particularly sensitive nature. Electronic health record systems provide opportunities for information sharing which may enhance healthcare services, for both individuals and populations. However, appropriate information management measures are essential for privacy preservation...