900 resultados para Google Analytics
Resumo:
Search engines have forever changed the way people access and discover knowledge, allowing information about almost any subject to be quickly and easily retrieved within seconds. As increasingly more material becomes available electronically the influence of search engines on our lives will continue to grow. This presents the problem of how to find what information is contained in each search engine, what bias a search engine may have, and how to select the best search engine for a particular information need. This research introduces a new method, search engine content analysis, in order to solve the above problem. Search engine content analysis is a new development of traditional information retrieval field called collection selection, which deals with general information repositories. Current research in collection selection relies on full access to the collection or estimations of the size of the collections. Also collection descriptions are often represented as term occurrence statistics. An automatic ontology learning method is developed for the search engine content analysis, which trains an ontology with world knowledge of hundreds of different subjects in a multilevel taxonomy. This ontology is then mined to find important classification rules, and these rules are used to perform an extensive analysis of the content of the largest general purpose Internet search engines in use today. Instead of representing collections as a set of terms, which commonly occurs in collection selection, they are represented as a set of subjects, leading to a more robust representation of information and a decrease of synonymy. The ontology based method was compared with ReDDE (Relevant Document Distribution Estimation method for resource selection) using the standard R-value metric, with encouraging results. ReDDE is the current state of the art collection selection method which relies on collection size estimation. The method was also used to analyse the content of the most popular search engines in use today, including Google and Yahoo. In addition several specialist search engines such as Pubmed and the U.S. Department of Agriculture were analysed. In conclusion, this research shows that the ontology based method mitigates the need for collection size estimation.
Resumo:
Über die letzten Jahre hat sich einige öffentliche und kommerzielle Aufmerksamkeit auf ein Phänomen gerichtet, das sich anschickt, die Medienlandschaft grundlegend zu verändern. Yahoo! kaufte Flickr. Google erwarb YouTube. Rupert Murdoch kaufte MySpace, und erklärte, die Zukunft seines NewsCorp-Imperiums läge eher in der nutzergesteuerten Inhaltserschaffung innerhalb solcher sozialer Medien als in seinen vielen Zeitungen, Fernsehsendern und anderen Medieninteressen (2005). Schließlich brach TIME mit seiner langetablierten Tradition, eine herausragende Persönlichkeit als „Person des Jahres“ zu nominieren, und wählte stattdessen „You“: uns alle, die wir online in Kollaboration Inhalte schaffen (2006). Allerdings liegt die Bedeutung dieses nutzergesteuerten Phänomens nicht in solchen (letztlich unwichtigen) Ehrungen, oder auch nur in den Inhalten zentraler Websites wie YouTube und Flickr – vielmehr findet man sie in logischer Folge der ihr zugrunde liegenden Prinzipien (die wir hier weiter untersuchen werden) viel flächendeckender über das World Wide Web verbreitet; was wichtig ist am neuen Phänomen ist nicht nur der Erfolg seiner sichtbarsten Exponenten, sondern auch der „Long Tail“ (Anderson 2006) der vielen anderen nutzergesteuerten Projekte, die sich überall in der Online-Welt etabliert haben und jetzt beginnen, sich sogar in die Offline-Welt hinein auszubreiten.
Resumo:
The gathering of people in everyday life is intertwined with travelling to negotiated locations. As a result, mobile phones are often used to rearrange meetings when one or more participants are late or cannot make it on time. Our research is based on the hypothesis that the provision of location data can enhance the experience of people who are meeting each other in different locations. This paper presents work-in-progress on a novel approach to share one’s location data in real-time which is visualised on a web-based map in a privacy conscious way. Disposable Maps allows users to select contacts from their phone’s address book who then receive up-to-date location data. The utilisation of peer-to-peer notifications and the application of unique URLs for location storage and presentation enable location sharing whilst ensuring users’ location privacy. In contrast to other location sharing services like Google Latitude, Disposable Maps enables ad hoc location sharing to actively selected location receivers for a fixed period of time in a specific given situation. We present first insights from an initial application user test and show future work on the approach of disposable information allocation.
Resumo:
The research landscape is changing rapidly, and as a consequence the roles of libraries and librarians in supporting and working with researchers is also changing. Some of the drivers behind the changes in research practices and culture include: new technologies, government funding and measurement of research impact, and the importance of open access to data. In Australia, librarians work with researchers to help them identify high quality resources, increase their publication rate and manage and promote access to their research. QUT Library has established a number of initiatives to support researchers, including: establishment of the QUT digital repository ‘ePrints’; purchase of electronic books and electronic journals; programmes of workshops for researchers ; redesign of Library space and, and the creation of new staffing positions. The creation of the QUT ePrints repository was a major new initiative for the QUT Library. ePrints is a web-accessible repository of research outputs created for QUT staff and postgraduate students. The ePrints information is harvested by Google, and anyone searching for a QUT staff member on Google can find their publications listed in ePrints. This keynote address will discuss the context for the role of libraries in building research endeavours, highlight some examples of strategies and resources to supporting researchers. It will conclude with an outline of some key online resources for researchers in education. This presentation should be relevant for both individual researchers interested in conducting and promoting their own research, and for staff and organisations focused on building their support for research.
Resumo:
Research in science education is now an international activity. This book asks for the first time, Does this research activity have an identity?-It uses the significant studies of more than 75 researchers in 15 countries to see to what extent they provide evidence for an identity as a distinctive field of research.-It considers trends in the research over time, and looks particularly at what progression in the research entails.-It provides insight into how researchers influence each other and how involvement in research affects the being of the researcher as a person.-It addresses the relation between research and practice in a manner that sees teaching and learning in the science classroom as interdependent with national policies and curriculum traditions about science. It gives graduate students and other early researchers an unusual overview of their research area as a whole. Established researchers will be interested in, and challenged by, the identity the author ascribes to the research and by the plea he makes for the science content itself to be seen as problematic.
Resumo:
Planar busbar is a good candidate to reduce interconnection inductance in high power inverters compared with cables. However, power switching components with fast switching combined with hard switched-converters produce high di/dt during turn off time and busbar stray inductance then becomes an important issue which creates overvoltage. It is necessary to keep the busbar stray inductance as low as possible to decrease overvoltage and Electromagnetic Interference (EMI) noise. In this paper, the effect of different transient current loops on busbar physical structure of the high-voltage high-level diode-clamped converters will be highlighted. Design considerations of proper planar busbar will also be presented to optimise the overall design of diode-clamped converters.
Resumo:
A body of critical legal scholarship argues that, by the time they have completed their studies, students who enter legal education holding social ideals and intending to use their legal education to achieve social change, have become cynical about the ability of the law to do so and no longer possess such ideals. This is explained by critical scholars to be the result of a process of ideological indoctrination, aimed at ensuring that graduates uphold the narrow and conservative interests of the legal profession and capitalist society, being exercised by law schools acting as adjuncts of the legal profession, and exercised upon the passive body of the law student. By using Foucault’s work on knowledge, power, and the subject to interrogate the assumptions upon which this narrative is based, this thesis intends to suggest a way of thinking differently to the approach taken by many critical legal scholars. It then uses an analytics of government (based on Foucault’s notion of ‘governmentality’) to consider the construction of the legal identity differently. It examines the ways in which the governance of the legal identity is rationalised, programmed, and implemented, in three Queensland law schools. It also looks at the way that five prescriptive texts to ‘surviving’ law school suggest students establish and practise a relation to themselves in order to construct their own legal identities. Overall, this analysis shows that governance is not simply conducted in the profession’s interests, but occurs due to a complex arrangement of different practices, which can lead to the construction of skilled legal professional identities as well as ethical lawyer-citizens that hold an interest in justice. The implications of such an analytics provide the basis for original ways of understanding legal education, and legal education scholarship.
Resumo:
The over represented number of novice drivers involved in crashes is alarming. Driver training is one of the interventions aimed at mitigating the number of crashes that involve young drivers. Experienced drivers have better hazard perception ability compared to inexperienced drivers. Eye gaze patterns have been found to be an indicator of the driver's competency level. The aim of this paper is to develop an in-vehicle system which correlates information about the driver's gaze and vehicle dynamics, which is then used to assist driver trainers in assessing driving competency. This system allows visualization of the complete driving manoeuvre data on interactive maps. It uses an eye tracker and perspective projection algorithms to compute the depth of gaze and plots it on Google maps. This interactive map also features the trajectory of the vehicle and turn indicator usage. This system allows efficient and user friendly analysis of the driving task. It can be used by driver trainers and trainees to understand objectively the risks encountered during driving manoeuvres. This paper presents a prototype that plots the driver's eye gaze depth and direction on an interactive map along with the vehicle dynamics information. This prototype will be used in future to study the difference in gaze patterns in novice and experienced drivers prior to a certain manoeuvre.
Resumo:
This paper presents an Active Gate Signaling scheme to reduce voltage/current spikes across insulated gate power switches in hard switching power electronic circuits. Voltage and/or current spikes may cause EMI noise. In addition, they increase voltage/current stress on the switch. Traditionally, a higher gate resistance is chosen to reduce voltage/current spikes. Since the switching loss will increase remarkably, an active gate voltage control scheme is developed to improve efficiency of hard switching circuits while the undesirable voltage and/or current spikes are minimized.
Resumo:
Wahrscheinlich war es ja nur ein Versuch einer alteingesessenen Institution der Massenmedien, sich bei „den Leuten, die man früher ‚das Publikum‘ nannte“ („the people formerly known as the audience“; Rosen, 2006, n.pag.) wieder einzuschmeicheln. Dennoch, die Anerkennung des kollektiven „You“ in YouTube und anderen kollaborativen Onlineplattformen als Person des Jahres durch das amerikanische Magazin Time (Grossman, 2007) liefert ein weiteres Indiz für die wachsende Bedeutung solcher Projekte zur gemeinschaftlichen Produktion und Distribution von Inhalten. Kreative Websites wie Flickr und YouTube, kollaborative Wissenssammlungen von Wikipedia über Digg bis zu Google Earth, nutzergesteuerte Diskussionen in Slashdot, OhmyNews, und der allgemeinen Blogosphäre, aber auch die Softwareentwicklungsgemeinschaften im Open‐Source‐Bereich – sie alle dienen als Beispiele für diese nun etablierten Trend zur Entwicklung neuer Produktions‐, Geschäfts‐, Gemeinschafts‐ und Selbstlenkungsmodelle, die wesentlich durch zunehmend komplexere Web‐2.0‐Tools unterstützt werden. Hinter diesen Beispielen wird eine allgemeiner Tendenz sichtbar, die aus ökonomischer Sicht bereits von Yochai Benkler als „commons‐based peer production“ (2006), und von Eric von Hippel als „democratizing innovation" (2005) beschrieben worden ist. Henry Jenkins spricht zudem von einer „convergence culture“ (2006), in der solche nutzergesteuerten Projekte operieren, und es können auch Verbindungen zwischen diesen stärker aktive gewordenen Nutzern und Alvin Tofflers professionellen Konsumenten, den „Prosumers“ ziehen (1971).
Resumo:
This paper investigates self–Googling through the monitoring of search engine activities of users and adds to the few quantitative studies on this topic already in existence. We explore this phenomenon by answering the following questions: To what extent is the self–Googling visible in the usage of search engines; is any significant difference measurable between queries related to self–Googling and generic search queries; to what extent do self–Googling search requests match the selected personalised Web pages? To address these questions we explore the theory of narcissism in order to help define self–Googling and present the results from a 14–month online experiment using Google search engine usage data.
Resumo:
Objective: To summarise the extent to which narrative text fields in administrative health data are used to gather information about the event resulting in presentation to a health care provider for treatment of an injury, and to highlight best practise approaches to conducting narrative text interrogation for injury surveillance purposes.----- Design: Systematic review----- Data sources: Electronic databases searched included CINAHL, Google Scholar, Medline, Proquest, PubMed and PubMed Central.. Snowballing strategies were employed by searching the bibliographies of retrieved references to identify relevant associated articles.----- Selection criteria: Papers were selected if the study used a health-related database and if the study objectives were to a) use text field to identify injury cases or use text fields to extract additional information on injury circumstances not available from coded data or b) use text fields to assess accuracy of coded data fields for injury-related cases or c) describe methods/approaches for extracting injury information from text fields.----- Methods: The papers identified through the search were independently screened by two authors for inclusion, resulting in 41 papers selected for review. Due to heterogeneity between studies metaanalysis was not performed.----- Results: The majority of papers reviewed focused on describing injury epidemiology trends using coded data and text fields to supplement coded data (28 papers), with these studies demonstrating the value of text data for providing more specific information beyond what had been coded to enable case selection or provide circumstantial information. Caveats were expressed in terms of the consistency and completeness of recording of text information resulting in underestimates when using these data. Four coding validation papers were reviewed with these studies showing the utility of text data for validating and checking the accuracy of coded data. Seven studies (9 papers) described methods for interrogating injury text fields for systematic extraction of information, with a combination of manual and semi-automated methods used to refine and develop algorithms for extraction and classification of coded data from text. Quality assurance approaches to assessing the robustness of the methods for extracting text data was only discussed in 8 of the epidemiology papers, and 1 of the coding validation papers. All of the text interrogation methodology papers described systematic approaches to ensuring the quality of the approach.----- Conclusions: Manual review and coding approaches, text search methods, and statistical tools have been utilised to extract data from narrative text and translate it into useable, detailed injury event information. These techniques can and have been applied to administrative datasets to identify specific injury types and add value to previously coded injury datasets. Only a few studies thoroughly described the methods which were used for text mining and less than half of the studies which were reviewed used/described quality assurance methods for ensuring the robustness of the approach. New techniques utilising semi-automated computerised approaches and Bayesian/clustering statistical methods offer the potential to further develop and standardise the analysis of narrative text for injury surveillance.
Resumo:
Objective: The objectives of this article are to explore the extent to which the International Statistical Classification of Diseases and Related Health Problems (ICD) has been used in child abuse research, to describe how the ICD system has been applied and to assess factors affecting the reliability of ICD coded data in child abuse research.----- Methods: PubMed, CINAHL, PsychInfo and Google Scholar were searched for peer reviewed articles written since 1989 that used ICD as the classification system to identify cases and research child abuse using health databases. Snowballing strategies were also employed by searching the bibliographies of retrieved references to identify relevant associated articles. The papers identified through the search were independently screened by two authors for inclusion, resulting in 47 studies selected for the review. Due to heterogeneity of studies metaanalysis was not performed.----- Results: This paper highlights both utility and limitations of ICD coded data. ICD codes have been widely used to conduct research into child maltreatment in health data systems. The codes appear to be used primarily to determine child maltreatment patterns within identified diagnoses or to identify child maltreatment cases for research.----- Conclusions: A significant impediment to the use of ICD codes in child maltreatment research is the under-ascertainment of child maltreatment by using coded data alone. This is most clearly identified and, to some degree, quantified, in research where data linkage is used. Practice Implications: The importance of improved child maltreatment identification will assist in identifying risk factors and creating programs that can prevent and treat child maltreatment and assist in meeting reporting obligations under the CRC.
Resumo:
Introduction: The Google Online Marketing Challenge is a global competition in which student teams run advertising campaigns for small and medium-sized businesses (SMEs) using AdWords, Google’s text-based advertisements. In 2008, its inaugural year, over 8,000 students and 300 instructors from 47 countries representing over 200 schools participated. The Challenge ran in undergraduate and graduate classes in disciplines such as marketing, tourism, advertising, communication and information systems. Combining advertising and education, the Challenge gives student hands-on experience in the increasingly important field of online marketing, engages them with local businesses and motivates them through the thrill of a global competition. Student teams receive US$200 in AdWords credits, Google’s premier advertising product that offers cost-per-click advertisements. The teams then recruit and work with a local business to devise an effective online marketing campaign. Students first outline a strategy, run a series of campaigns, and provide their business with recommendations to improve their online marketing. Teams submit two written reports for judging by 14 academics in eight countries. In addition, Google AdWords experts judge teams on their campaign statistics such as success metrics and account management. Rather than a marketing simulation against a computer or hypothetical marketing plans for hypothetical businesses, the Challenges has student teams develop and manage real online advertising campaigns for their clients and compete against peers globally.
Resumo:
In this chapter I argue that the global privatisation of elctromagnetic spectrum marks this period as historically unique. I also put forward conceptual categories for understanding the nature of an emergent cybereconomy. They correspond to classical conceptions of property, value and labour, but in no way treat these categories as singular, simple or unproblematic. From a perspective informed largely by Marx’s critique of classical political economy, I frame the creation of a global cyberspace as the enclosure, or “privatisation”, of conscious activity. I argue that a full and formally defined cyberspace, at least as it is currenty conceived of, must prefigure the eventual alienation of human social existence at its most fundamental and definitive level: consciousness.