993 resultados para Knowledge Bank
Resumo:
The paper is a description of information and software content of a computer knowledge bank on medical diagnostics. The classes of its users and the tasks which they can solve are described. The information content of the bank contains three ontologies: an ontology of observations in the field of medical diagnostics, an ontology of knowledge base (diseases) in medical diagnostics and an ontology of case records, and also it contains three classes of information resources for every division of medicine – observation bases, knowledge bases, and data bases (with data about patients), that correspond to these ontologies. Software content consists of editors for information of different kinds (ontologies, bases of observations, knowledge and data), and also of a program which performs medical diagnostics.
Resumo:
* This paper was made according to the program of FEBRAS, project "Creating methods and tools for developing intellectual information systems in medicine and public health".
Resumo:
Purpose – The purpose of this research is to show how the self-archiving of journal papers is a major step towards providing open access to research. However, copyright transfer agreements (CTAs) that are signed by an author prior to publication often indicate whether, and in what form, self-archiving is allowed. The SHERPA/RoMEO database enables easy access to publishers' policies in this area and uses a colour-coding scheme to classify publishers according to their self-archiving status. The database is currently being redeveloped and renamed the Copyright Knowledge Bank. However, it will still assign a colour to individual publishers indicating whether pre-prints can be self-archived (yellow), post-prints can be self-archived (blue), both pre-print and post-print can be archived (green) or neither (white). The nature of CTAs means that these decisions are rarely as straightforward as they may seem, and this paper describes the thinking and considerations that were used in assigning these colours in the light of the underlying principles and definitions of open access. Approach – Detailed analysis of a large number of CTAs led to the development of controlled vocabulary of terms which was carefully analysed to determine how these terms equate to the definition and “spirit” of open access. Findings – The paper reports on how conditions outlined by publishers in their CTAs, such as how or where a paper can be self-archived, affect the assignment of a self-archiving colour to the publisher. Value – The colour assignment is widely used by authors and repository administrators in determining whether academic papers can be self-archived. This paper provides a starting-point for further discussion and development of publisher classification in the open access environment.
Resumo:
The diffusion of mobile telephony began in 1971 in Finland, when the first car phones, called ARP1 were taken to use. Technologies changed from ARP to NMT and later to GSM. The main application of the technology, however, was voice transfer. The birth of the Internet created an open public data network and easy access to other types of computer-based services over networks. Telephones had been used as modems, but the development of the cellular technologies enabled automatic access from mobile phones to Internet. Also other wireless technologies, for instance Wireless LANs, were also introduced. Telephony had developed from analog to digital in fixed networks and allowed easy integration of fixed and mobile networks. This development opened a completely new functionality to computers and mobile phones. It also initiated the merger of the information technology (IT) and telecommunication (TC) industries. Despite the arising opportunity for firms' new competition the applications based on the new functionality were rare. Furthermore, technology development combined with innovation can be disruptive to industries. This research focuses on the new technology's impact on competition in the ICT industry through understanding the strategic needs and alternative futures of the industry's customers. The change speed inthe ICT industry is high and therefore it was valuable to integrate the DynamicCapability view of the firm in this research. Dynamic capabilities are an application of the Resource-Based View (RBV) of the firm. As is stated in the literature, strategic positioning complements RBV. This theoretical framework leads theresearch to focus on three areas: customer strategic innovation and business model development, external future analysis, and process development combining these two. The theoretical contribution of the research is in the development of methodology integrating theories of the RBV, dynamic capabilities and strategic positioning. The research approach has been constructive due to the actual managerial problems initiating the study. The requirement for iterative and innovative progress in the research supported the chosen research approach. The study applies known methods in product development, for instance, innovation process in theGroup Decision Support Systems (GDSS) laboratory and Quality Function Deployment (QFD), and combines them with known strategy analysis tools like industry analysis and scenario method. As the main result, the thesis presents the strategic innovation process, where new business concepts are used to describe the alternative resource configurations and scenarios as alternative competitive environments, which can be a new way for firms to achieve competitive advantage in high-velocity markets. In addition to the strategic innovation process as a result, thestudy has also resulted in approximately 250 new innovations for the participating firms, reduced technology uncertainty and helped strategic infrastructural decisions in the firms, and produced a knowledge-bank including data from 43 ICT and 19 paper industry firms between the years 1999 - 2004. The methods presentedin this research are also applicable to other industries.
Resumo:
Ce mémoire vise à comprendre le processus menant à un acte de confiance dans un contexte organisationnel en étudiant l’implantation du télétravail. Il explore la manière dont un gestionnaire franchit les différentes étapes du processus menant à un état d’attentes positives à l’égard d’un employé et, sur cette base, prendre le risque de lui autoriser le télétravail. D’un point de vue théorique, j’adopte une vision dynamique de la confiance en mobilisant notamment l’approche processuelle ainsi que le concept de suspension (Möllering, 2001, 2006). Cette étude est basée sur des entrevues semi-structurées réalisées auprès de six gestionnaires ayant autorisé le travail à domicile. Les participants ont été rencontrés à deux reprises et ont chacun rédigé une courte réflexion écrite sur le thème de la confiance. Leurs témoignages ont été analysés selon la méthode d’analyse inductive. Mes résultats révèlent que lorsqu’un gestionnaire envisage d’autoriser le télétravail, il mobilise une banque de connaissances qu’il a préalablement acquises à travers ses interactions avec l’employé pour construire une fiction optimiste de l’avenir. Cet exercice imaginatif lui permet de suspendre son incertitude et d’anticiper avec optimisme le comportement de ses télétravailleurs. La prise du risque que représente l’autorisation du travail à domicile ne découle cependant pas uniquement de cet état d’attentes favorables. Dans les grandes entreprises, la concrétisation de cet acte de confiance semble également reposer sur une suspension collective de l’incertitude et de la vulnérabilité organisationnelle.
Resumo:
Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.
Resumo:
The article proposes the model of management of information about program flow analysis for conducting computer experiments with program transformations. It considers the architecture and context of the flow analysis subsystem within the framework of Specialized Knowledge Bank on Program Transformations and describes the language for presenting flow analysis methods in the knowledge bank.
Resumo:
The paper presents basic notions and scientific achievements in the field of program transformations, describes usage of these achievements both in the professional activity (when developing optimizing and unparallelizing compilers) and in the higher education. It also analyzes main problems in this area. The concept of control of program transformation information is introduced in the form of specialized knowledge bank on computer program transformations to support the scientific research, education and professional activity in the field. The tasks that are solved by the knowledge bank are formulated. The paper is intended for experts in the artificial intelligence, optimizing compilation, postgraduates and senior students of corresponding specialties; it may be also interesting for university lecturers and instructors.
Resumo:
The subject of dropout prevention/reduction is deservedly receiving attention as a problem that, if not resolved, could threaten our national future.^ This study investigates a small segment of the overall dropout problem, which has apparently unique features of program design and population selection. The evidence presented here should add to the knowledge bank of this complicated problem.^ Project Trio was one of a number of dropout prevention programs and activities which were conducted in Dade County school years 1984-85 and 1985-86, and it is here investigated longitudinally through the end of the 1987-88 school year. It involved 17 junior and senior high schools, and 27 programs, 10 the first year and 17 the second, with over 1,000 total students, who had been selected by the schools from a list of the "at risk" students provided by the district, and were divided approximately evenly into the classical research design of an experimental group and the control group, which following standard procedure was to take the regular school curriculum. No school had more than 25 students in either group.^ Each school modified the basic design of the project to accommodate the individual school characteristics and the perceived needs of their students; however all schools projects were to include some form of academic enhancement, counseling and career awareness study.^ The conclusion of this study was that the control group had a significantly lower dropout rate than the experimental group. Though impossible to make a certain determination of the reasons for this unexpected result, it appears from evidence presented that one cause may have been inadequate administration at the local level.^ This study was also a longitudinal investigation of the "at risk" population as a whole for the three and four year period, to determine if academic factors were present in records may be used to identify dropout proneness.^ A significant correlation was found between dropping out and various measures including scores on the Quality of School Life Instrument, attendance, grade point averages, mathematics grades, and overage in grade, important identifiers in selection for dropout prevention programs. ^
Resumo:
This paper describes the process of creating a controlled vocabulary which can be used to systematically analyse the copyright transfer agreements (CTAs) of journal publishers with regard to self-archiving. The analysis formed the basis of the newly created Copyright Knowledge Bank of publishers’ self-archiving policies. Self-archiving terms appearing in publishers’ CTAs were identified and classified, with these then being simplified, merged, and discarded to form a definitive list. The controlled vocabulary consists of three categories that describe ‘what’ can be self-archived, the ‘conditions’ of self-archiving and the ‘restrictions’ of self-archiving. Condition terms include specifications such as ‘where’ an article can be self archived, restriction terms include specifications such as ‘when’ the article can be self archived. Additional information on any of these terms appears in ‘free-text’ fields. Although this controlled vocabulary provides an effective way of analysing CTAs, it will need to be continually reviewed and updated in light of any major new additions to the terms used in publishers’ copyright and self-archiving policies.
Resumo:
Recruiting safe, volunteer blood donors requires understanding motivations for donating and knowledge and attitudes about HIV. We surveyed 1,600 persons presenting for blood donation at a large blood bank in Sao Paulo, Brazil using a self-administered, structured questionnaire, and classified motivations into three domains as well as categorizing persons by HIV test-seeking behavior. Motivations, in descending order, and their significant associations were: ""altruism``: female gender, volunteer donor and repeat donor status; ""direct appeal``: female gender, repeat donor status and age 21-50 years; ""selfinterest``: male gender, age under 20 years, first-time donor status and lower education. HIV test-seekers were more likely to give incorrect answers regarding HIV risk behavior and blood donation and the ability of antibody testing to detect recent HIV infections. Altruism is the main motivator for blood donation in Brazil; other motivators were associated with specific demographic subgroups. HIV test-seeking might be reduced by educational interventions.
Resumo:
BACKGROUND: Persons with human immunodeficiency virus (HIV) risk behaviors are excluded from donation to reduce the risk of transfusion-transmitted infection. Persons donating to be tested for HIV may therefore deny risk behaviors. STUDY DESIGN AND METHODS: A random sample of donors completed a survey on motivations, knowledge, and attitudes on the screening process. Donors were considered test seekers if they agreed with two statements ""I think that blood donation is a good, fast, and anonymous way to get my blood tested"" and ""I donate to get my test results."" This study was conducted from June to November 2006 at the largest blood bank in Sao Paulo, Brazil. RESULTS: Of 3061 participants, 208 (7%) were test seekers. They tended to be male and had a lower educational level. They were more likely to have incorrect knowledge about blood safety (e.g., not knowing that a unit can test antibody negative and still transmit infection, 60% vs. 42%, p = 0.02), express dissatisfaction with screening questions (e.g., feeling that important questions were not asked, 14% vs. 5%, p < 0.01), and concur that donors do not answer questions truthfully (e.g., donors have more sexual partners than they admit, 29% vs. 18%, p < 0.01). Test seekers were more likely to believe that it is acceptable to donate blood to get tested for HIV (41% vs. 10%, p < 0.01). CONCLUSIONS: Test-seeking motivation, coupled with low knowledge of window period risk, is counter to improving blood safety and to donor prevention needs. Donor education needs to be improved along with availability of appropriate HIV counseling and testing.
Resumo:
The current economic crisis has rushed even more the economists’ concerns to identify new directions for the sustainable development of the society. In this context, the human capital is crystallised as the key variable of the creative economy and of the knowledge-based society. As such, we have directed the research underlying this paper to identifying the most eloquent indicators of human capital to meet the demands of the knowledge-based society and sustainable development as well as towards achieving a comprehensive analysis of the human capital in the EU countries, respectively of a comparative analysis: Romania - Portugal. To carry out this paper, the methodology used is based on the interdisciplinary triangulation involving approaches from the perspective of human resource management, economy and economic statistics. The research techniques used consist of the content analysis and investigation of secondary data of international organisations accredited in the field of this research, such as: the United Nation Development Programme - Human Development Reports, World Bank - World Development Reports, International Labour Organisation, Eurostat, European Commission’s Eurobarometer surveys and reports on human capital. The research results emphasise both similarities and differences between the two countries under the comparative analysis and the main directions in which one has to invest for the development of human capital.
Resumo:
Customer lifetime value (LTV) enables using client characteristics, such as recency, frequency and monetary (RFM) value, to describe the value of a client through time in terms of profitability. We present the concept of LTV applied to telemarketing for improving the return-on-investment, using a recent (from 2008 to 2013) and real case study of bank campaigns to sell long- term deposits. The goal was to benefit from past contacts history to extract additional knowledge. A total of twelve LTV input variables were tested, un- der a forward selection method and using a realistic rolling windows scheme, highlighting the validity of five new LTV features. The results achieved by our LTV data-driven approach using neural networks allowed an improvement up to 4 pp in the Lift cumulative curve for targeting the deposit subscribers when compared with a baseline model (with no history data). Explanatory knowledge was also extracted from the proposed model, revealing two highly relevant LTV features, the last result of the previous campaign to sell the same product and the frequency of past client successes. The obtained results are particularly valuable for contact center companies, which can improve pre- dictive performance without even having to ask for more information to the companies they serve.
Resumo:
Tutkimuksen tavoitteena on selvittää, miten kirjallisuudessa kuvattua asiakkuuden hallintaa voitaisiin soveltaa keskuspankin maksuliikepalveluissa. Tarkasteltavana ovat yleiset toimintatavat, sekä asiakkuuden hallintaa tukevat järjestelmät. Tutkimuksen päätavoitteena on Help Desk toiminnan kehittäminen. Tutkimuksessa tarkastellaan asiakkuuden hallinnan eri osa-alueita ottaen huomioon sekä asiakkaan, että palvelun tarjoajan näkökulmat. Asiakkuuden hallinta ymmärretään strategiana, jolla kyetään kuvaamaan kuinka koko organisaatio toimii asiakkaiden kanssa. Asiakkuuden hallinnan ydin on asiakkaan arvontuotantoprosessin ymmärtäminen. Käytettyjä lähdeaineistoja ovat olleet alan kirjallisuus, artikkelit sekä Internet-lähteet. Empirian taustan ovat muodostaneet asiantuntijahaastattelut sekä keskuspankin julkaisut, sisäiset toimintaohjeet ja vakiintuneet käytännöt. Tutkimuksen keskeinen tulos on, että asiakkuudenhallinnan perusajatukset ovat monin tavoin sovellettavissa keskuspankin melko ainutkertaiseen, teknisesti ja viestinnällisesti vaativaan maksuliikepalveluympäristöön, vaikka asiakkaiden lukumäärä onkin pieni. Hyötyjä voidaan saavuttaa jo asiakkuudenhallinnan peruskomponenttien ml. strategianäkökulma tuntemuksella ja melko pieniltäkin näyttävillä toimintatapa-, työnkulku- ja asennemuutoksilla. Asiakkuuden hallintaa tukevan tietoteknologian jonkinasteinen käyttöönotto voi tuoda lisäarvoa, mutta sen kustannukset ja hyödyt on punnittava tämäntyyppisessä ympäristössä tarkoin.