Intelligence (ELINT) • Open Source Intelligence ( OSINT ) • Technical Intelligence (TECHINT) These intelligence disciplines produce... intelligence , measurement and signature intelligence , signals intelligence , and open - source data, in the production of intelligence . All- source intelligence ...All- Source Information Integration and Management) R&D Project 3 All- Source Intelligence
Presents an approach to using online sources of information for competitor intelligence (i.e., monitoring industry and tracking activities of competitors); identifies principal sources; and suggests some ways of making use of online databases. Types and sources of information and sources and database charts are appended. Eight references are…
Discusses issues connected with developing information systems for competitive intelligence support; defines the elements of an effective competitive information system; and summarizes issues affecting system design and implementation. Highlights include intelligence information; information needs; information sources; decision making; and…
Zhang Zhen; Wang Renbo
It presents from the collection of particle-ray counting, infrared data communication, real-time monitoring and alarming, GPRS and other issues start to realize the digital management of radioactive sources, complete the real-time monitoring of all aspects, include the storing of radioactive sources, transporting and using, framing intelligent radioactive sources transporter, as a result, achieving reliable security supervision of radioactive sources. (authors)
.... The causes of this neglect are many, ranging from previously mentioned predisposition toward classified intelligence sources to the technical challenge of information excess that overloads the users...
Jennifer Gradecki; Derek Curry
This paper discusses how an interactive artwork, the Crowd-Sourced Intelligence Agency (CSIA), can contribute to discussions of Big Data intelligence analytics. The CSIA is a publicly accessible Open Source Intelligence (OSINT) system that was constructed using information gathered from technical manuals, research reports, academic papers, leaked documents, and Freedom of Information Act files. Using a visceral heuristic, the CSIA demonstrates how the statistical correlations made by automate...
oceanographic information, human intelligence (HUMINT), open-source intelligence ( OSINT ), and information provided by other governmental departments [5...Human Intelligence IFT Information Foraging Theory LSA Latent Semantic Similarity MVT Marginal Value Theorem OFT Optimal Foraging Theory OSINT
Preparation of the Environment OSINT open source intelligence PNP SAF Philippines National Police Special Action Force SFA Security Force Assistance...intelligence functions which include (but are not limited to) human intelligence (HUMINT), open source intelligence ( OSINT ), and signals intelligence (SIGINT...intelligence ( OSINT ) is designed to capture information that hasn’t traditionally been considered part of the overall intelligence estimate. White
Full Text Available This paper discusses how an interactive artwork, the Crowd-Sourced Intelligence Agency (CSIA, can contribute to discussions of Big Data intelligence analytics. The CSIA is a publicly accessible Open Source Intelligence (OSINT system that was constructed using information gathered from technical manuals, research reports, academic papers, leaked documents, and Freedom of Information Act files. Using a visceral heuristic, the CSIA demonstrates how the statistical correlations made by automated classification systems are different from human judgment and can produce false-positives, as well as how the display of information through an interface can affect the judgment of an intelligence agent. The public has the right to ask questions about how a computer program determines if they are a threat to national security and to question the practicality of using statistical pattern recognition algorithms in place of human judgment. Currently, the public’s lack of access to both Big Data and the actual datasets intelligence agencies use to train their classification algorithms keeps the possibility of performing effective sous-dataveillance out of reach. Without this data, the results returned by the CSIA will not be identical to those of intelligence agencies. Because we have replicated how OSINT is processed, however, our results will resemble the type of results and mistakes made by OSINT systems. The CSIA takes some initial steps toward contributing to an informed public debate about large-scale monitoring of open source, social media data and provides a prototype for counterveillance and sousveillance tools for citizens.
This paper describes an intelligent information filtering system to assist users to be notified of updates to new and relevant medical information. Among the major problems users face is the large volume of medical information that is generated each day, and the need to filter and retrieve relevant information. The Internet has dramatically increased the amount of electronically accessible medical information and reduced the cost and time needed to publish. The opportunity of the Internet for the medical profession and consumers is to have more information to make decisions and this could potentially lead to better medical decisions and outcomes. However, without the assistance from professional medical librarians, retrieving new and relevant information from databases and the Internet remains a challenge. Many physicians do not have access to the services of a medical librarian. Most physicians indicate on surveys that they do not prefer to retrieve the literature themselves, or visit libraries because of the lack of recent materials, poor organisation and indexing of materials, lack of appropriate and available material, and lack of time. The information filtering system described in this paper records the online web browsing behaviour of each user and creates a user profile of the index terms found on the web pages visited by the user. A relevance-ranking algorithm then matches the user profiles to the index terms of new health care web pages that are added each day. The system creates customised summaries of new information for each user. A user can then connect to the web site to read the new information. Relevance feedback buttons on each page ask the user to rate the usefulness of the page to their immediate information needs. Errors in relevance ranking are reduced in this system by having both the user profile and medical information represented in the same representation language using a controlled vocabulary. This system also updates the user profiles
Discusses the application of artificial intelligence to online information retrieval systems and describes several systems: (1) CANSEARCH, from MEDLINE; (2) Intelligent Interface for Information Retrieval (I3R); (3) Gausch's Query Reformulation; (4) Environmental Pollution Expert (EP-X); (5) PLEXUS (gardening); and (6) SCISOR (corporate…
...) at Cornell during the first three years of operation. IISI's mandate is threefold: To perform and stimulate research in computational and data-intensive methods for intelligent decision making systems...
First page Back Continue Last page Graphics. Any technology that produces large amount of data like social media and CDR is a source of intelligence for the LEA. Any technology that produces large amount of data like social media and CDR is a source of intelligence for the LEA. Data Mining, Machine learning, Big Data, ...
Greene, H. Frances
Examines the competitive intelligence approach to corporate information gathering, and discusses how it differs from the traditional library information center approach. Steps for developing a competitive intelligence system in the library information center are suggested. (33 references) (MES)
Casanovas, Pompeu; Royal Melbourne Institute of Technology (Austràlia). Centre for Applied Social Research
Ponència presentada a European Conference on Social Intelligence (ECSI-2014) OSINT stands for Open Source Intelligence, (O)SI for (Open) Social Intelligence, PbD for Privacy by Design. The CAPER project has built an OSINT solution oriented to the prevention of organized crime. How to balance freedom and security? This position paper describes a way to embed the legal and ethical issues raised by the General Data Reform Package (GDRP) in Europe into this kind of surveillance platforms. It f...
"Hypertext" means a concept of a novel computer-assisted tool for storage and retrieval of text information based on human association. Structure of knowledge in our idea processing is generally complicated and networked, but traditional paper documents merely express it in essentially linear and sequential forms. However, recent advances in work-station technology have allowed us to process easily electronic documents containing non-linear structure such as references or hierarchies. This paper describes concept, history and basic organization of hypertext, and shows the outline and features of existing main hypertext systems. Particularly, use of the hypertext database is illustrated by an example of Intermedia developed by Brown University.
Barber, Sarah J.; Franklin, Nancy; Naka, Makiko; Yoshimura, Hiroki
Source monitoring is made difficult when the similarity between candidate sources increases. The current work examines how individual differences in social intelligence and perspective-taking abilities serve to increase source similarity and thus negatively impact source memory. Strangers first engaged in a cooperative storytelling task. On each…
Based upon the synopsis of system intelligence and information services, this paper puts forward the attributes and the logic structure of information service, sets forth intelligent technology framework of electronic information system, and presents a series of measures, such as optimizing business information flow, advancing data decision capability, improving information fusion precision, strengthening deep learning application and enhancing prognostic and health management, and demonstrates system operation effectiveness. This will benefit the enhancement of system intelligence.
Open Source Data Warehousing and Business Intelligence is an all-in-one reference for developing open source based data warehousing (DW) and business intelligence (BI) solutions that are business-centric, cross-customer viable, cross-functional, cross-technology based, and enterprise-wide. Considering the entire lifecycle of an open source DW & BI implementation, its comprehensive coverage spans from basic concepts all the way through to customization. Highlighting the key differences between open source and vendor DW and BI technologies, the book identifies end-to-end solutions that are scala
After reviewing the recent popularization of the information transmission and processing technologies, which are supported by the progress of electronics, the authors describe that by the introduction of the opto-electronics into the information technology, the possibility of applying the artificial intelligence (AI) technique to the mechanization of the information management has emerged. It is pointed out that althuogh AI deals with problems in the mental world, its basic methodology relies upon the verification by evidence, so the experiment on computers become indispensable for the study of AI. The authors also describe that as computers operate by the program, the basic intelligence which is concerned in AI is that expressed by languages. This results in the fact that the main tool of AI is the logical proof and it involves an intrinsic limitation. To answer a question “Why do you employ AI in your problem solving”, one must have ill-structured problems and intend to conduct deep studies on the thinking and the inference, and the memory and the knowledge-representation. Finally the authors discuss the application of AI technique to the information management. The possibility of the expert-system, processing of the query, and the necessity of document knowledge-base are stated.
The amount of publicly and often freely available information is staggering. Yet, the intelligence community still continues to collect and use information in the same manner as during WWII, when the OSS set out to learn as much as possible about Nazi Germany and Imperial Japan by scrutinizing encyclopedias, guide books, and short-wave radio. Today, the supply of information is greater than any possible demand, and anyone can provide information. In effect, intelligence analysts are drowning in information. The book explains how to navigate this rising flood and make best use of these new, ric
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach
Gheorghe BOARU, Ioan-Mihai ILIEŞ
Full Text Available There is a tight relationship between information assurance, the intelligence cycle and information superiority within NATO operations. The intelligence cycle has a discrete architecture and provides on-time and relevant intelligence products to the joint force commanders and to other authorized users in a specifi c joint area of operations. The intelligence cycle must follow the evolution of the operation. A permanent intelligence estimate will be performed during the military decision making process and operations execution. Information superiority is one of the most powerful intelligence cycle achievements. and decisively infuences the success of NATO joint operations. Information superiority must be preserved and enhanced through information assurance. Information assurance is an information operation that must be planned by the military in charge of operation security or by non-military experts, executed by all personnel during the entire intelligence cycle life time and employed during the planning and execution of NATO joint operations.
Zizah Che Senik
Full Text Available Small and medium enterprises (SMEs internationalization intelligence, referring to the process of gathering information and knowledge on international opportunities, is crucial to initiate SMEs’ internationalization. The literature has stressed organizational resources, networks and information sharing as means to acquire internationalization intelligence, suggesting that the resource-based, network and social capital perspectives can be adopted to explore this issue. However, previous literature still lacks evidence on how SMEs acquire relevant intelligence, and who or what are involved with the process. To address this lack of evidence, we interviewed 54 SME owners/key personnel in the manufacturing sector to: identify sources of internationalization intelligence; examine how those sources assist SMEs to internationalize; and develop propositions on internationalization intelligence. Analyzing the data using NVivo, four themes emerged including institutions, business associates, personal efforts, and other means. The analysis suggests internationalization intelligence occurs mainly through the networks of the SME owners/key personnel, built on their firm’s resources through their internal and external information sharing activities, indicating the need of the SMEs to position themselves in their environments. These findings are developed into propositions. The study indicates multiple perspectives in conceptualizing the process of internationalization intelligence. This study advances a conceptualization of internationalization intelligence, and offers avenues for future research.
Au, Thien-Wan; Omar, Saiful
This book constitutes the Proceedings of the Computational Intelligence in Information Systems conference (CIIS 2016), held in Brunei, November 18–20, 2016. The CIIS conference provides a platform for researchers to exchange the latest ideas and to present new research advances in general areas related to computational intelligence and its applications. The 26 revised full papers presented in this book have been carefully selected from 62 submissions. They cover a wide range of topics and application areas in computational intelligence and informatics.
Owing to the recent transitions in the Czech Republic, the Czech military must satisfy a large set of new requirements. One way the military intelligence can become more effective and can conserve resources is by increasing the efficiency of open-source intelligence (OSINT), which plays an important part in intelligence gathering in the age of information. When using OSINT effectively, the military intelligence can elevate its responsiveness to different types of crises and can also properly ...
Hendriks, P.H.J.; Vriens, D.J.
The spatial element, which is omnipresent in data and information relevant to organizations, is much underused in the decision-making processes within organizations. This applies also to decision-making within the domain of Competitive Intelligence. The chapter explores how the CI function may
Martin, J. Sperling
Outlines considerations in the design of a Competitive Intelligence Information Resource Center (CIIRC), which is needed by business organizations for effective strategic decision making. Discussed are user needs, user participation, information sources, technology and interface design, operational characteristics, and planning for implementation.…
A brief description of the technique to search for electronic documents in large archives as well as drawbacks is presented. A solution close to intelligent information searching systems is proposed. (author)
Tonfoni, G; Ichalkaranje, N S
The Internet/WWW has made it possible to easily access quantities of information never available before. However, both the amount of information and the variation in quality pose obstacles to the efficient use of the medium. Artificial intelligence techniques can be useful tools in this context. Intelligent systems can be applied to searching the Internet and data-mining, interpreting Internet-derived material, the human-Web interface, remote condition monitoring and many other areas. This volume presents the latest research on the interaction between intelligent systems (neural networks, adap
Badr, Youakim; Abraham, Ajith; Hassanien, Aboul-Ella
Web Intelligence explores the impact of artificial intelligence and advanced information technologies representing the next generation of Web-based systems, services, and environments, and designing hybrid web systems that serve wired and wireless users more efficiently. Multimedia and XML-based data are produced regularly and in increasing way in our daily digital activities, and their retrieval must be explored and studied in this emergent web-based era. 'Emergent Web Intelligence: Advanced information retrieval, provides reviews of the related cutting-edge technologies and insights. It is v
Jensen, Jesper; Taal, Cees H.
This paper deals with the problem of predicting the average intelligibility of noisy and potentially processed speech signals, as observed by a group of normal hearing listeners. We propose a model which performs this prediction based on the hypothesis that intelligibility is monotonically related...... to the mutual information between critical-band amplitude envelopes of the clean signal and the corresponding noisy/processed signal. The resulting intelligibility predictor turns out to be a simple function of the mean-square error (mse) that arises when estimating a clean critical-band amplitude using...... a minimum mean-square error (mmse) estimator based on the noisy/processed amplitude. The proposed model predicts that speech intelligibility cannot be improved by any processing of noisy critical-band amplitudes. Furthermore, the proposed intelligibility predictor performs well ( ρ > 0.95) in predicting...
Full Text Available The paper is based on research conducted by the author in the last decades of the twentieth century and the first decade of the third millennium, the modern scientific theory of crime investigation. The author's intention is to complete the huge gap that exists today in our scientific crime literature on the phenomenology of criminalistics intelligence sources. The presence of scientific and technical isolationist and conservative pragmatism in criminalistics theory in us, with whom I have never lied, accordingly, I have tried to work more fully convey the latest scientific views on foreign theory of criminology criminalistics intelligence sources as the primary tool for understanding, recognition and decoding of occurrence in the criminal milieu. From the above it is quite logical and scientific methodology established by first larly exposed to the general approach among law enforcement theory, the criminal underworld, and then access the research of criminalistics intelligence sources, through their determination to categorize the movement and management. From the results, the findings suggest that the traditional model definition, recruitment, management and installation source in a criminal milieu, which applies to us, abandoned for more than three decades of contemporary crime research and professional literature and practice in the world. Furthermore, the results indicate that it is of decisive importance to the understanding of criminalistics intelligence sources, methods of installation, movement models and management resources, to the criminal milieu could understand phenomena that are not visible, and carry with them the challenges, risks and threats. Not more contemporary understanding of the needs of society to counter the criminal activities of individuals or groups, it is enough to have informers or collaborators. Today, the world of crime must confront numerous, well-organized and professional criminalistics intelligence
КОЖУШКО, Ольга Олегівна; Інститут міжнародних відносин Національного авіаційного університету
The article deals with intelligence activity in the context of intelligence gathering methods. As an example of such activity is presented with open source intelligence (OSINT), its regulation and organization as a component of information activity of the U.S. intelligence services. В статье рассматривается разведывательная деятельность в контексте методов сбора разведывательных данных. Примером такой деятельности представлено разведку на основе анализа открытых источников информации (OSIN...
OSINT has become a developing information collection agency throughout the modern world of intelligence. Intelligence bodies and individuals keep expanding their use of information, profiting from the various technological security and civil applications now available in cyberspace. Professional collaborations are recommended, as they would significantly enhance the filtering and processing of open-source information in this age of metadata.
Saggion, Horacio; Funk, Adam; Maynard, Diana; Bontcheva, Kalina
Business Intelligence (BI) requires the acquisition and aggregation of key pieces of knowledge from multiple sources in order to provide valuable information to customers or feed statistical BI models and tools. The massive amount of information available to business analysts makes information extraction and other natural language processing tools key enablers for the acquisition and use of that semantic information. We describe the application of ontology-based extraction and merging in the context of a practical e-business application for the EU MUSING Project where the goal is to gather international company intelligence and country/region information. The results of our experiments so far are very promising and we are now in the process of building a complete end-to-end solution.
Miller, Jerry P.
Discusses the need for education programs for competitive intelligence professionals. Highlights include definitions of intelligence functions, focusing on business intelligence; information utilization by decision makers; information sources; competencies for intelligence professionals; and the development of formal education programs. (38…
The objective of this study is to present research on classical and intelligent information system solutions used in criminal intelligence analysis in Croatian security system theory. The study analyses objective and classical methods of information science, including artificial intelligence and other scientific methods. The intelligence and classical software solutions researched, proposed, and presented in this study were used in developing the integrated information system for the Croatian...
Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock
The abundance of information regarding any topic makes the Internet a very good resource. Even though searching the Internet is very easy, what remains difficult is to automate the process of information extraction from the available online information due to the lack of structure and the diversi...... with performance of our tool with respect to each format. Finally, the different potential applications of the proposed tool are discussed with special emphasis on open source intelligence....... in the sharing methods. Most of the times, information is stored in different proprietary formats, complying with different standards and protocols which makes tasks like data mining and information harvesting very difficult. In this paper, an information harvesting tool (heteroHarvest) is presented...... with objectives to address these problems by filtering the useful information and then normalizing the information in a singular non hypertext format. We also discuss state of the art tools along with the shortcomings and present the results of an analysis carried out over different heterogeneous formats along...
This paper urges that if we wish to give social intelligence to our agents, it pays to look at how we acquired our social intelligence ourselves. Our drives and motives are innate and deeply social. Next, as children we are social-ized to acquire norms and values. This motivational and group-based
... 32 National Defense 4 2010-07-01 2010-07-01 true Police Intelligence/Criminal Information. 635.5... ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Records Administration § 635.5 Police Intelligence/Criminal Information. (a) The purpose of gathering police intelligence is to identify individuals...
Of the seven intelligence disciplines, OSINT is least appreciated, understood, or employed by staffs and organizations supporting the operational commander despite past successes at the strategic and tactical levels...
Johnson, R.R.; Canales, T.W.; Lager, D.L.
This paper describes a system that automates neutral beam source conditioning. The system achieves this with artificial intelligence techniques. The architecture of the system is presented followed by a description of its performance
Johnson, R.R.; Canales, T.; Lager, D.
This paper describes a system that automates neutral beam source conditioning. The system achieves this with artificial intelligence techniques. The architecture of the system is presented followed by a description of its performance
Initiative NYFD New York Fire Department NYPD New York Police Department OLAP On Line Analytics Processing OSINT Open Source Intelligence...Intelligence ( OSINT ), from public websites, media sources, and other unclassified events and reports. Although some of these sources do not have a direct
Fiene, Bruce F.
The Community Open Source Program Office (COSPO) has developed an architecture for the intelligence community's new Open Source Information System (OSIS). The architecture is a multi-phased program featuring connectivity, interoperability, and functionality. OSIS is based on a distributed architecture concept. The system is designed to function as a virtual entity. OSIS will be a restricted (non-public), user configured network employing Internet communications. Privacy and authentication will be provided through firewall protection. Connection to OSIS can be made through any server on the Internet or through dial-up modems provided the appropriate firewall authentication system is installed on the client.
Yang, Bogang; Tao, Yingchun; Sui, Jianbo; Zhang, Feizhou
Aiming at solving practical problems in urban traffic, the paper presents model architecture of intelligent data mining from hierarchical view. With artificial intelligent technologies used in the framework, the intelligent data mining technology improves, which is more suitable for the change of real-time road condition. It also provides efficient technology support for the urban transport information distribution, transmission and display.
Campbell, William J.; Short, Nicholas, Jr.; Rolofs, Larry H.; Wattawa, Scott L.
NASA has initiated the Intelligent Data Management Project to design and develop advanced information management systems. The project's primary goal is to formulate, design and develop advanced information systems that are capable of supporting the agency's future space research and operational information management needs. The first effort of the project was the development of a prototype Intelligent User Interface to an operational scientific database, using expert systems and natural language processing technologies. An overview of Intelligent User Interface formulation and development is given.
Prangishvili, I.V.; Pashchenko, F.F.; Saprykin, E.M.
Problems related to creation and introduction at NPP of highly efficient and reliable systems for monitoring and control of working processes and intelligence-endowed systems of operator informational support (ISOIS) are considered. The main units included in ISOIS are considered. The main units included in ISOIS are described. The unit of current state monitoring provides information for the operator, which is necessary under concrete conditions for the process monitoring and control, so as to avoid emergencies and affers a program of actions in a dialogue mode for the operator. The identification unit is designed for the obtaining of assessed values of process parameters (neutron fields, temperatures, pressures) and basic equipment (reactivity coefficients, fuel rod weights, time of delay). The prediction unit evaluates the behaviour of process parameters and process state in various situations. 9 refs
This master's thesis focuses on the issues of selecting the Business Intelligence tools distributed under open source licenses. The main objective of this work is to compare the different instruments in all layers of the Business Intelligence architecture. The first part is focused on the definition of key concepts of the main topic. Provides necessary theoretical basis for understanding the context used in the practical part, which is dedicated to comparison tools realized according to the e...
Thomsen, Christian; Pedersen, Torben Bach
The industrial use of open source Business Intelligence (BI) tools is becoming more common, but is still not as widespread as for other types of software. It is therefore of interest to explore which possibilities are available for open source BI and compare the tools. In this survey paper, we co...
Full Text Available My proposal is based on my doctoral dissertation On the Shoulders of AI-technology : Sociology of Knowledge and Strong Artificial Intelligence which I succesfully defended on May 29th 2009. E-published http://www.lu.se/o.o.i.s?id=12588&postid=1389611 The dissertation is concerned with Sociology’s stance in the debate on Strong Artificial Intelligence,.i.e. AI-systems that is able to shape knowledge on their own. There is a need for sociologists to realize the difference between two approaches to constructing AI systems: Symbolic AI (or Classic AI and Connectionistic AI in a distributed model – DAI. Sociological literature shows a largely critical attitude towards Symbolic AI, an attitude that is justified. The main theme of the dissertation is that DAI is not only compatible with Sociology’s approach to what is social, but also constitutes an apt model of how a social system functions. This is consolidated with help from german sociologist Niklas Luhmann’s social systems theory. A lot of sociologists criticize AI because they think that diversity is important and can only be comprehended in informal circumstances that only humans interacting together can handle. They mean that social intelligence is needed to make something out of diversity and informalism. Luhmann´s systems theory gives the opposite perspective. It tells us that it is social systems that communicate and produce new knowledge structures out of contincency. Psychological systems, i.e. humans, can only think within the circumstances the social system offer. In that way human thoughts are bound by formalism. Diversity is constructed when the social systems interact with complexity in their environments. They reduce the complexity and try to present it as meaningful diversity. Today when most of academic literature is electronically stored and is accessible through the Internet from al over the world, DAI can help social systems to observe and reduce complexity in this
Malin, Jane T.; Schreckenghost, Debra L.
Recommendations are made for improving intelligent system reliability and usability based on the use of information requirements in system development. Information requirements define the task-relevant messages exchanged between the intelligent system and the user by means of the user interface medium. Thus, these requirements affect the design of both the intelligent system and its user interface. Many difficulties that users have in interacting with intelligent systems are caused by information problems. These information problems result from the following: (1) not providing the right information to support domain tasks; and (2) not recognizing that using an intelligent system introduces new user supervisory tasks that require new types of information. These problems are especially prevalent in intelligent systems used for real-time space operations, where data problems and unexpected situations are common. Information problems can be solved by deriving information requirements from a description of user tasks. Using information requirements embeds human-computer interaction design into intelligent system prototyping, resulting in intelligent systems that are more robust and easier to use.
Prevedello, Luciano M; Andriole, Katherine P; Hanson, Richard; Kelly, Pauline; Khorasani, Ramin
Digital radiology departments could benefit from the ability to integrate and visualize data (e.g. information reflecting complex workflow states) from all of their imaging and information management systems in one composite presentation view. Leveraging data warehousing tools developed in the business world may be one way to achieve this capability. In total, the concept of managing the information available in this data repository is known as Business Intelligence or BI. This paper describes the concepts used in Business Intelligence, their importance to modern Radiology, and the steps used in the creation of a prototype model of a data warehouse for BI using open-source tools.
Kathrin Rodríguez Llanes
Full Text Available Making decisions is complicated in a generalized way, the materials and humans resources of the entity we belong to depends on it, such as the fulfillment of its goals. But when the situations are complex, making decisions turns into a very difficult work, due to the great amount of aspects to consider when making the right choice. To make this efficiently the administration must to consult an important volume of information, which generally, is scattered and in any different formats. That’s why appears the need of developing software that crowd together all that information and be capable of, by using powerful search engines and process algorithms improve the good decisions making process. Considering previous explanation, a complete freeware developed product is proposed, this constitutes a generic and multi-platform solution, that using artificial intelligence techniques, specifically the cases based reasoning, gives the possibility to leaders of any institution or organism of making the right choice in any situation.With client-server architecture, this system is consumed from web as a service and it can be perfectly integrated with a management system or the geographic information system to facilitate the business process.
Full Text Available Most organizations strive to obtain fast, interactive and insightful analytics in order to fundament the most effective and profitable decisions. They need to incorporate huge amounts of data in order to run analysis based on queries and reports with collaborative capabilities. The large variety of Business Intelligence solutions on the market makes it very difficult for organizations to select one and evaluate the impact of the selected solution to the organization. The need of a strategy to help organization chose the best solution for investment emerges. In the past, Business Intelligence (BI market was dominated by closed source and commercial tools, but in the last years open source solutions developed everywhere. An Open Source Business Intelligence solution can be an option due to time-sensitive, sprawling requirements and tightening budgets. This paper presents a practical solution implemented in a suite of Open Source Business Intelligence products called Pentaho Business Analytics, which provides data integration, OLAP services, reporting, dashboarding, data mining and ETL capabilities. The study conducted in this paper suggests that the open source phenomenon could become a valid alternative to commercial platforms within the BI context.
Europeans are now taking steps to homogenize policies and standardize procedures in electronic publishing (EP) in astronomy and space sciences. This arose from an open meeting organized in Oct. 1991 at Strasbourg Observatory (France) and another business meeting held late Mar. 1992 with the major publishers and journal editors in astronomy and space sciences. The ultimate aim of EP might be considered as the so-called 'intelligent information retrieval' (IIR) or better named 'advanced information retrieval' (AIR), taking advantage of the fact that the material to be published appears at some stage in a machine-readable form. It is obvious that the combination of desktop and electronic publishing with networking and new structuring of knowledge bases will profoundly reshape not only our ways of publishing, but also our procedures of communicating and retrieving information. It should be noted that a world-wide survey among astronomers and space scientists carried out before the October 1991 colloquium on the various packages and machines used, indicated that TEX-related packages were already in majoritarian use in our community. It has also been stressed at each meeting that the European developments should be carried out in collaboration with what is done in the US (STELLAR project, for instance). American scientists and journal editors actually attended both meetings mentioned above. The paper will offer a review of the status of electronic publishing in astronomy and its possible contribution to advanced information retrieval in this field. It will also report on recent meetings such as the 'Astronomy from Large Databases-2 (ALD-2)' conference dealing with the latest developments in networking, in data, information, and knowledge bases, as well as in the related methodologies.
Garde - Perik, van de E.M.
Current developments towards Ambient Intelligence and related technological visions of the future are founded on continuous collection of information about individuals and their activities. This collection of information, its potentially persistent storage, dissemination and use raise privacy
Koops, B.J.; Hoepman, J.H.; Leenes, R.
As demonstrated by other papers on this issue, open-source intelligence (OSINT) by state authorities poses challenges for privacy protection and intellectual-property enforcement. A possible strategy to address these challenges is to adapt the design of OSINT tools to embed normative requirements,
Pouchard, Line Catherine [ORNL; Trien, Joseph P [ORNL; Dobson, Jonathan D [ORNL
Following legislative directions, the Intelligence Community has been mandated to make greater use of Open Source Intelligence (OSINT). Efforts are underway to increase the use of OSINT but there are many obstacles. One of these obstacles is the lack of tools helping to manage the volume of available data and ascertain its credibility. We propose a unique system for selecting, collecting and storing Open Source data from the Web and the Open Source Center. Some data management tasks are automated, document source is retained, and metadata containing geographical coordinates are added to the documents. Analysts are thus empowered to search, view, store, and analyze Web data within a single tool. We present ORCAT I and ORCAT II, two implementations of the system.
Full Text Available This paper aims to present theBusiness Intelligence toolsas an element improvingflow of information withinthe management information systemand as atool to facilitate theachieving the objectives ofinformation supply system.In the firstpart of the paperthe author presents the issuesrelatedto the specific character of information as a kind of resource and functioning ofthe information supply systemin the enterprise. The secondpart of the articleincludethe characteristics ofBusiness Intelligence systems. The thirdpart deals withthe impact ofBusiness Intelligence toolsto the ongoingactivities ofinformation supply system.
Revolution on the Market for Information The major effect of this explosion in technology is the proliferation of information consumers and providers. Their... technology . The State Department gives its policymakers the least connectivity to any real time or electronic information as its officials lack Internet ...connectivity than others to the intelligence community, as well as to the Internet and other sources of information age open sources. This will have a profound
Competitor information gathering is a key aspect of business planning. Information can be collected from either published or unpublished sources. Unpublished information will often be verified based on material from published sources. Published information is more likely to be factual and includes financial, stockmarket, press, market and…
Boonjing, Veera; Chittayasothorn, Suphamit
This book consists of 35 chapters presenting different theoretical and practical aspects of Intelligent Information and Database Systems. Nowadays both Intelligent and Database Systems are applied in most of the areas of human activities which necessitates further research in these areas. In this book various interesting issues related to the intelligent information models and methods as well as their advanced applications, database systems applications, data models and their analysis, and digital multimedia methods and applications are presented and discussed both from the practical and theoretical points of view. The book is organized in four parts devoted to intelligent systems models and methods, intelligent systems advanced applications, database systems methods and applications, and multimedia systems methods and applications. The book will be interesting for both practitioners and researchers, especially graduate and PhD students of information technology and computer science, as well more experienced ...
Madeyski, Lech; Nguyen, Ngoc
The objective of this book is to contribute to the development of the intelligent information and database systems with the essentials of current knowledge, experience and know-how. The book contains a selection of 40 chapters based on original research presented as posters during the 8th Asian Conference on Intelligent Information and Database Systems (ACIIDS 2016) held on 14–16 March 2016 in Da Nang, Vietnam. The papers to some extent reflect the achievements of scientific teams from 17 countries in five continents. The volume is divided into six parts: (a) Computational Intelligence in Data Mining and Machine Learning, (b) Ontologies, Social Networks and Recommendation Systems, (c) Web Services, Cloud Computing, Security and Intelligent Internet Systems, (d) Knowledge Management and Language Processing, (e) Image, Video, Motion Analysis and Recognition, and (f) Advanced Computing Applications and Technologies. The book is an excellent resource for researchers, those working in artificial intelligence, mu...
Daniels, Daniel B., III
There is a lack of literature linking end-user behavior to the availability of open-source intelligence (OSINT). Most OSINT literature has been focused on the use and assessment of open-source intelligence, not the proliferation of personally or organizationally identifiable information (PII/OII). Additionally, information security studies have…
Thomsen, Christian; Pedersen, Torben Bach
The industrial use of open source Business Intelligence (BI) tools is not yet common. It is therefore of interest to explore which possibilities are available for open source BI and compare the tools. In this survey paper, we consider the capabilities of a number of open source tools for BI....... In the paper, we consider three Extract-Transform-Load (ETL) tools, three On-Line Analytical Processing (OLAP) servers, two OLAP clients, and four database management systems (DBMSs). Further, we describe the licenses that the products are released under. It is argued that the ETL tools are still not very...
This report documents the research project AHMCT IRIS Technical Support and Testing, : performed under contract 65A0275, Task ID 1777. It presents an overview of the Intelligent : Roadway Information System (IRIS), and its design and function. ...
Best Jr., Richard A
Almost all assessments of the attacks of September 11, 2001, have concluded that U.S. intelligence and law enforcement agencies had failed to share information that might have provided advance warning of the plot...
Thornlow, Christopher C
... and Law Enforcement Communities to fuse and analyze foreign threat intelligence with domestic law enforcement information in a timely fashion to provide adequate indications and warning of such an...
This book presents various recent applications of Artificial Intelligence in Information and Communication Technologies such as Search and Optimization methods, Machine Learning, Data Representation and Ontologies, and Multi-agent Systems. The main aim of this book is to help Information and Communication Technologies (ICT) practitioners in managing efficiently their platforms using AI tools and methods and to provide them with sufficient Artificial Intelligence background to deal with real-life problems. .
Jain, Lakhmi; Zhao, Xiangmo
This volume includes the proceedings of the 2015 International Conference on Information Technology and Intelligent Transportation Systems (ITITS 2015) which was held in Xi’an on December 12-13, 2015. The conference provided a platform for all professionals and researchers from industry and academia to present and discuss recent advances in the field of Information Technology and Intelligent Transportation Systems. The presented information technologies are connected to intelligent transportation systems including wireless communication, computational technologies, floating car data/floating cellular data, sensing technologies, and video vehicle detection. The articles focusing on intelligent transport systems vary in the technologies applied, from basic management systems to more application systems including topics such as emergency vehicle notification systems, automatic road enforcement, collision avoidance systems and some cooperative systems. The conference hosted 12 invited speakers and over 200 part...
Agha Faisal Habib Pathan
Full Text Available This paper addresses the significance of traveller information sources including mono-modal and multimodal websites for travel decisions. The research follows a decision paradigm developed earlier, involving an information acquisition process for travel choices, and identifies the abstract characteristics of new information sources that deserve further investigation (e.g. by incorporating these in models and studying their significance in model estimation. A Stated Preference experiment is developed and the utility functions are formulated by expanding the travellers' choice set to include different combinations of sources of information. In order to study the underlying choice mechanisms, the resulting variables are examined in models based on different behavioural strategies, including utility maximisation and minimising the regret associated with the foregone alternatives. This research confirmed that RRM (Random Regret Minimisation Theory can fruitfully be used and can provide important insights for behavioural studies. The study also analyses the properties of travel planning websites and establishes a link between travel choices and the content, provenance, design, presence of advertisements, and presentation of information. The results indicate that travellers give particular credence to governmentowned sources and put more importance on their own previous experiences than on any other single source of information. Information from multimodal websites is more influential than that on train-only websites. This in turn is more influential than information from friends, while information from coachonly websites is the least influential. A website with less search time, specific information on users' own criteria, and real time information is regarded as most attractive
Suggests that the principles underlying the procedure used by doctors to diagnose a patient's disease are useful in the design of intelligent information-retrieval systems because the task of the doctor is conceptually similar to the computer or human intermediary's task in information retrieval: to draw out the user's query/information need.…
闵君; 冯珊; 唐超; 许立达
With the propagation of applications on the internet, the internet has become a great information source which supplies users with valuable information. But it is hard for users to quickly acquire the right information on the web. This paper an intelligent agent for internet applications to retrieve and extract web information under user's guidance. The intelligent agent is made up of a retrieval script to identify web sources, an extraction script based on the document object model to express extraction process, a data translator to export the extracted information into knowledge bases with frame structures, and a data reasoning to reply users' questions. A GUI tool named Script Writer helps to generate the extraction script visually, and knowledge rule databases help to extract wanted information and to generate the answer to questions.
Ashish, Naveen; Goforth, Andre
Information fusion from multiple sources is a critical requirement for System Wide Information Management in the National Airspace (NAS). NASA and the FAA envision creating an "integrated pool" of information originally coming from different sources, which users, intelligent agents and NAS decision support tools can tap into. In this paper we present the results of our initial investigations into the requirements and prototype development of such an integrated information pool for the NAS. We have attempted to ascertain key requirements for such an integrated pool based on a survey of DSS tools that will benefit from this integrated pool. We then advocate key technologies from computer science research areas such as the semantic web, information integration, and intelligent agents that we believe are well suited to achieving the envisioned system wide information management capabilities.
Mareš, Milan; Mesiar, Radko
Roč. 49, č. 3 (2013), s. 433-445 ISSN 0023-5954 R&D Projects: GA ČR GAP402/11/0378 Keywords : alphabet * triangular norm * information * entropy * fuzziness * data source Subject RIV: BA - General Mathematics Impact factor: 0.563, year: 2013 http://library.utia.cas.cz/separaty/2013/E/mesiar-information in vague data sources.pdf
Chiaramella, Y.; Defude, B.
Discusses expert systems and their value as components of information retrieval systems related to semantic inference, and describes IOTA, a model of an intelligent information retrieval system which emphasizes natural language query processing. Experimental results are discussed and current and future developments are highlighted. (Author/LRW)
Nguyen, Ngoc; Shirai, Kiyoaki
This book presents recent research in intelligent information and database systems. The carefully selected contributions were initially accepted for presentation as posters at the 9th Asian Conference on Intelligent Information and Database Systems (ACIIDS 2017) held from to 5 April 2017 in Kanazawa, Japan. While the contributions are of an advanced scientific level, several are accessible for non-expert readers. The book brings together 47 chapters divided into six main parts: • Part I. From Machine Learning to Data Mining. • Part II. Big Data and Collaborative Decision Support Systems, • Part III. Computer Vision Analysis, Detection, Tracking and Recognition, • Part IV. Data-Intensive Text Processing, • Part V. Innovations in Web and Internet Technologies, and • Part VI. New Methods and Applications in Information and Software Engineering. The book is an excellent resource for researchers and those working in algorithmics, artificial and computational intelligence, collaborative systems, decisio...
Skonieczny, Lukasz; Rybiński, Henryk; Niezgodka, Marek
This book is a selection of results obtained within one year of research performed under SYNAT - a nation-wide scientific project aiming to create an infrastructure for scientific content storage and sharing for academia, education and open knowledge society in Poland. The selection refers to the research in artificial intelligence, knowledge discovery and data mining, information retrieval and natural language processing, addressing the problems of implementing intelligent tools for building a scientific information platform. The idea of this book is based on the very successful SYNAT Project Conference and the SYNAT Workshop accompanying the 19th International Symposium on Methodologies for Intelligent Systems (ISMIS 2011). The papers included in this book present an overview and insight into such topics as architecture of scientific information platforms, semantic clustering, ontology-based systems, as well as, multimedia data processing.
Doyle, Laurance R.; McCowan, Brenda; Johnston, Simon; Hanser, Sean F.
We present ongoing research in the application of information theory to animal communication systems with the goal of developing additional detectors and estimators for possible extraterrestrial intelligent signals. Regardless of the species, for intelligence (i.e., complex knowledge) to be transmitted certain rules of information theory must still be obeyed. We demonstrate some preliminary results of applying information theory to socially complex marine mammal species (bottlenose dolphins and humpback whales) as well as arboreal squirrel monkeys, because they almost exclusively rely on vocal signals for their communications, producing signals which can be readily characterized by signal analysis. Metrics such as Zipf's Law and higher-order information-entropic structure are emerging as indicators of the communicative complexity characteristic of an "intelligent message" content within these animals' signals, perhaps not surprising given these species' social complexity. In addition to human languages, for comparison we also apply these metrics to pulsar signals—perhaps (arguably) the most "organized" of stellar systems—as an example of astrophysical systems that would have to be distinguished from an extraterrestrial intelligence message by such information theoretic filters. We also look at a message transmitted from Earth (Arecibo Observatory) that contains a lot of meaning but little information in the mathematical sense we define it here. We conclude that the study of non-human communication systems on our own planet can make a valuable contribution to the detection of extraterrestrial intelligence by providing quantitative general measures of communicative complexity. Studying the complex communication systems of other intelligent species on our own planet may also be one of the best ways to deprovincialize our thinking about extraterrestrial communication systems in general.
Full Text Available Trust is essential to understanding public reaction to innovative issues. This research focuses on trust in information sources by explicating the construct of trust and testing a comprehensive model on several information sources about genetically modified foods. Results from a survey of 369 participants reveal the significance of projecting competence and the role of the environment in which a target public receives information. Perceptions of regulatory, social, business, and technical environments affect how likely individuals are to follow advice from institutions like the Food and Drug Administration and the news media. Future research should incorporate knowledge levels and personal relevance as variables likely to influence trusting relationships.
The recent pursuits emerging in the realm of big data processing, interpretation, collection and organization have emerged in numerous sectors including business, industry, and government organizations. Data sets such as customer transactions for a mega-retailer, weather monitoring, intelligence gathering, quickly outpace the capacities of traditional techniques and tools of data analysis. The 3V (volume, variability and velocity) challenges led to the emergence of new techniques and tools in data visualization, acquisition, and serialization. Soft Computing being regarded as a plethora of technologies of fuzzy sets (or Granular Computing), neurocomputing and evolutionary optimization brings forward a number of unique features that might be instrumental to the development of concepts and algorithms to deal with big data. This carefully edited volume provides the reader with an updated, in-depth material on the emerging principles, conceptual underpinnings, algorithms and practice of Computational Intelligenc...
Thomsen, Christian; Pedersen, Torben Bach
The industrial use of open source Business Intelligence (BI) tools is becoming more common, but is still not as widespread as for other types of software. It is therefore of interest to explore which possibilities are available for open source BI and compare the tools. In this survey paper, we c......The industrial use of open source Business Intelligence (BI) tools is becoming more common, but is still not as widespread as for other types of software. It is therefore of interest to explore which possibilities...... are available for open source BI and compare the tools. In this survey paper, we consider the capabilities of a number of open source tools for BI. In the paper, we consider a number of Extract‐Transform‐Load (ETL) tools, database management systems (DBMSs), On‐Line Analytical Processing (OLAP) servers, and OLAP clients. We find that, unlike the situation a few years ago, there now...
Full Text Available [Purpose/significance] Information search capability is the focus of information literacy education. This paper explores the relationship between emotional intelligence and information search behavior. [Method/process] Based on the data from the questionnaires by 250 undergraduates, this paper used IBM SPSS Statistics 19.0 for statistical data analysis. [Result/conclusion]The correlation between emotional intelligence and information search capability is positively obvious. When it comes to all variables in the regression equation, information search behavior is mainly affected by regulation and utilization of the dimension of emotion. Utilization of emotion mainly affects retrieval strategies, information evaluation, behavior adjustment and total score; regulation of emotions mainly affects the information reference.
Felipe Gama Buzzerio
Full Text Available This article examines the prospect of Competitive Intelligence (CI constitute a source of competitive advantage in light of the Resource Based View and its contribution to the strategic management of the company. Relies on exploratory and descriptive research using the qualitative method. Six managers responsible for CI activities institutionalized in large different business companies were interviewed. Data were processed and analyzed with the application of content analysis. It was concluded that the CI is unable to be a source of competitive advantage but rather as an effective support to decision making process in the surveyed companies. Apparently CI products meet the specific needs of internal customers, facilitate the integration of CI with marketing and operations, help in the identification of risks through the analysis of strategic information, which is a differentiator compared to other types of intelligences.
1 DM-0001694 Fusing Open Source Intelligence and Handheld Situational Awareness Benghazi Case Study Jeff Boleng, PhD Marc Novakouski Gene...command and control element at the CIA compound that would have been monitoring OSINT and other sources of intelligence before the attack and... Source Intelligence and Handheld Situational Awareness - Benghazi Case Study 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6
Sjoeberg, J [Swedish Armed Forces HQ, Stockholm (Sweden)
The purpose of my presentation is to provide some thoughts on Open Sources and how Open Sources can be used as tools for detecting illicit trafficking and proliferation. To fulfill this purpose I would like to deal with the following points during my presentation: What is Open Source? How can it be defined? - Different sources - Methods. Open Source information can be defined as publicly available information as well as other unclassified information that has limited public distribution or access to it. It comes in print, electronic or oral form. It can be found distributed either to the mass public by print or electronic media or to a much more limited customer base like companies, experts or specialists of some kind including the so called gray literature. Open Source information is not a single source but a multi-source. Thus, you can say that Open Sources does not say anything about the information itself, it only refers to if the information is classified or not.
The purpose of my presentation is to provide some thoughts on Open Sources and how Open Sources can be used as tools for detecting illicit trafficking and proliferation. To fulfill this purpose I would like to deal with the following points during my presentation: What is Open Source? How can it be defined? - Different sources - Methods. Open Source information can be defined as publicly available information as well as other unclassified information that has limited public distribution or access to it. It comes in print, electronic or oral form. It can be found distributed either to the mass public by print or electronic media or to a much more limited customer base like companies, experts or specialists of some kind including the so called gray literature. Open Source information is not a single source but a multi-source. Thus, you can say that Open Sources does not say anything about the information itself, it only refers to if the information is classified or not
Zheng, Guangzhi; Zhang, Chi; Li, Lei
Business intelligence (BI) and healthcare analytics are the emerging technologies that provide analytical capability to help healthcare industry improve service quality, reduce cost, and manage risks. However, such component on analytical healthcare data processing is largely missed from current healthcare information technology (HIT) or health…
Full Text Available This study proposes an intelligent algorithm that can realize information fusion in reference to the relative research achievements in brain cognitive theory and innovative computation. This algorithm treats knowledge as core and information fusion as a knowledge-based innovative thinking process. Furthermore, the five key parts of this algorithm including information sense and perception, memory storage, divergent thinking, convergent thinking, and evaluation system are simulated and modeled. This algorithm fully develops innovative thinking skills of knowledge in information fusion and is a try to converse the abstract conception of brain cognitive science to specific and operable research routes and strategies. Furthermore, the influences of each parameter of this algorithm on algorithm performance are analyzed and compared with those of classical intelligent algorithms trough test. Test results suggest that the algorithm proposed in this study can obtain the optimum problem solution by less target evaluation times, improve optimization effectiveness, and achieve the effective fusion of information.
Full Text Available We propose an intelligent and an efficient query processing approach for semantic mediation of information systems. We propose also a generic multi agent architecture that supports our approach. Our approach focuses on the exploitation of intelligent agents for query reformulation and the use of a new technology for the semantic representation. The algorithm is self-adapted to the changes of the environment, offers a wide aptitude and solves the various data conflicts in a dynamic way; it also reformulates the query using the schema mediation method for the discovered systems and the context mediation for the other systems.
This volume contains 60 papers presented at ICTIS 2015: International Conference on Information and Communication Technology for Intelligent Systems. The conference was held during 28th and 29th November, 2015, Ahmedabad, India and organized communally by Venus International College of Technology, Association of Computer Machinery, Ahmedabad Chapter and Supported by Computer Society of India Division IV – Communication and Division V – Education and Research. This volume contains papers mainly focused on ICT and its application for Intelligent Computing, Cloud Storage, Data Mining, Image Processing and Software Analysis etc.
Full Text Available The amount of textual information published on the Internet is considered tobe in billions of web pages, blog posts, comments, social media updates andothers. Analyzing such quantities of data requires high level of distribution –both data and computing. This is especially true in case of complex algorithms,often used in text mining tasks.The paper presents a prototype implementation of CLUO – an Open SourceIntelligence (OSINT system, which extracts and analyzes signiﬁcant quantitiesof openly available information.
Natalia Georgievna Miloslavskaya
Full Text Available There is a transfer from the simple Log Management Systems and SIEM systems to those supporting Information Security Intelligence (ISI. ISIe as Business Intelligence enables companies to make more informed business decisions through more effective processing of great volumes of available information concerning their IT infrastructure. The relevance of such a transition is defined. The main goal and advantage of ISI are highlighted. The basic functionality of computer-based systems for ISI are determined.
Natalia Georgievna Miloslavskaya; Aleksandr Ivanovich Tolstoy
There is a transfer from the simple Log Management Systems and SIEM systems to those supporting Information Security Intelligence (ISI). ISIe as Business Intelligence enables companies to make more informed business decisions through more effective processing of great volumes of available information concerning their IT infrastructure. The relevance of such a transition is defined. The main goal and advantage of ISI are highlighted. The basic functionality of computer-based systems for ISI ar...
Nunes, Paulo; Correia, Anacleto; Teodoro, M. Filomena
Information is a key subject in modern organization operations. The success of joint and combined operations with organizations partners depends on the accurate information and knowledge flow concerning the operations theatre: provision of resources, environment evolution, markets location, where and when an event occurred. As in the past and nowadays we cannot conceive modern operations without maps and geo-spatial information (GI). Information and knowledge management is fundamental to the success of organizational decisions in an uncertainty environment. The georeferenced information management is a process of knowledge management, it begins in the raw data and ends on generating knowledge. GI and intelligence systems allow us to integrate all other forms of intelligence and can be a main platform to process and display geo-spatial-time referenced events. Combining explicit knowledge with peoples know-how to generate a continuous learning cycle that supports real time decisions mitigates the influences of fog of everyday competition and provides the knowledge supremacy. Extending the preliminary analysis done in , this work applies the exploratory factor analysis to a questionnaire about the GI and intelligence management in an organization company allowing to identify future lines of action to improve information process sharing and exploration of all the potential of this important resource.
David R. Mandel
Full Text Available An experiment was conducted to test the effectiveness of brief instruction in information structuring (i.e., representing and integrating information for improving the coherence of probability judgments and binary choices among intelligence analysts. Forty-three analysts were presented with comparable sets of Bayesian judgment problems before and immediately after instruction. After instruction, analysts’ probability judgments were more coherent (i.e., more additive and compliant with Bayes theorem. Instruction also improved the coherence of binary choices regarding category membership: after instruction, subjects were more likely to invariably choose the category to which they assigned the higher probability of a target’s membership. The research provides a rare example of evidence-based validation of effectiveness in instruction to improve the statistical assessment skills of intelligence analysts. Such instruction could also be used to improve the assessment quality of other types of experts who are required to integrate statistical information or make probabilistic assessments.
organized intelligence with a comprehensive account of the information derived, validated by intelligence requirements tasking. Third Phase...AU/ACSC/MORALES/AY17 AIR COMMAND AND STAFF COLLEGE DISTANCE LEARNING AIR UNIVERSITY DATA MAYHEM VERSUS NIMBLE INFORMATION : TRANSFORMING...HECTIC IMAGERY INTELLIGENCE DATA INTO ACTIONABLE INFORMATION USING ARTIFICIAL NEURAL NETWORKS by Luis A. Morales, Major, USAF A Research
Trapeznikov, E. V.
The technology development has shown the automated system information security comprehensive analysis necessity. The subject area analysis indicates the study relevance. The research objective is to develop the information security system quality assessment methodology based on the intelligent tools. The basis of the methodology is the information security assessment model in the information system through the neural network. The paper presents the security assessment model, its algorithm. The methodology practical implementation results in the form of the software flow diagram are represented. The practical significance of the model being developed is noted in conclusions.
Robert L. Wiegel
Full Text Available This is Part 3 of Tsunami Information Sources published by Robert L. Wiegel, as Technical Report UCB/HEL 2006-3 of the Hydraulic Engineering Laboratory of the Department of Civil & Environmental Engineering of the University of California at Berkeley. Part 3 is published in "SCIENCE OF TSUNAMI HAZARDS" -with the author's permission -so that it can receive wider distribution and use by the Tsunami Scientific Community.
Full Text Available Abstract: In this paper, the importance of CTI for the innovation management of companies will be discussed, including the barriers, the core structure of the CTI unit and a proper search process from top management to concrete research outputs. To begin with, we need to define the environment where the innovation activities are being conducted. In the second part, we put CTI in the organizational framework of the companies, and in the third part we discuss the importance of information needs focused on innovative companies.
McCune, Brian P.
Advanced Information and Decision Systems (AI-DS) is a relatively new, employee-owned company that does basic and applied research, product development, and consulting in the fields of artificial intelligence, computer science, decision analysis, operations research, control theory, estimation theory, and signal processing. AI&DS performs studies, analyses, systems design and evaluation, and software development for a variety of industrial clients and government agencies, including the Depart...
Maximising Organisational Information Sharing and Effective Intelligence Analysis in Critical Data Sets. A case study on the information science needs of the Norwegian criminal intelligence and law enforcement community
Organisational information sharing has become more and more important as the amount of information grows. In order to accomplish the most effective and efficient sharing of information, analysis of the information needs and the organisation needs are vital. This dissertation focuses on the information needs sourced through the critical data sets of law enforcement organisations; specifically the Norwegian criminal intelligence and law enforcement community represented by the Na...
In this article we examine how (i) company type and (ii) the competitive intelligence information used by small technology-based companies affect their innovation performance. The focus is on the specific information types used and not on the information sources. Information topics are classified in four groups - customers (10), company (9), competitor (11) and industry (12). The sample consists of 45 small new technology-based companies, specialized suppliers, and service companies from a variety of sectors - software, photonics, telecommunications, biomedical engineering and biotech, traditional manufacturing etc. The results suggest that the total number of intelligence information topics companies use to make decisions about innovation is not associated with the number of their new products, processes, services and patents. Therefore the companies in our sample do not seem to have the resources, processes or value systems required to use different competitive intelligence information when making decisions on innovation or may rely more on their own internal logic than on external information. Companies are classified using a Pavitt-like taxonomy. Service companies are considered as a separate company type. This allows for explicitly studying both, the innovative role of new services in product driven companies, and the role of new product development in service companies.
with partial observations,” in AAAI Conference on Artificial Intelligence , 2017.  D. J. Watts and S. H. Strogatz, “Collective dynamics of ‘small...critical infrastructure of our society. The failure of the power grid network will have catastrophic impacts on water supplies, transportation
... DEPARTMENT OF JUSTICE [OMB Number 1105-0087] National Drug Intelligence Center: Agency Information...), National Drug Intelligence Center (NDIC), will be submitting the following information collection request... Kevin M. Walker, General Counsel, National Drug Intelligence Center, Fifth Floor, 319 Washington Street...
Investigation Of Information Sources And Communication Channels In Ipm Rice ... the information accessibility of farmer groups seems as empowerment strategy. ... information sources and communication channels, in order of importance, ...
This must-read text/reference presents an overview of smart information systems for both the private and public sector, highlighting the research questions that can be studied by applying computational intelligence. The book demonstrates how to transform raw data into effective smart information services, covering the challenges and potential of this approach. Each chapter describes the algorithms, tools, measures and evaluations used to answer important questions. This is then further illustrated by a diverse selection of case studies reflecting genuine problems faced by SMEs, multinational
Elena, Sharafutdinova; Tatiana, Avdeenko; Bakaev, Maxim
The paper describes an information system development project for the Russian Ministry of Emergency Situations (MES, whose international operations body is known as EMERCOM), which was attended by the representatives of both the IT industry and the academia. Besides the general description of the system, we put forward OLAP and Data Mining-based approaches towards the intelligent analysis of the data accumulated in the database. In particular, some operational OLAP reports and an example of multi-dimensional information space based on OLAP Data Warehouse are presented. Finally, we outline Data Mining application to support decision-making regarding security inspections planning and results consideration.
The article briefly presents and discusses 12 different approaches to the evaluation of information sources (for example a Wikipedia entry or a journal article): (1) the checklist approach; (2) classical peer review; (3) modified peer review; (4) evaluation based on examining the coverage...... of controversial views; (5) evidence-based evaluation; (6) comparative studies; (7) author credentials; (8) publisher reputation; (9) journal impact factor; (10) sponsoring: tracing the influence of economic, political, and ideological interests; (11) book reviews and book reviewing; and (12) broader criteria....... Reading a text is often not a simple process. All the methods discussed here are steps on the way on learning how to read, understand, and criticize texts. According to hermeneutics it involves the subjectivity of the reader, and that subjectivity is influenced, more or less, by different theoretical...
By combining artificial intelligence concepts with the human information processing model of Rasmussen, a conceptual framework was developed for real time artificial intelligence systems which provides a foundation for system organization, control and validation. The approach is based on the description of system processing terms of an abstraction hierarchy of states of knowledge. The states of knowledge are organized along one dimension which corresponds to the extent to which the concepts are expressed in terms of the system inouts or in terms of the system response. Thus organized, the useful states form a generally triangular shape with the sensors and effectors forming the lower two vertices and the full evaluated set of courses of action the apex. Within the triangle boundaries are numerous processing paths which shortcut the detailed processing, by connecting incomplete levels of analysis to partially defined responses. Shortcuts at different levels of abstraction include reflexes, sensory motor control, rule based behavior, and satisficing. This approach was used in the design of a real time tactical decision aiding system, and in defining an intelligent aiding system for transport pilots.
Robert L. Wiegel
Full Text Available Tsunami Information Sources (Robert L. Wiegel, University of California, Berkeley, CA, UCB/HEL 2005-1, 14 December 2005, 115 pages, is available in printed format, and on a diskette. It is also available in electronic format at the Water Resources Center Archives, University of California, Berkeley, CA http:www.lib.berkeley.edu/WRCA/tsunamis.htmland in the International Journal of The Tsunami Society, Science of Tsunami Hazards (Vol. 24, No. 2, 2006, pp 58-171 at http://www.sthjournal.org/sth6.htm.This is Part 2 of the report. It has two components. They are: 1.(Sections A and B. Sources added since the first report, and corrections to a few listed in the first report. 2.(Sections C and D. References from both the first report and this report, listed in two categories:Section C. Planning and engineering design for tsunami mitigation/protection; adjustments to the hazard; damage to structures and infrastructureSection D. Tsunami propagation nearshore; induced oscillations; runup/inundation (flooding and drawdown.
OSINT Open Source Intelligence PPD Presidential Policy Directive SIGINT Signals Intelligence SLFC State/Local Fusion...Geospatial Intelligence (GEOINT) from Geographic Information Systems (GIS), and Open Source Intelligence ( OSINT ) from Social Media. GIS is widely...Central Intelligence Agency is the federal agency most often associated with HUMINT collection. • Open - Source Intelligence ( OSINT )– OSINT
Nguyen, Ngoc; Batubara, John; New Trends in Intelligent Information and Database Systems
Intelligent information and database systems are two closely related subfields of modern computer science which have been known for over thirty years. They focus on the integration of artificial intelligence and classic database technologies to create the class of next generation information systems. The book focuses on new trends in intelligent information and database systems and discusses topics addressed to the foundations and principles of data, information, and knowledge models, methodologies for intelligent information and database systems analysis, design, and implementation, their validation, maintenance and evolution. They cover a broad spectrum of research topics discussed both from the practical and theoretical points of view such as: intelligent information retrieval, natural language processing, semantic web, social networks, machine learning, knowledge discovery, data mining, uncertainty management and reasoning under uncertainty, intelligent optimization techniques in information systems, secu...
Full Text Available This article aims to describe and classify in a more concrete way information systems, which are framed in what is properly called as "business intelligence". It begins analyzing each of the basic concepts and theoretical aspects and then detail in shaping transactional systems and the most important strategic systems including their benefits, their modes of use, and its disadvantages; It reflects on some cases actually exposed business globally, and the impact it has had the adoption of information systems in its corporate strategy as a key competitive advantages achieving considerable success. Finally, it concludes by describing the importance that has had the implementation of at least some of these information systems in strategic planning of organizations, especially in Colombia and Latin America.
Full Text Available Despite the advances in IT, information systems intended for management informing did not uniformly fulfil the increased expectations of users; this can be said mostly about complex information needs. Although some of the technologies for supporting complicated insights, like management decision support systems and technologies, experienced reduction in interest both from researchers and practitioners, this did not reduce the importance of well-supported business informing and decision making. Being attributed to the group of intelligent systems and technologies, decision support (DS technologies have been largely supplemented by business intelligence (BI technologies. Both types of technologies are supported by respective information technologies, which often appear to be quite closely related. The objective of this paper is to define relations between simple and complex informing intended to satisfy different sets of needs and provided by different sets of support tools. The paper attempts to put together decision support and business intelligence technologies, based on common goals of sense-making and use of advanced analytical tools. A model of two interconnected cycles has been developed to relate the activities of decision support and business intelligence. Empirical data from earlier research is used to direct possible further insights into this area.
Independent research areas of artificial intelligence represent the following problems: automatic problem solving and new knowledge discovering, automatic program synthesis, natural language, picture and scene recognition and understanding, intelligent control systems of robots equipped with sensoric subsystems, dialogue of two knowledge systems, as well as studying and modelling higher artificial intelligence attributes, such as emotionality and personality. The 4th Conference draws on the problems treated at the preceding Conferences, and presents the most recent knowledge on the following topics: theoretical problems of artificial intelligence, knowledge-based systems, expert systems, perception and pattern recognition, robotics, intelligent computer-aided design, special-purpose computer systems for artificial intelligence and robotics
Full Text Available
ENGLISH ABSTRACT: Data quality, or rather the lack thereof, has been the downfall of many Data warehousing (DW / Business Intelligence (BI projects. The concept of Information Quality (IQ has become increasingly important as the popularity of Business Intelligence (BI increases. Industrial engineers have played a key role in the development and implementation of Total Quality Management (TQM principles that are widely used in the manufacturing environment. In the information era, industrial engineers can apply the same principles to data. This article aims to identify strategies and processes to improve IQ that will eventually lead to data warehouses with complete, accurate and timely data that consistently meets the requirements of knowledge workers in their quest to make improved business decisions.
AFRIKAANSE OPSOMMING: Die gebrek aan datakwaliteit het al menige Databergings- en Besigheidsintelligensieprojekte laat sneuwel. Die konsep van Inligtingskwaliteit word al meer prominent soos die gewildheid van Besigheidsintelligensie toeneem. Bedryfsingenieurs het reeds ‘n sleutelrol gespeel in die ontwikkeling en implementering van Totale Kwaliteitsbestuurbeginsels wat algemeen in die vervaardigingsomgewing gebruik word. In die inligtingsera kan bedryfsingenieurs dieselfde beginsels ook op data toepas. Hierdie artikel identifiseer strategieë en prosesse om inligtingskwaliteit te verbeter wat uiteindelik behoort te lei tot datastore met volledige en akkurate data wat betyds en konsekwent aan kenniswerkers se behoeftes voldoen en hulle instaat stel om beter besigheidsbesluite te neem.
Bray, S. E.
A vision was presented in a previous paper of how a common set of services within a framework could be used to provide all the information processing needs of Warfighters. Central to that vision was the concept of a "Virtual Knowledge Base". The paper presents an implementation of these ideas in the intelligence domain. Several innovative technologies were employed in the solution, which are presented and their benefits explained. The project was successful, validating many of the design principles for such a system which had been proposed in earlier work. Many of these principles are discussed in detail, explaining lessons learned. The results showed that it is possible to make vast improvements in the ability to exploit available data, making it discoverable and queryable wherever it is from anywhere within a participating network; and to exploit machine reasoning to make faster and better inferences from available data, enabling human analysts to spend more of their time doing more difficult analytical tasks rather than searching for relevant data. It was also demonstrated that a small number of generic Information Processing services can be combined and configured in a variety of ways (without changing any software code) to create "fact-processing" workflows, in this case to create different intelligence analysis capabilities. It is yet to be demonstrated that the same generic services can be reused to create analytical/situational awareness capabilities for logistics, operations, planning or other military functions but this is considered likely.
Yan, S J; Chughtai, A A; Macintyre, C R
Rapid epidemic detection is an important objective of surveillance to enable timely intervention, but traditional validated surveillance data may not be available in the required timeframe for acute epidemic control. Increasing volumes of data on the Internet have prompted interest in methods that could use unstructured sources to enhance traditional disease surveillance and gain rapid epidemic intelligence. We aimed to summarise Internet-based methods that use freely-accessible, unstructured data for epidemic surveillance and explore their timeliness and accuracy outcomes. Steps outlined in the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) checklist were used to guide a systematic review of research related to the use of informal or unstructured data by Internet-based intelligence methods for surveillance. We identified 84 articles published between 2006-2016 relating to Internet-based public health surveillance methods. Studies used search queries, social media posts and approaches derived from existing Internet-based systems for early epidemic alerts and real-time monitoring. Most studies noted improved timeliness compared to official reporting, such as in the 2014 Ebola epidemic where epidemic alerts were generated first from ProMED-mail. Internet-based methods showed variable correlation strength with official datasets, with some methods showing reasonable accuracy. The proliferation of publicly available information on the Internet provided a new avenue for epidemic intelligence. Methodologies have been developed to collect Internet data and some systems are already used to enhance the timeliness of traditional surveillance systems. To improve the utility of Internet-based systems, the key attributes of timeliness and data accuracy should be included in future evaluations of surveillance systems. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.
Nuortio, T. [Kuopio Univ. (Finland)
'iWaste - Intelligent Information System for Waste Management' - was a joint project of the University of Kuopio and the Tampere University of Technology. The main objective of the project was to improve the management and use of waste management data. Also the project focused on the development of information management systems. The results of the project are numerous. A study of the present state of information management in the field of waste management was carried out. The studied aspects were for example information needs of different actors and their requirements for the information quality, communication requirements among different actors, and the characteristics and applications of the software products. The conceptual data model of waste management was developed and resulted as the hyper document for connecting waste and information management specialists, and for research and educational purposes. Also, this model can be used for the development of political regulation. Methodologies and models for processing data into information for decision making were developed. The methodologies and models include e.g. data mining techniques, prediction of waste generation and optimisation of waste pick-up and transport. (orig.)
Bai Zhe; Zou Yuanhao
With the widely use of information system, the enterprise has accumulated large amount of business data. It is urgent and complicated task to manipulate the massive and complex data collation, dig out the useful knowledge which can assist business managers and technical staff with decision-making and error analysis. At present, the business intelligence is in its initial stage in nuclear power plants (NPP), most of the plants start to show and analyze the data at the end-user interface, then go further with Data Mining gradually. By the basis of Data Warehouse. Online Analytical Processing and Data Mining technology, the data can be extracted, transformed and loaded. After the processing, the data is converted into useful information for plant managers to have different perspectives of decision-making and technical staff to analyse errors. (authors)
Behrman, Robert; Carley, Kathleen
This paper describes the Dynamic Information Flow Simulation (DIFS), an abstract model for analyzing the structure and function of intelligence support organizations and the activities of entities within...
Valdes, Alfonso; Kadte, Jim
The focus of this research is to develop detection, correlation, and representation approaches to address the needs of the Intelligence Community Information Awareness Common Operating Picture (IA COP...
This report applies Event Sequence Analysis, methodology adapted from aircraft mishap investigation, to an investigation of the performance of the Air Intelligence Agency's Information Operations Center (IOC...
Vriens, D.J.; Vriens, D.J.
This chapter discusses the role of ICT for competitive intelligence activities. To this end, it starts with an introduction to competitive intelligence. Next, it discusses possible uses of ICT for intelligence activities. In this discussion attention is paid to the use of the Internet, to general
Mustonen, T. [Kuopio Univ. (Finland)
'iWaste' is a project for developing and testing intelligent computational methods for more comprehensive waste management. Important issues are automated reporting, optimisation of waste collection, forecasting of waste formation, data handling of waste disposal sites and simulation and modelling of regional waste management. The main objective of the project is to identify and analyse known sources of information and to link them to the existing information processing systems in the field of waste management. Additionally, the goal is to identify and test functional elements that could be developed further to software products and services. The results of the project can be categorized into three sectors. Firstly, the guidelines for a comprehensive information system in waste management will be created. This includes the requirement specifications of different parties, definitions for the data exchange interfaces and an architectural plan for software products capable of co-operative processing. Secondly, the central parts of the intelligent information system will be piloted using the research database collected in the early stage of the project. The main topics investigated are data quality, the use of Geographical Information Systems (GIS), automated reporting, optimisation of waste collection and forecasting of waste formation. Additionally, the pilot information system can be utilized in derivative projects to speed up the starting phases of them. This makes it possible to create persistent development of waste management information systems both academically and commercially. (orig.)
include Security Classification) Instrumentation for scientific computing in neural networks, information science, artificial intelligence, and...instrumentation grant to purchase equipment for support of research in neural networks, information science, artificail intellignece , and applied mathematics...in Neural Networks, Information Science, Artificial Intelligence, and Applied Mathematics Contract AFOSR 86-0282 Principal Investigator: Stephen
Kapoor, Supriya; Bhatia, Rahul
The book Intelligent Systems for Science and Information is the remarkable collection of extended chapters from the selected papers that were published in the proceedings of Science and Information (SAI) Conference 2013. It contains twenty-four chapters in the field of Intelligent Systems, which received highly recommended feedback during SAI Conference 2013 review process. All chapters have gone through substantial extension and consolidation and were subject to another round of rigorous review and additional modification. These chapters represent the state of the art of the cutting-edge research and technologies in related areas, and can help inform relevant research communities and individuals of the future development in Science and Information.
Ala-Juusela, M., Email: firstname.lastname@example.org
The IntUBE project will increase the possibility of reaching the European Commission's energy efficiency goals by facilitating more efficient use of the existing building stock. IntUBE stands for Intelligent Use of Buildings' Energy Information. The results of the IntUBE-project are expected not only to enhance the comfort levels of building users, but also to reduce overall energy costs through better energy efficiency. The IntUBE project was a European cooperation between twelve partners from nine European countries and received funding from the European Commission. The project was implemented between May 2009 and April 2011. The IntUBE consortium spans key research partners from northern to southern Europe including SMEs committed to exploiting the results of the project. The project was coordinated by VTT. (orig.)
Cohen, Seth B; Grote, Kurt D; Pietraszek, Wayne E; Laflamme, Francois
In healthcare, consumerism is not a product or program. Instead, it is an orientation to new care delivery models that encourage and enable greater patient responsibility through the intelligent use of information technology. Despite the promise of consumerism, current approaches have not fully realized the potential benefits of improved outcomes and lower cost. We recommend 4 guiding principles to ensure that next-generation innovation yields the returns that providers, patients, and other stakeholders expect: (1) keep the consumer at the center of innovation, (2) keep it simple, (3) link products and services to a broader "ecosystem" of care, and (4) encourage health in addition to treating illness. Now may be a particularly compelling time to invest in a consumerist approach.
Huang, Chang-Qin; Duan, Ru-Lin; Tang, Yong; Zhu, Zhi-Ting; Yan, Yong-Jian; Guo, Yu-Qing
The semantic web brings a new opportunity for efficient information organization and search. To meet the special requirements of the educational field, this paper proposes an intelligent search engine enabled by educational semantic support service, where three kinds of searches are integrated into Educational Information Intelligent Search (EIIS)…
Baty, Samuel R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Intelligence and Systems Analysis
These are a set of slides on the efficient utilization of open source information. Open source information consists of a vast set of information from a variety of sources. Not only does the quantity of open source information pose a problem, the quality of such information can hinder efforts. To show this, two case studies are mentioned: Iran and North Korea, in order to see how open source information can be utilized. The huge breadth and depth of open source information can complicate an analysis, especially because open information has no guarantee of accuracy. Open source information can provide key insights either directly or indirectly: looking at supporting factors (flow of scientists, products and waste from mines, government budgets, etc.); direct factors (statements, tests, deployments). Fundamentally, it is the independent verification of information that allows for a more complete picture to be formed. Overlapping sources allow for more precise bounds on times, weights, temperatures, yields or other issues of interest in order to determine capability. Ultimately, a "good" answer almost never comes from an individual, but rather requires the utilization of a wide range of skill sets held by a team of people.
Fabricio Sobrosa Affeldt
Full Text Available Devising an information architecture system that enables an organization to centralize information regarding its operational, managerial and strategic performance is one of the challenges currently facing information technology. The present study aimed to analyze an information architecture system developed using Business Intelligence (BI technology. The analysis was performed based on a questionnaire enquiring as to whether the information needs of executives were met during the process. A theoretical framework was applied consisting of information architecture and BI technology, using a case study methodology. Results indicated that the transaction processing systems studied did not meet the information needs of company executives. Information architecture using data warehousing, online analytical processing (OLAP tools and data mining may provide a more agile means of meeting these needs. However, some items must be included and others modified, in addition to improving the culture of information use by company executives.
Discusses environmental information needs of business professionals and provides an annotated list of Web sites serving as information sources. Highlights include "meta sites", government, health, law, engineering, education, organizations, and environmental news, as well as selected environmental "hot topics." (AEF)
National Agricultural Advisory Services (NAADS), one of the seven pillars of the Plan for ... sources to target to PSPs while information quality assurance is lacking and/or haphazard. .... information centers (DATICs) and the technical audit team.
Sternberg, Robert J.
Intelligence is the ability to learn from experience and to adapt to, shape, and select environments. Intelligence as measured by (raw scores on) conventional standardized tests varies across the lifespan, and also across generations. Intelligence can be understood in part in terms of the biology of the brain—especially with regard to the functioning in the prefrontal cortex—and also correlates with brain size, at least within humans. Studies of the effects of genes and environment suggest that the heritability coefficient (ratio of genetic to phenotypic variation) is between .4 and .8, although heritability varies as a function of socioeconomic status and other factors. Racial differences in measured intelligence have been observed, but race is a socially constructed rather than biological variable, so such differences are difficult to interpret. PMID:22577301
Sternberg, Robert J
Intelligence is the ability to learn from experience and to adapt to, shape, and select environments. Intelligence as measured by (raw scores on) conventional standardized tests varies across the lifespan, and also across generations. Intelligence can be understood in part in terms of the biology of the brain-especially with regard to the functioning in the prefrontal cortex-and also correlates with brain size, at least within humans. Studies of the effects of genes and environment suggest that the heritability coefficient (ratio of genetic to phenotypic variation) is between .4 and .8, although heritability varies as a function of socioeconomic status and other factors. Racial differences in measured intelligence have been observed, but race is a socially constructed rather than biological variable, so such differences are difficult to interpret.
Hummel, J. R.; Silver, R. B.
Information glut is one of the primary characteristics of the electronic age. Managing such large volumes of information (e.g., keeping track of the types, where they are, their relationships, who controls them, etc.) can be done efficiently with an intelligent, user-oriented information management system. The purpose of this paper is to describe a concept for managing information resources based on an intelligent information technology system developed by the Argonne National Laboratory for managing digital libraries. The Argonne system, Intelligent Query (IQ), enables users to query digital libraries and view the holdings that match the query from different perspectives
Chassy, A.F. de; Denizot, L.
Commercial satellite imagery is giving International Institutions specialized Information Departments access to a great source of valuable intelligence. High resolution and multiple sensors have also led to a growing complexity of interpretation that calls for a greater need of consulting, verification and training in the field in order to make it eligible as an operational source of verification. Responding to this need, Fleximage is extending its Image intelligence (IMINT) training program to include a fully operational and flexible online consulting and training program. Image Intelligence (IMINT) Online Program, a new approach to acquiring IMINT expertise, supported by Internet technologies, and managed by a professional team of experts and technical staff. Fleximage has developed a virtual learning environment on the Internet for acquiring IMINT expertise. Called the IMINT Online Program, this dynamic learning environment provides complete flexibility and personalization of the process for acquiring expertise. The IMINT online program includes two services: Online Consulting and Online Training. The Online Consulting service is designed for the technical staff of an organization who are already operational in the field of image intelligence. Online Consulting enables these staff members to acquire pertinent expertise online that can be directly applied to their professional activity, such as IAEA verification tasks. The Online Training service is designed for the technical staff of an organization who are relatively new to the field of image intelligence. These staff members need to build expertise within a formal training program. Online Training is a flexible and structured program for acquiring IMINT expertise online
This work which focused on the policy-makers/administrators as information users was carried out using hundred (100) questionnaire in order to ascertain the information needs, sources and information seeking behaviour of the administrators. The barrier to information flow to them was also identified. The study adopted a ...
Kovalev, Sergey; Tarassov, Valery; Snášel, Václav
This volume of Advances in Intelligent Systems and Computing contains papers presented in the main track of IITI 2016, the First International Conference on Intelligent Information Technologies for Industry held in May 16-21 in Sochi, Russia. The conference was jointly co-organized by Rostov State Transport University (Russia) and VŠB – Technical University of Ostrava (Czech Republic) with the participation of Russian Association for Artificial Intelligence (RAAI) and Russian Association for Fuzzy Systems and Soft Computing (RAFSSC). The volume is devoted to practical models and industrial applications related to intelligent information systems. The conference has been a meeting point for researchers and practitioners to enable the implementation of advanced information technologies into various industries. Nevertheless, some theoretical talks concerning the-state-of-the-art in intelligent systems and soft computing are included in the proceedings as well.
Full Text Available Real-time traffic information system is an Intelligent Transportation System (ITS that allows commuters to make their traveling plan better. In this regard, an intelligent and real-time traffic information system was developed based on the video detection and an image processing algorithm was applied to measure traffic-flow according to the average speed of vehicles. Then, traffic status of each pass way is broadcasted to the electronic boards installed on all decision making entrance / exit. Different levels of congestion related to the routes ahead are shown on the boards with different colors in order to assist commuters. This system was implemented on the Shiraz Dry River’s bypasses which account as vital routes to moderate traffic of city center. Experimental results are promising due to the proximity of determined traffic status by the system compared to the detection done by traffic experts. Average speed improvement is another result of using this system. This intelligent system developed and implemented in Shiraz city for the first time in Iran.s.
This quantitative non-experimental correlational research analyzes the relationship between emotional intelligence and communication due to the lack of this research on information technology professionals in the U.S. One hundred and eleven (111) participants completed a survey that measures both the emotional intelligence and communication…
Evitts, Paul M.; Portugal, Lindsay; Van Dine, Ami; Holler, Aline
Background: There is minimal research on the contribution of visual information on speech intelligibility for individuals with a laryngectomy (IWL). Aims: The purpose of this project was to determine the effects of mode of presentation (audio-only, audio-visual) on alaryngeal speech intelligibility. Method: Twenty-three naive listeners were…
Krasley, Paul F.
Due to limited resources and inconsistent guidance from the U.S. Federal Government, Department of Defense, and multiple environments within the intelligence community, the defense intelligence agencies each developed their own methods to deliver security awareness information. These multiple delivery methods may be providing different levels of…
J. Wang; W.D. Potter; D. Nute; F. Maier; H. Michael Rauscher; M.J. Twery; S. Thomasma; P. Knopp
An Intelligent Information System (IIS) is viewed as composed of a unified knowledge base, database, and model base. This allows an IIS to provide responses to user queries regardless of whether the query process involves a data retrieval, an inference, a computational method, a problem solving module, or some combination of these. NED-2 is a full-featured intelligent...
open sources only, including media and other publicly available data ( Open Source Intelligence — OSINT ... open intelligence sources in order to inform the High Representative about situations abroad from areas in which he was interested. In 2001, a...INTCEN has no formal mandate to gather intelligence as traditionally understood. It relies mainly on open - source intelligence and
Applying Intelligent Transportation Systems (ITS) to arterial systems allows TxDOT to significantly enhance : transportation system operation efficiency and improve traffic mobility. However, no guidelines are available to : assist TxDOT staff in sel...
The purpose of this effort was to develop an intelligent tutoring system (ITS) to train test administrators how to operate computerized adaptive testing Armed Services Vocational Aptitude Battery (CAT-ASVAB...
The purpose of this study was to assess the role of Competitive and Market Intelligence (CI/MI) Research as a potential source for improving the innovation capability of Small and Medium Enterprises (SME's) leading to successful new product/services/processes/capabilities development (Cooper & Edgett, 2002). This report highlights the…
Cole, Charles; Cantero, Pablo; Sauve, Diane
Outlines a prototype of an intelligent information-retrieval tool to facilitate information access for an undergraduate seeking information for a term paper. Topics include diagnosing the information need, Kuhlthau's information-search-process model, Shannon's mathematical theory of communication, and principles of uncertainty expansion and…
Oberhauser, Roy; Reichert, Manfred
This book provides a state-of-the-art perspective on intelligent process-aware information systems and presents chapters on specific facets and approaches applicable to such systems. Further, it highlights novel advances and developments in various aspects of intelligent process-aware information systems and business process management systems. Intelligence capabilities are increasingly being integrated into or created in many of today’s software products and services. Process-aware information systems provide critical computing infrastructure to support the various processes involved in the creation and delivery of business products and services. Yet the integration of intelligence capabilities into process-aware information systems is a non-trivial yet necessary evolution of these complex systems. The book’s individual chapters address adaptive process management, case management processes, autonomically-capable processes, process-oriented information logistics, process recommendations, reasoning over ...
Avadhani, P; Abraham, Ajith
This volume contains the papers presented at INDIA-2012: International conference on Information system Design and Intelligent Applications held on January 5-7, 2012 in Vishakhapatnam, India. This conference was organized by Computer Society of India (CSI), Vishakhapatnam chapter well supported by Vishakhapatnam Steel, RINL, Govt of India. It contains 108 papers contributed by authors from six different countries across four continents. These research papers mainly focused on intelligent applications and various system design issues. The papers cover a wide range of topics of computer science and information technology discipline ranging from image processing, data base application, data mining, grid and cloud computing, bioinformatics among many others. The various intelligent tools like swarm intelligence, artificial intelligence, evolutionary algorithms, bio-inspired algorithms have been applied in different papers for solving various challenging IT related problems.
Title I of S.4 and Title VII of H.R. 1 include corresponding measures related to enhancing information and intelligence sharing, both horizontally within the Federal Government and vertically between the Federal Government and state...
Extension of integrated pest management (IPM) as a component of sustainable agricultural development, involves empowering farmers. Facilitating the information accessibility of farmer groups seems as empowerment strategy. This strategy is based on identification of related patterns, including information sources and ...
Apr 28, 1990 ... accessibility and business performance of the community banks over a six-year period. The ... relationship with the banks' business performance. ..... Marketing Management ... Effects of the Information on the Business Performance of Banks. ..... 'Information sources used for strategic planning decisions.
Wood, Craig [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Halpern, Jonathan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Wrons, Ralph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Reiser, Anita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mond, Michael du [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Shain, Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
This Supplemental Information Source Document for Waste Management was prepared in support of future analyses including those that may be performed as part of the Sandia National Laboratories, New Mexico (SNL/NM) Site-Wide Environmental Impact Statement. This document presents information about waste management practices at SNL/NM, including definitions, inventory data, and an overview of current activities.
High power light-emitting diodes allow the creation of luminaires capable of generating saturated colour light at very high efficacies. Contrary to traditional light sources like incandescent and high-intensity discharge lamps, where colour is generated using filters, LEDs use additive light mixing, where the intensity of each primary colour diode has to be adjusted to the needed intensity to generate specified colour. The function of LED driver is to supply the diode with power needed to ach...
Sopna M Choudhury
Full Text Available Qatar is experiencing rapid population expansion with increasing demands on healthcare services for both acute and chronic conditions. Sourcing accurate information about health conditions is crucial, yet the methods used for sourcing health information in Qatar are currently unknown. Gaining a better understanding of the sources the Qatari population use to recognize and manage health and/or disease will help to develop strategies to educate individuals about existing and emerging health problems.To investigate the methods used by the Qatari population to source health information. We hypothesized that the Internet would be a key service used to access health information by the Qatari population.A researcher-led questionnaire was used to collect information from Qatari adults, aged 18-85 years. Participants were approached in shopping centers and public places in Doha, the capital city of Qatar. The questionnaire was used to ascertain information concerning demographics, health status, and utilization of health care services during the past year as well as sources of health information used.Data from a total of 394 eligible participants were included. The Internet was widely used for seeking health information among the Qatari population (71.1%. A greater proportion of Qatari females (78.7% reported searching for health-related information using the Internet compared to Qatari males (60.8%. Other commonly used sources were family and friends (37.8% and Primary Health Care Centers (31.2%. Google was the most commonly used search engine (94.8%. Gender, age and education levels were all significant predictors of Internet use for heath information (P<0.001 for all predictors. Females were 2.9 times more likely than males (P<0.001 and people educated to university or college level were 3.03 times more likely (P<0.001 to use the Internet for heath information.The Internet is a widely used source to obtain health-related information by the Qatari
Wartman, Steven A; Combs, C Donald
Changes to the medical profession require medical education reforms that will enable physicians to more effectively enter contemporary practice. Proposals for such reforms abound. Common themes include renewed emphasis on communication, teamwork, risk-management, and patient safety. These reforms are important but insufficient. They do not adequately address the most fundamental change--the practice of medicine is rapidly transitioning from the information age to the age of artificial intelligence. Employers need physicians who: work at the top of their license, have knowledge spanning the health professions and care continuum, effectively leverage data platforms, focus on analyzing outcomes and improving performance, and communicate the meaning of the probabilities generated by massive amounts of data to patients given their unique human complexities.Future medical practice will have four characteristics that must be addressed in medical education: care will be (1) provided in many locations; (2) provided by newly-constituted health care teams; and (3) based on a growing array of data from multiple sources and artificial intelligence applications; and (4) the interface between medicine and machines will need to be skillfully managed. Thus, medical education must make better use of the findings of cognitive psychology, pay more attention to the alignment of humans and machines in education, and increase the use of simulations. Medical education will need to evolve to include systematic curricular attention to the organization of professional effort among health professionals, the use of intelligence tools like machine learning and robots, and a relentless focus on improving performance and patient outcomes. [end of abstract].
Skonieczny, Łukasz; Rybiński, Henryk; Kryszkiewicz, Marzena; Niezgódka, Marek
This book is a selection of results obtained within three years of research performed under SYNAT—a nation-wide scientific project aiming at creating an infrastructure for scientific content storage and sharing for academia, education and open knowledge society in Poland. The book is intended to be the last of the series related to the SYNAT project. The previous books, titled “Intelligent Tools for Building a Scientific Information Platform” and “Intelligent Tools for Building a Scientific Information Platform: Advanced Architectures and Solutions”, were published as volumes 390 and 467 in Springer's Studies in Computational Intelligence. Its contents is based on the SYNAT 2013 Workshop held in Warsaw. The papers included in this volume present an overview and insight into information retrieval, repository systems, text processing, ontology-based systems, text mining, multimedia data processing and advanced software engineering, addressing the problems of implementing intelligent tools for building...
Ravichandra Rao, I.K.
With the rapid development in IT and the emergence of Internet, a multitude of information sources are now available on electronic media. They include e-journals and other electronic publications - online databases, reference documents, newspapers, magazines, etc. In addition to these online sources, there are thousands of CD-ROM databases. The CD-ROM databases and the online sources are collectively referred to as electronic sources of information. Libraries in no part of the world can afford to ignore these sources. Emergence of these new sources has resulted into a change in the traditional library functions including collection development, acquisitions, cataloguing, user instructions, etc. It is inevitable that in the next five to ten years, special libraries may have to allocate considerable amount towards subscription of e-journals and other e-publications. The papers in this seminar volume discuss several aspects related the theme of the seminar and cover e-journals, different sources available in the Net, classification of electronic sources, online public access catalogues, and different aspects of Internet. Papers relevant to INIS are indexed separately
Chassy, A.F. de; Denizot, L.
Commercial satellite imagery is giving International Institutions specialized Information Departments access to a great source of valuable intelligence. High resolution and multiple sensors have also led to a growing complexity of interpretation that calls for a greater need of consulting, verification and training in the field in order to make it eligible as an operational source of verification. Responding to this need, Fleximage is extending its Image Intelligence (IMINT) training program to include a fully operational and flexible online consulting and training program. Image Intelligence (IMINT) Online Program, a new approach to acquiring IMINT expertise, supported by Internet technologies, and managed by a professional team of experts and technical staff. Fleximage has developed a virtual learning environment on the Internet for acquiring IMINT expertise. Called the IMINT Online Program, this dynamic learning environment provides complete flexibility and personalization of the process for acquiring expertise. The IMINT online program includes two services: Online Consulting and Online Training. The Online Consulting service is designed for the technical staff of an organization who are already operational in the field of image intelligence. Online Consulting enables these staff members to acquire pertinent expertise online that can be directly applied to their professional activity, such as IAEA verification tasks. The IMINT virtual Consulting and Training services indicated above are made possible thanks to the latest in Internet-based technologies including: multimedia CD-ROM, Internet technologies, rich media content (Audio, Video and Flash), application sharing, platform Maintenance Tools, secured connections and authentication, knowledge database technologies. IMINT Online Program operates owing to: specialized experts in fields relating to IMINT. These experts carry out the tasks of consultants, coaches, occasional speakers, and course content designers
D’Brot A, Jorge E.
xiii, 223 h. : il. ; 30 cm The transfer rate of transformational leadership training is considered marginal; it is estimated that less than 30% of leaders who participate in the training change their behavior once back in the workplace. Most quantitative investigations have focused on predictors of transformational leadership, providing insufficient information about possible internal driving forces that influence leaders to behave in a transformational manner; furthermore, som...
Full Text Available Intelligent transportation systems (ITS are gaining acceptance around the world and the connected vehicle component of ITS is recognized as a high priority research and development area in many technologically advanced countries. Connected vehicles are expected to have the capability of safe, efficient and eco-driving operations whether these are under human control or in the adaptive machine control mode of operations. The race is on to design the capability to operate in connected traffic environment. The operational requirements can be met with cognitive vehicle design features made possible by advances in artificial intelligence-supported methodology, improved understanding of human factors, and advances in communication technology. This paper describes cognitive features and their information system requirements. The architecture of an information system is presented that supports the features of the cognitive connected vehicle. For better focus, information processing capabilities are specified and the role of Bayesian artificial intelligence is defined for data fusion. Example applications illustrate the role of information systems in integrating intelligent technology, Bayesian artificial intelligence, and abstracted human factors. Concluding remarks highlight the role of the information system and Bayesian artificial intelligence in the design of a new generation of cognitive connected vehicle.
Margarida Abreu; Victor Mendes
We investigate how the strength of the positive association between frequency of trading and information acquisition is dependent on investors’ self‐confidence and on the sources of information used by investors. Our results confirm that the more frequently individual investors invest in information, the more they trade in financial products. Our results also confirm previous findings that overconfident investors, who show a better than average bias, trade more frequently. In this paper, we a...
This book constitutes the refereed proceedings of the Fourth International Neural Network Symposia series on Computational Intelligence in Information Systems, INNS-CIIS 2014, held in Bandar Seri Begawan, Brunei in November 2014. INNS-CIIS aims to provide a platform for researchers to exchange the latest ideas and present the most current research advances in general areas related to computational intelligence and its applications in various domains. The 34 revised full papers presented in this book have been carefully reviewed and selected from 72 submissions. They cover a wide range of topics and application areas in computational intelligence and informatics.
OSINT stands for Open Source Intelligence. The CAPER project has built an OSINT solution oriented to the prevention of organised crime. We offer in this paper an overall view of some results, embedding into the system legal and ethical issues raised by the General Data Reform Package (GDRP) in Europe. We briefly describe CAPER architecture, workflow, functionalities, modules and ontologies (European LEAs Interoperability ELIO, and Multi-Lingual Crime Ontology MCO). This paper is focused on th...
Schudnagis, Monika; Womser-Hacker, Christa
Discusses vagueness as a problem of materials information system development in the context of information retrieval within the paradigm of information science. Presents a prototype which combines an object-oriented graphical user interface with natural language feedback and correction functionality, as well as intelligent components for graphical…
Farber, Barry A; Hazanov, Valery
Although formal, assigned supervision is a potent source of learning and guidance for psychotherapy trainees, many beginning psychotherapists use other, informal sources of supervision or consultation for advice and support. Results of an online survey of beginning trainees (N = 146) indicate that other than their formally assigned supervisor, trainees most often consult with colleagues in their program, their own psychotherapist, and their significant other; that they're most likely to seek these other sources of help when they're feeling stuck or feel they've made a clinical mistake; that they do so because they need extra reassurance and suggestions; that they feel the advice given from these sources is helpful; and that they don't especially regret sharing this information. Several case examples are used to illustrate these points. Discussing clinical material with informal sources is, apparently, a great deal more common than typically acknowledged, and as such, has implications for training programs (including discussions of ethics) and formal supervision. © 2014 Wiley Periodicals, Inc.
Laouar, Mohamed Ridda
All business organizations strive for increasing their growth by seizing new opportunities, reducing enterprise costs, attracting new customers and retaining old customers. In doing so, business intelligence and analytics allow business organizations to make better plans, informed decisions, and monitor their progress towards planned goals and objectives. The more disruptive power of IT technologies comes synergistically. Individual IT technologies do not work in isolation. Business intellige...
Hostetter, Carl F. (Editor)
This publication comprises the papers presented at the 1995 Goddard Conference on Space Applications of Artificial Intelligence and Emerging Information Technologies held at the NASA/Goddard Space Flight Center, Greenbelt, Maryland, on May 9-11, 1995. The purpose of this annual conference is to provide a forum in which current research and development directed at space applications of artificial intelligence can be presented and discussed.
One of the most emerging technologies is finance, becoming more amenable to data-driven modeling as large sets of financial data become available everywhere. So we are applying the data mining techniques in financial information system with Business Intelligence. A Business Intelligence System (BIS) can be described as an interactive, computer-based system designed to help decision-makers to solve unstructured problems. Using a combination of models, analytical techniques, and...
Derczynski, Leon; Field, Camilla Vilhelmsen; Bøgh, Kenneth Sejdenfaden
Danish is a major Scandinavian language spoken daily by around six million people. However, it lacks a unified, open set of NLP tools. This demonstration will introduce DKIE, an extensible open-source toolkit for processing Danish text. We implement an information extraction architecture for Danish...
Nizamani, Sarwat; Memon, Nasrullah; Shah, Azhar Ali
In this paper, we present a method of crime analysis from open source information. We employed un-supervised methods of data mining to explore the facts regarding the crimes of an area of interest. The analysis is based on well known clustering and association techniques. The results show...
Corey, Stephen; Carnahan, Richard S., Jr.
A continuing effort to apply rapid prototyping and Artificial Intelligence techniques to problems associated with projected Space Station-era information management systems is examined. In particular, timely updating of the various databases and knowledge structures within the proposed intelligent information management system (IIMS) is critical to support decision making processes. Because of the significantly large amounts of data entering the IIMS on a daily basis, information updates will need to be automatically performed with some systems requiring that data be incorporated and made available to users within a few hours. Meeting these demands depends first, on the design and implementation of information structures that are easily modified and expanded, and second, on the incorporation of intelligent automated update techniques that will allow meaningful information relationships to be established. Potential techniques are studied for developing such an automated update capability and IIMS update requirements are examined in light of results obtained from the IIMS prototyping effort.
Full Text Available Nowadays information plays an important role in the development of companies. Information constitutes the main source of building competitive advantage allowing to make a good business decision, which leads to a company’s success on the market. Conducting marketing research makes it possible to obtain valuable information, but unfortunately this method is usually associated with the necessity of bearing high costs and in many cases research itself is conducted in an incorrect way and delivers incorrect information. We live in the age of information society, which is associated with the rapid development of the Internet and tools using the Internet allowing various forms of communication. One of such tools are social media platforms, which are usually regarded as a place for building contact networks and communication with other users. It is worth pointing out here that thanks to their popularity social media have become a place which is more and more often noticed by companies. Almost every well-known brand has its profile in the social media, allowing the users of social media portals direct contact with products, or services offered by a particular brand. Persistent popularity of social media means that they are becoming a rich source of information, both about the users – current and potential clients, but also about rivals – companies with a similar profile of activity, actively operating in social networks. The starting point for further deliberations are issues associated with the functioning of social media as a place allowing to obtain market information, which in light of the concept of market intelligence constitutes an alternative to traditional marketing research.
Skonieczny, Lukasz; Rybinski, Henryk; Kryszkiewicz, Marzena; Niezgodka, Marek
This book is a selection of results obtained within two years of research per- formed under SYNAT - a nation-wide scientific project aiming at creating an infrastructure for scientific content storage and sharing for academia, education and open knowledge society in Poland. The selection refers to the research in artificial intelligence, knowledge discovery and data mining, information retrieval and natural language processing, addressing the problems of implementing intelligent tools for building a scientific information platform.This book is a continuation and extension of the ideas presented in “Intelligent Tools for Building a Scientific Information Platform” published as volume 390 in the same series in 2012. It is based on the SYNAT 2012 Workshop held in Warsaw. The papers included in this volume present an overview and insight into information retrieval, repository systems, text processing, ontology-based systems, text mining, multimedia data processing and advanced software engineering.
Hadzikadic, M; Harrington, A L; Bohren, B F
This paper addresses three key issues facing developers of clinical and/or research medical information systems. 1. INFORMATION. The basic function of every database is to store information about the phenomenon under investigation. There are many ways to organize information in a computer; however only a few will prove optimal for any real life situation. Computer Science theory has developed several approaches to database structure, with relational theory leading in popularity among end users . Strict conformance to the rules of relational database design rewards the user with consistent data and flexible access to that data. A properly defined database structure minimizes redundancy i.e.,multiple storage of the same information. Redundancy introduces problems when updating a database, since the repeated value has to be updated in all locations--missing even a single value corrupts the whole database, and incorrect reports are produced . To avoid such problems, relational theory offers a formal mechanism for determining the number and content of data files. These files not only preserve the conceptual schema of the application domain, but allow a virtually unlimited number of reports to be efficiently generated. 2. INTELLIGENCE. Flexible access enables the user to harvest additional value from collected data. This value is usually gained via reports defined at the time of database design. Although these reports are indispensable, with proper tools more information can be extracted from the database. For example, machine learning, a sub-discipline of artificial intelligence, has been successfully used to extract knowledge from databases of varying size by uncovering a correlation among fields and records[1-6, 9]. This knowledge, represented in the form of decision trees, production rules, and probabilistic networks, clearly adds a flavor of intelligence to the data collection and manipulation system. 3. INTERFACE. Despite the obvious importance of collecting
Traces the development of information retrieval/services and suggests that the creation of large digital libraries seems inevitable. Examines possibilities for increasing electronic access and the role of artificial intelligence. Highlights include: searching full text; sending full texts; selective dissemination of information (SDI) profiling and…
Scholtz, Brenda; Calitz, Andre; Haupt, Ross
Purpose: Higher education institutions (HEIs) face a number of challenges in effectively managing and reporting on sustainability information, such as siloes of data and a limited distribution of information. Business intelligence (BI) can assist in addressing the challenges faced by organisations. The purpose of this study was to propose a BI…
Defines artificial intelligence (AI) and expert systems; describes library applications utilizing AI to automate creation of document representations, request formulations, and design and modify search strategies for information retrieval systems; discusses expert system development for information services; and reviews impact of these…
Lancaster, F. W.; Warner, Amy
The objective of this study was to gain enough familiarity with developments in artificial intelligence (AI) and related technologies to be able to advise the information service community on what can be applied today and what one might reasonably expect to be applicable to library and information services in the near future. The emphasis is on…
Dou, Henri; And Others
Discusses the need for education of information professionals in France to change because of changing needs for scientific, technological, and economic information. The functions of technology watch and competitive intelligence based on an organization's critical success factor are shown to be important. (13 references) (EAM)
Correia, Cynthia Cheng
Competitive Intelligence (CI) has become an attractive concept for Library and Information Science professionals, as information and research functions have become commoditized by end users, and financial, competitive, and performance pressures increase the need to demonstrate value. In the current competitive and cost-cutting environment,…
set of movies derived from two information sources: movie genres and users. The genre information may indicate that two movies that are “ animations ...are more similar than two movies one of which is an “ animation ” and one of which is a “romance” movie. Similarly, movies watched by the same set of...grown- ups ’ ’ ’ ’ ’ ’ ’ X1-The Lion King; X2-Toy Story; X3-Kungfu Panda ; X4-Wall-E; X5-Casablanca; X6-Titanic; X7-The Notebook kids Figure 6.2: A
Most optimization studies of cold neutron sources have concentrated on the numerical prediction or experimental measurement of the cold moderator optimum thickness which produces the largest cold neutron leakage for a given thermal neutron source. Optimizing the geometrical shape of the cold source, however, is a more difficult problem because the optimized quantity, the cold neutron leakage, is an implicit function of the shape which is the unknown in such a study. We draw an analogy between this problem and a state space search, then we use a simple Artificial Intelligence (AI) search technique to determine the optimum cold source shape based on a two-group, r-z diffusion model. We implemented this AI design concept in the computer program AID which consists of two modules, a physical model module and a search module, which can be independently modified, improved, or made more sophisticated. 7 refs., 1 fig
Most optimization studies of cold neutron sources have concentrated on the numerical prediction or experimental measurement of the cold moderator optimum thickness that produces the largest cold neutron leakage for a given thermal neutron source. Optimizing the geometric shape of the cold source, however, is a more difficult problem because the optimized quantity, the cold neutron leakage, is an implicit function of the shape, which is the unknown in such a study. An analogy is drawn between this problem and a state space search, then a simple artificial intelligence (AI) search technique is used to determine the optimum cold source shape based on a two-group, r-z diffusion model. This AI design concept was implemented in the computer program AID, which consists of two modules, a physical model module, and a search module, which can be independently modified, improved, or made more sophisticated
Full Text Available In addition to universal social changes, the information revolution also brought a lot of innovation to the workings of intelligence services, which are traditionally the part of the national security system that is conducting data analyses and for which information is the primary product. If in the past the main problem and challenge has been the timely acquisition of data, today most agencies are faced with an entirely different problem - information overload. This problem is being tackled by technical as well as systemic measures that combine various types of intelligence work. However, there are still unanswered questions regarding the applicability of intelligence products for decision makers. Here we have to point out information visualization as the subject of an interdisciplinary scientific research that definitely shows a lot of potential in the context of the defense science as well. This article points out three key requirements that allow the application of information visualization to defense research: (1 the concept of the intelligence cycle can be used as a good basis for the information that is subject to visualization; (2 the quality of decision-making support information depends on proper visualization; (3 the first two requirements offer a stable theoretical and empirical basis for the introduction of innovative scientific methods in the field of defense science, such as experiments.
Aparicio, Fernando; Morales-Botello, María Luz; Rubio, Margarita; Hernando, Asunción; Muñoz, Rafael; López-Fernández, Hugo; Glez-Peña, Daniel; Fdez-Riverola, Florentino; de la Villa, Manuel; Maña, Manuel; Gachet, Diego; Buenaga, Manuel de
approaches in both the preparation and the effective use of these activities in the classroom. Specifically, the themes highlighted by a greater number of teachers after analyzing the responses to the open-ended questions were the usefulness of BioAnnote system to provide reliable sources of medical information and the usefulness of the bilingual nature of CLEiM system for learning medical terminology in English. Three intelligent information access systems were successfully used to evaluate the teacher's perceptions regarding the utility of these systems in learning activities. The results of this study showed that integration of reliable sources of information, bilingualism and selective annotation of concepts were the most valued features by the teachers, who also considered the incorporation of these systems into learning activities to be potentially very useful. In addition, in the context of our experimental conditions, our work provides useful insights into the way to appropriately integrate this type of intelligent information access systems into learning activities, revealing key themes to consider when developing such approaches. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.
VIRGIL - ION POPOVICI
Full Text Available Economic Intelligence (EI may be a solution in knowledge management as involves collecting, evaluating, processing, analysis and dissemination of economic data within organizations. The ultimate goal of economic intelligence (EI is to take advantage of this opportunity to develop and improve methods for identifying relevant information sources, analysis of information collected and manipulation, to give the user all the necessary decisions. Scope of the Economic Intelligence focused on information available outside the organization, covering wide areas from technology to market or legal issues. Economic Intelligence (EI is closely related to other approaches to information management, and knowledge management and business intelligence, excelling in the use of software tools.
Paul Imhoff; Ramin Yazdani; Don Augenstein; Harold Bentley; Pei Chiu
Methane is an important contributor to global warming with a total climate forcing estimated to be close to 20% that of carbon dioxide (CO2) over the past two decades. The largest anthropogenic source of methane in the US is 'conventional' landfills, which account for over 30% of anthropogenic emissions. While controlling greenhouse gas emissions must necessarily focus on large CO2 sources, attention to reducing CH4 emissions from landfills can result in significant reductions in greenhouse gas emissions at low cost. For example, the use of 'controlled' or bioreactor landfilling has been estimated to reduce annual US greenhouse emissions by about 15-30 million tons of CO2 carbon (equivalent) at costs between $3-13/ton carbon. In this project we developed or advanced new management approaches, landfill designs, and landfill operating procedures for bioreactor landfills. These advances are needed to address lingering concerns about bioreactor landfills (e.g., efficient collection of increased CH4 generation) in the waste management industry, concerns that hamper bioreactor implementation and the consequent reductions in CH4 emissions. Collectively, the advances described in this report should result in better control of bioreactor landfills and reductions in CH4 emissions. Several advances are important components of an Intelligent Bioreactor Management Information System (IBM-IS).
Willis, Henry H; LaTourrette, Tom; Kelly, Terrence K; Hickey, Scot; Neill, Samuel
...? The Office of Intelligence and Analysis (OI&A) at DHS is responsible for using information and intelligence from multiple sources to identify and assess current and future threats to the United States...
Hunt, Earl B
Artificial Intelligence provides information pertinent to the fundamental aspects of artificial intelligence. This book presents the basic mathematical and computational approaches to problems in the artificial intelligence field.Organized into four parts encompassing 16 chapters, this book begins with an overview of the various fields of artificial intelligence. This text then attempts to connect artificial intelligence problems to some of the notions of computability and abstract computing devices. Other chapters consider the general notion of computability, with focus on the interaction bet
Mandal, Jyotsna; Udgata, Siba; Bhateja, Vikrant
The third international conference on INformation Systems Design and Intelligent Applications (INDIA – 2016) held in Visakhapatnam, India during January 8-9, 2016. The book covers all aspects of information system design, computer science and technology, general sciences, and educational research. Upon a double blind review process, a number of high quality papers are selected and collected in the book, which is composed of three different volumes, and covers a variety of topics, including natural language processing, artificial intelligence, security and privacy, communications, wireless and sensor networks, microelectronics, circuit and systems, machine learning, soft computing, mobile computing and applications, cloud computing, software engineering, graphics and image processing, rural engineering, e-commerce, e-governance, business computing, molecular computing, nano-computing, chemical computing, intelligent computing for GIS and remote sensing, bio-informatics and bio-computing. These fields are not...
Satapathy, Suresh; Sanyal, Manas; Sarkar, Partha; Mukhopadhyay, Anirban
The second international conference on INformation Systems Design and Intelligent Applications (INDIA – 2015) held in Kalyani, India during January 8-9, 2015. The book covers all aspects of information system design, computer science and technology, general sciences, and educational research. Upon a double blind review process, a number of high quality papers are selected and collected in the book, which is composed of two different volumes, and covers a variety of topics, including natural language processing, artificial intelligence, security and privacy, communications, wireless and sensor networks, microelectronics, circuit and systems, machine learning, soft computing, mobile computing and applications, cloud computing, software engineering, graphics and image processing, rural engineering, e-commerce, e-governance, business computing, molecular computing, nano computing, chemical computing, intelligent computing for GIS and remote sensing, bio-informatics and bio-computing. These fields are not only ...
Margie A. Nolasco
Full Text Available Tourism has benefits not just for travelers, but also to the local economy. Since, Bicol Region has natural and cultural attractions; it is a potential travel destination in the country. Technology in delivering information sources played vital role for the success of the tourism industry in the Region. This allows travel enthusiasts to get more information about various tourist attractions. This paper analyzes the effectiveness of delivering information sources such as web advertisement and desktop publishing for tourist promotion in the Bicol Region. Specifically, it determined the status of tourism, and identified common forms of promotions for tourism development. The study adopted mixed method of research. This method was utilized to confirm and validate findings. Interviews and focus group discussions were used to gather data from the respondents of the selected Local Government Units, Department of Tourism, Travel Agencies and Hotel Agents in the Region. Based on the findings, of the total foreign visitors in the country, only 9.14% visited Bicol Region in 2014. That is why, domestic tourist showed high percentage against foreign visitors with 25.7%. Brochures with EZ maps as most commonly used desktop publishing materials and websites and social media for web advertisement. Thus, there is a need to reevaluate promotional activities by the DOT and other agencies. Adoption suggestive features for creative desktop publishing materials and web services should be considered to increase tourist visitors in the Region.
Mullins, L S
Adequate research in the peripheral field of medical geography requires familiarity with the literature of medicine, geography, and other environmentally oriented fields. The pertinent literature of the two primary disciplines, as well as that of anthropology, nutrition, and human bioclimatology, is surveyed from a bibliographical point of view. A brief review of historical sources is presented, followed by a discussion of the contemporary organizations, both international and national, active in the field. Emphasis is placed on the publishing programs and projects, maps, atlases, symposia, reports, and other literature sponsored or stimulated by these organizations. Regional bibliographical surveys for East Africa, India, and the Soviet Union are also noted. Pertinent aspects of bibliographies, indexes, abstracts, library card catalogs and accession lists, and other resources are listed, with emphasis on the various subject headings and other approaches to them. Throughout, the sources of information are approached from a multidisciplinary and interdisciplinary viewpoint.
The invention provides a sensitive, fast high-resolution device for obtaining information about the distribution of gamma and X-radiation sources and provides a radiation detector useful in such a device. It comprises a slit collimator with a multiplicity of slits each with slit-defining walls of material and thickness to absorb beam components impinging on them. The slits extend further in one direction than the other. The detector for separately detecting beam components passing through the slits also provides data output signals. It comprises a plurality of radiation transducing portions which are not photoconductor elements each at the end of a slit. A positioner operates to change the transverse position of the slits and radiation transducing portions relative to the source, wherein each radiation transducing element is positioned within its respective slit between the slit defining walls. Full details and preferred embodiments are given. (U.K.)
The invention provides a sensitive, fast, high-resolution device for obtaining information about the distribution of gamma and X-radiation sources and provides a radiation detector useful in such a device. It comprises a slit collimator with a multiplicity of slits each with slit-defining walls of material and thickness to absorb beam components impinging on them. The slits extend further in one transverse direction than the other. The detector for separately detecting beam components passing through the slits also provides data output signals. It comprises a plurality of radiation transducing portions, each at the end of a slit. A positioner changes the transverse position of the slits and radiation transducer (a photoconductor) relative to the source. Applications are in nuclear medicine and industry. Full details and preferred embodiments are given. (U.K.)
D.Phil. Computer-based information systems will probably always have to contend with security issues. Much research have already gone into the field of information security. These research results have yielded some very sophisticated and effective security mechanisms and procedures. However, due to the ever increasing sophistication of criminals, combined with the ever changing and evolving information technology environment, some limitations still exist within the field of information sec...
Travel Alliance —Fast Res System Flow (From Open Travel, 2009a...Intelligence Center THN Tourism Harmonisation Network VCC Virtual Command Center xiii ACKNOWLEDGMENTS I would like to open with thanking my wife...HSIN) The HSIN brand is divided into two parts, HSIN and HSIN-Intel. The larger HSIN is devoted to information sharing amongst the public safety
Maryam Hourali; Gholam Ali Montazer
In spite of the voluminous studies in the field of intelligent retrieval systems, effective retrieving of information has been remained an important unsolved problem. Implementations of different conceptual knowledge in the information retrieval process such as ontology have been considered as a solution to enhance the quality of results. Furthermore, the conceptual formalism supported by typical ontology may not be sufficient to represent uncertainty information due to the lack of clear-cut ...
Furukawa, Hiroshi; Kuchimura, Keiji; Kitamura, Masaharu; Washio, Takashi.
A general framework for future development of intelligent operator support systems in nuclear plants is proposed in this paper. The central idea in the framework is the decision-making through consensus among multiple agents, each conducting diagnosis on the basis of mutually different, i.e. diverse, principle by focusing dissimilar symptoms obtained from the plant. The applicability and credibility of the operator support system are expected to be significantly improved by implementing the proposed scheme. The effectiveness of diversification in symptom description independently of the effect of reasoning methods was mainly evaluated in this paper. A prototype system was developed for the subtask of fault diagnosis by multiple neural networks emulating the diagnostic agents. The advantage of the proposed framework, together with the related technique of symptom diversification and consensus, was clearly demonstrated through numerical evaluations simulating anomalies in a pressurized water reactor. The obtained results validate, at least to same extent, the present claim of combining multiple and diverse perspectives for reliable decision-making in high-hazard artifacts. (author)
Li, Hao; Li, Wen; Miao, Bo; Li, Bin; Liu, Chang; Lv, Zhipeng
On the background of the rise of intelligence and the increasing deepening of “Internet +”application, the energy internet has become the focus of the energy research field. This paper, based on the fundamental understanding on the energy internet of the intelligent town, discusses the mode of energy supply in the source-load interactive region, and gives an in-depth study on the output characteristics of the energy supply side and the load characteristics of the demand side, so as to derive the law of energy-load interaction of the intelligent-town energy internet.
Li, JianQiang; Yang, Ji-Jiang; Liu, Chunchen; Zhao, Yu; Liu, Bo; Shi, Yuliang
The vision of the Semantic Web is to build a global Web of machine-readable data to be consumed by intelligent applications. As the first step to make this vision come true, the initiative of linked open data has fostered many novel applications aimed at improving data accessibility in the public Web. Comparably, the enterprise environment is so different from the public Web that most potentially usable business information originates in an unstructured form (typically in free text), which poses a challenge for the adoption of semantic technologies in the enterprise environment. Considering that the business information in a company is highly specific and centred around a set of commonly used concepts, this paper describes a pilot study to migrate the concept of linked data into the development of a domain-specific application, i.e. the vehicle repair support system. The set of commonly used concepts, including the part name of a car and the phenomenon term on the car repairing, are employed to build the linkage between data and documents distributed among different sources, leading to the fusion of documents and data across source boundaries. Then, we describe the approaches of semantic information retrieval to consume these linkages for value creation for companies. The experiments on two real-world data sets show that the proposed approaches outperform the best baseline 6.3-10.8% and 6.4-11.1% in terms of top five and top 10 precisions, respectively. We believe that our pilot study can serve as an important reference for the development of similar semantic applications in an enterprise environment.
which “classified the identification of criminals on the basis of certain measurements of parts of their head and body and the color of their...actually A Who’s Who Lineup of Global Terrorists and the Rewards for Justice Program. Source: State Department, with permission. 68 become “organized...Indonesia into Los Angeles. Operation Triple X—An Indonesian Passport, an Identification Card, and the Marketing of Fraudulent Documents. Source: State
W.D. Potter; S. Somasekar; R. Kommineni; H.M. Rauscher
We view Intelligent Information System (IIS) as composed of a unified knowledge base, database, and model base. The model base includes decision support models, forecasting models, and cvsualization models for example. In addition, we feel that the model base should include domain specific porblems solving modules as well as decision support models. This, then,...
Hsieh, Cynthia C.; Hall, Wendy
Examines the definition and history of artificial intelligence (AI) and investigates the body of literature on AI found in "Library Literature" and "Library and Information Science Abstracts." The results reported include the number of articles by year and per journal, and the percentage of articles dealing with library…
Davis, Gary Alan; Woratschek, Charles R.
Business Intelligence (BI) and Business Analytics (BA) Software has been included in many Information Systems (IS) curricula. This study surveyed current and past undergraduate and graduate students to evaluate various BI/BA tools. Specifically, this study compared several software tools from two of the major software providers in the BI/BA field.…
Swanson, H. Lee
An information processing approach to the assessment of learning disabled students' intellectual performance is presented. The model is based on the assumption that intelligent behavior is comprised of a variety of problem- solving strategies. An account of child problem solving is explained and illustrated with a "thinking aloud" protocol.…
PMESII-PT Politics, Military, Economy, Social, Information, Infrastructure, Physical Environment and Time. OSINT Open Source Intelligence...Intelligence (SOCMINT) is a sub-set of open source intelligence ( OSINT ). OSINT has existed for an extended period of time, but it is a relatively new...author determined that there are two 1 Walter R, Draeger, "Take Advantage of OSINT ," Military
Casasent, D. [Carnegie Mellon Univ., Pittsburgh, PA (United States)
The use of intelligence in vision recognition uses many different techniques or tools. This presentation discusses several of these techniques for recognition. The recognition process is generally separated into several steps or stages when implemented in hardware, e.g. detection, segmentation and enhancement, and recognition. Several new distortion-invariant filters, biologically-inspired Gabor wavelet filter techniques, and morphological operations that have been found very useful for detection and clutter rejection are discussed. These are all shift-invariant operations that allow multiple object regions of interest in a scene to be located in parallel. We also discuss new algorithm fusion concepts by which the results from different detection algorithms are combined to reduce detection false alarms; these fusion methods utilize hierarchical processing and fuzzy logic concepts. We have found this to be most necessary, since no single detection algorithm is best for all cases. For the final recognition stage, we describe a new method of representing all distorted versions of different classes of objects and determining the object class and pose that most closely matches that of a given input. Besides being efficient in terms of storage and on-line computations required, it overcomes many of the problems that other classifiers have in terms of the required training set size, poor generalization with many hidden layer neurons, etc. It is also attractive in its ability to reject input regions as clutter (non-objects) and to learn new object descriptions. We also discuss its use in processing a temporal sequence of input images of the contents of each local region of interest. We note how this leads to robust results in which estimation efforts in individual frames can be overcome. This seems very practical, since in many scenarios a decision need not be made after only one frame of data, since subsequent frames of data enter immediately in sequence.
Ashley, W. R., III
share crucial investigative information across jurisdictional bounds by establishing a communications infrastructure for all of its law enforcement jurisdictions. The Criminal Justice Network (CJ-Net) is a statewide TCP/IP network, dedicated to the sharing of law enforcement information. CJ-Net is managed and maintained by the Florida Department of Law Enforcement (FDLE) and provides open access and privileges to any criminal justice agency, including the state court and penitentiary systems. In addition to Florida, other states, such as North Carolina, are also beginning to implement common protocol communication infrastructures and architectures in order to link local jurisdictions together throughout the state. The law enforcement domain in an optimum situation for information-sharing technologies. Communication infrastructures are continually established, and as such, action is required to effectively use these networks to their full potential. Information technologies that are best suited for the law enforcement domain, must be evaluated and implemented in a cost-effective manner. Unlike the Defense Department and other large federal agencies, individual jurisdictions at both the local and state level cannot afford to expend limited resources on research and development of prototype systems. Therefore, we must identify enabling technologies that have matured in related domains and transition them into law enforcement at a minimum cost. Crucial to this measure, is the selection of the appropriate levels of information-sharing technologies to be inserted. Information-sharing technologies that are unproven or have extensive recurring costs are not suitable for this domain. Information-sharing technologies traditionally exist between two distinct polar bounds: the data warehousing approach and mediation across distributed heterogeneous data sources. These two ends of the spectrum represent extremely different philosophies in accomplishing the same goal. In the
Highlights: ► Basic description of artificial neural networks. ► Natural gamma ray sources and problem of detections. ► Application of neural network for peak detection and activity determination. - Abstract: Artificial neural network (ANN) represents one of artificial intelligence methods in the field of modeling and uncertainty in different applications. The objective of the proposed work was focused to apply ANN to identify isotopes and to predict uncertainties of their activities of some natural radioactive sources. The method was tested for analyzing gamma-ray spectra emitted from natural radionuclides in soil samples detected by a high-resolution gamma-ray spectrometry based on HPGe (high purity germanium). The principle of the suggested method is described, including, relevant input parameters definition, input data scaling and networks training. It is clear that there is satisfactory agreement between obtained and predicted results using neural network.
Liang, S. Ng; Tan, K. O.; Lai Clement, T. H.; Ng, S. K.; Mohammed, A. H. Ali; Mailah, Musa; Azhar Yussof, Wan; Hamedon, Zamzuri; Yussof, Zulkifli
Recent developments in open source hardware and software platforms (Android, Arduino, Linux, OpenCV etc.) have enabled rapid development of previously expensive and sophisticated system within a lower budget and flatter learning curves for developers. Using these platform, we designed and developed a Java-based 3D robotic simulation system, with graph database, which is integrated in online and offline modes with an Android-Arduino based rubbish picking remote control car. The combination of the open source hardware and software system created a flexible and expandable platform for further developments in the future, both in the software and hardware areas, in particular in combination with graph database for artificial intelligence, as well as more sophisticated hardware, such as legged or humanoid robots.
Liang, S Ng; Tan, K O; Clement, T H Lai; Ng, S K; Mohammed, A H Ali; Mailah, Musa; Yussof, Wan Azhar; Hamedon, Zamzuri; Yussof, Zulkifli
Recent developments in open source hardware and software platforms (Android, Arduino, Linux, OpenCV etc.) have enabled rapid development of previously expensive and sophisticated system within a lower budget and flatter learning curves for developers. Using these platform, we designed and developed a Java-based 3D robotic simulation system, with graph database, which is integrated in online and offline modes with an Android-Arduino based rubbish picking remote control car. The combination of the open source hardware and software system created a flexible and expandable platform for further developments in the future, both in the software and hardware areas, in particular in combination with graph database for artificial intelligence, as well as more sophisticated hardware, such as legged or humanoid robots. (paper)
open source information— osint (newspapers...by user agencies. Section 1052 of the Intelligence Reform Act expressed the sense of Congress that there should be an open source intelligence ...center to coordinate the collection, analysis, production, and dissemination of open source intelligence to other intelligence agencies. An Open Source
Elayeb, Bilel; Evrard, Fabrice; Zaghdoud, Montaceur; Ahmed, Mohamed Ben
Purpose: The purpose of this paper is to make a scientific contribution to web information retrieval (IR). Design/methodology/approach: A multiagent system for web IR is proposed based on new technologies: Hierarchical Small-Worlds (HSW) and Possibilistic Networks (PN). This system is based on a possibilistic qualitative approach which extends the…
Full Text Available One of the obvious trends in current business environment is the increased competition. In this context, organizations are becoming more and more aware of the importance of knowledge as a key factor in obtaining competitive advantage. A possible solution in knowledge management is Economic Intelligence (EI that involves the collection, evaluation, processing, analysis, and dissemination of economic data (about products, clients, competitors, etc. inside organizations. The availability of massive quantities of data correlated with advances in information and communication technology allowing for the filtering and processing of these data provide new tools for the production of economic intelligence.The research is focused on innovative aspects of economic intelligence process (models of analysis, activities, methods and informational tools and is providing practical guidelines for initiating this process. In this paper, we try: (a to contribute to a coherent view on economic intelligence process (approaches, stages, fields of application; b to describe the most important models of analysis related to this process; c to analyze the activities, methods and tools associated with each stage of an EI process.
ZANG Tie-gang; YANG Ming-zhong; GUO Shun-sheng
A maintenance information system is an important part of equipment management. An intelli gent maintenance information system ( IMIS) is a synthesis of network technology, information technology and intelligent technology. The IMIS is used to finish flexible maintenance decision-making and fast maintenance planning, which helps enterprises to effectively reduce maintenance cost and increase working efficiency. Because the IMIS integrates advanced technologies, its performance is better than a traditional one.The difference between an IMIS and a traditional maintenance information system, and the functions, structure, important realizations, and application of an IMIS are discussed in this paper.
Pierce, John C.; And Others
Examines environmental information source reliance among American and Japanese citizens. Finds that the Japanese are inclined to rely on non-mass media sources, whereas Americans exhibit greater differentiation among sources. (RS)
A new approach is developed for optimizing the geometrical shape of a cold neutron source to maximize its cold neutron outward leakage. An analogy is drawn between the shape optimization problem and a state space search, which is the fundamental problem in Artificial Intelligence applications. The new optimization concept is implemented in the computer code DAIT in which the physical model is represented by a two group, r-z geometry nodal diffusion method, and the state space search is conducted via the Nearest Neighbor algorithm. The accuracy of the nodal diffusion method solution is established on meshes of interest, and is shown to behave qualitatively the same as transport theory solutions. The dependence of the optimum shape and its value on several physical and search parameters is examined via numerical experimentation. 10 refs., 6 figs., 2 tabs
Full Text Available In recent years, a wide range of Business Intelligence (BI technologies have been applied to different areas in order to support the decision-making process. BI enables the extraction of knowledge from the data stored. The healthcare industry is no exception, and so BI applications have been under investigation across multiple units of different institutions. Thus, in this article, we intend to analyze some open-source/free BI tools on the market and their applicability in the clinical sphere, taking into consideration the general characteristics of the clinical environment. For this purpose, six BI tools were selected, analyzed, and tested in a practical environment. Then, a comparison metric and a ranking were defined for the tested applications in order to choose the one that best applies to the extraction of useful knowledge and clinical data in a healthcare environment. Finally, a pervasive BI platform was developed using a real case in order to prove the tool viability.
Information Technology Quarterly, 1985
This issue of "Information Technology Quarterly" is devoted to the theme of "Artificial Intelligence." It contains two major articles: (1) Artificial Intelligence and Law" (D. Peter O'Neill and George D. Wood); (2) "Artificial Intelligence: A Long and Winding Road" (John J. Simon, Jr.). In addition, it contains two sidebars: (1) "Calculating and…
Bergeron, Pierrette; Hiller, Christine A.
Reviews the evolution of competitive intelligence since 1994, including terminology and definitions and analytical techniques. Addresses the issue of ethics; explores how information technology supports the competitive intelligence process; and discusses education and training opportunities for competitive intelligence, including core competencies…
Alston, Patricia Gayle
Presents an overview of electronic and published sources on pesticides. Includes sources such as databases, CD-ROMs, books, journals, brochures, pamphlets, fact sheets, hotlines, courses, electronic mail, and electronic bulletin boards. (MCO)
Introduction: The study investigated the source preference criteria of library and information science students for their academic and personal information needs. Method: The empirical study was based on two methods of data collection. Eighteen participants wrote a personal diary for four months in which they recorded search episodes and answered…
Maitra, N; Baxi, R K; Hazra, M
A survey of 959 young females (ages 10-21 years) from India highlighted the importance of educational attainment to fertility-related behaviors. Respondents represented a spectrum of educational levels: school drop-outs (32%), primary and secondary school attendees (41%), and college students (27%). The mean age at menarche was 13.6 years. School drop-outs were most likely to have obtained information about sexuality from films and other mass media, while students cited friends and neighbors as primary sources. There was an positive association between educational level and both preferred age at marriage and intended interval from marriage to first birth. 42% of adolescents with a secondary or college education planned to marry after 23 years of age and 84% wanted to defer childbearing for at least two years after marriage. The desire for formal sex education was strong in all educational subgroups (about 62%), however. It has been estimated that postponement of the marriage age from 16 years to 20-21 years would result in a 20-30% decrease in the annual number of births in India. School-based sex education represents a feasible mechanism for helping to achieve this goal.
Tsai, Pei-Wei; Huang, Hsiang-Cheh
This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing. .
Schoenmakers, Berry; Tjoelker, Jilles; Tuyls, Pim; Verbitskiy, Evgeny
We investigate the recently introduced notion of smooth Rényi entropy for the case of ergodic information sources, thereby generalizing previous work which concentrated mainly on i.i.d. information sources. We will actually consider ergodic quantum information sources, of which ergodic classical
Schoenmakers, B.; Tjoelker, J.; Tuyls, P.T.; Verbitskiy, E.A.
We investigate the recently introduced notion of smooth Rényi entropy for the case of ergodic information sources, thereby generalizing previous work which concentrated mainly on i.i.d. information sources. We will actually consider ergodic quantum information sources, of which ergodic classical
Jiang, Ying; Tang, Yize; Lu, Wenda; Wang, Zhongfeng; Wang, Zepeng; Zhang, Luming
Tone is an essential component of word formation in all tonal languages, and it plays an important role in the transmission of information in speech communication. Therefore, tones characteristics study can be applied into security analysis of acoustic signal by the means of language identification, etc. In speech processing, fundamental frequency (F0) is often viewed as representing tones by researchers of speech synthesis. However, regular F0 values may lead to low naturalness in synthesized speech. Moreover, F0 and tone are not equivalent linguistically; F0 is just a representation of a tone. Therefore, the Electroglottography (EGG) signal is collected for deeper tones characteristics study. In this paper, focusing on the Northern Kam language, which has nine tonal contours and five level tone types, we first collected EGG and speech signals from six natural male speakers of the Northern Kam language, and then achieved the clustering distributions of the tone curves. After summarizing the main characteristics of tones of Northern Kam, we analyzed the relationship between EGG and speech signal parameters, and laid the foundation for further security analysis of acoustic signal.
Rahman, Md. Hakikur; Sousa, Rui Dinis
Information Systems and Technology for Organizational Agility, Intelligence, and Resilience aims to advise and support organizational agents who want ensure success in terms of financial, social, and environmental aspects, as well as in the aspect of human development, in a more sustainable way. The premier reference work provides examples of conceptual research, methodologies, empirical cases, and success cases for academics, researchers, intermediaries, and organizations looking to use info...
This volume contains 59 papers presented at ICTIS 2015: International Conference on Information and Communication Technology for Intelligent Systems. The conference was held during 28th and 29th November, 2015, Ahmedabad, India and organized communally by Venus International College of Technology, Association of Computer Machinery, Ahmedabad Chapter and Supported by Computer Society of India Division IV – Communication and Division V – Education and Research. This volume contains papers mainly focused on ICT for Computation, Algorithms and Data Analytics etc.
Kates, James M; Arehart, Kathryn H
This paper uses mutual information to quantify the relationship between envelope modulation fidelity and perceptual responses. Data from several previous experiments that measured speech intelligibility, speech quality, and music quality are evaluated for normal-hearing and hearing-impaired listeners. A model of the auditory periphery is used to generate envelope signals, and envelope modulation fidelity is calculated using the normalized cross-covariance of the degraded signal envelope with that of a reference signal. Two procedures are used to describe the envelope modulation: (1) modulation within each auditory frequency band and (2) spectro-temporal processing that analyzes the modulation of spectral ripple components fit to successive short-time spectra. The results indicate that low modulation rates provide the highest information for intelligibility, while high modulation rates provide the highest information for speech and music quality. The low-to-mid auditory frequencies are most important for intelligibility, while mid frequencies are most important for speech quality and high frequencies are most important for music quality. Differences between the spectral ripple components used for the spectro-temporal analysis were not significant in five of the six experimental conditions evaluated. The results indicate that different modulation-rate and auditory-frequency weights may be appropriate for indices designed to predict different types of perceptual relationships.
Taylor, Arthur; Dalal, Heather A.
Information literacy studies have shown that college students use a variety of information sources to perform research and commonly choose Internet sources over traditional library sources. Studies have also shown that students do not appear to understand the information quality issues concerning Internet information sources and may lack the…
MASINT Measurement and Signature Intelligence NPS Naval Postgraduate School OSINT Open Source Intelligence pdf Probability Density Function SIGINT...MASINT): different types of sensors • Open Source Intelligence ( OSINT ): from all open sources • Signals Intelligence (SIGINT): intercepting the
Marcelo Botelho da Costa Moraes
Full Text Available Accounting aims at the treatment of information related to economic events within organizations. In order to do so, the double entry method is used (debt and credit accounting, which only considers monetary variations. With the development of information technologies, accounting information systems are born. In the 1980’s, the REA model (economic Resources, economic Events and economic Agents is created, which focuses on accounting information records, based on the association of economic resources, economic events and economic agents. The objective of this work is to demonstrate an object-oriented modeling with intelligent agents use, for information development and analysis focused on users. The proposed model is also analyzed according to accounting information quality, necessary for accounting information users, capable to comply with the needs of different user groups, with advantages in applications.
Adabi, Saba; Mohebbikarkhoran, Hamed; Mehregan, Darius; Conforto, Silvia; Nasiriavanaki, Mohammadreza
Optical Coherence Optical coherence tomography is a powerful high-resolution imaging method with a broad biomedical application. Nonetheless, OCT images suffer from a multiplicative artefacts so-called speckle, a result of coherent imaging of system. Digital filters become ubiquitous means for speckle reduction. Addressing the fact that there still a room for despeckling in OCT, we proposed an intelligent speckle reduction framework based on OCT tissue morphological, textural and optical features that through a trained network selects the winner filter in which adaptively suppress the speckle noise while preserve structural information of OCT signal. These parameters are calculated for different steps of the procedure to be used in designed Artificial Neural Network decider that select the best denoising technique for each segment of the image. Results of training shows the dominant filter is BM3D from the last category.
Full Text Available Business Intelligence is the combination of the information from several sources, and presenting results in a form that can be used in taking business decisions. Processed and presented in an intelligent way, this information gives the company the advanta
specificity. Math . Methods Oper. Res. 68(3): 539–549. Lange R-J (2012) Brownian motion and multidimensional decision making. Unpublished doctoral...intelligence assets, political ramifications, etc. We describe the problem in §2 and formulate the mathe - matical model in §3. The cases of n= 2 and n...boundary problem in n dimensions. When n> 2 cells, our problem relates to the family of multinomial selection problems (Kim and Nelson 2006) in which an
Alloza, Clara; Cox, Simon R; Duff, Barbara; Semple, Scott I; Bastin, Mark E; Whalley, Heather C; Lawrie, Stephen M
Several authors have proposed that schizophrenia is the result of impaired connectivity between specific brain regions rather than differences in local brain activity. White matter abnormalities have been suggested as the anatomical substrate for this dysconnectivity hypothesis. Information processing speed may act as a key cognitive resource facilitating higher order cognition by allowing multiple cognitive processes to be simultaneously available. However, there is a lack of established associations between these variables in schizophrenia. We hypothesised that the relationship between white matter and general intelligence would be mediated by processing speed. White matter water diffusion parameters were studied using Tract-based Spatial Statistics and computed within 46 regions-of-interest (ROI). Principal component analysis was conducted on these white matter ROI for fractional anisotropy (FA) and mean diffusivity, and on neurocognitive subtests to extract general factors of white mater structure (gFA, gMD), general intelligence (g) and processing speed (gspeed). There was a positive correlation between g and gFA (r= 0.67, p =0.001) that was partially and significantly mediated by gspeed (56.22% CI: 0.10-0.62). These findings suggest a plausible model of structure-function relations in schizophrenia, whereby white matter structure may provide a neuroanatomical substrate for general intelligence, which is partly supported by speed of information processing. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Hackney, RA; Dooley, P; Levvy, Y; Parrish, J
Business Intelligence (BI) systems have been rated as a leading technology for the last several years. However, organizations have struggled to ensure that high quality information is provided to and from BI systems. This suggests that organizations have recognized the value of information and the potential opportunities available but are challenged by the lack of success in Business Intelligence Systems Implementation (BISI). Therefore, our research addresses the preponderance of failed BI s...
Full Text Available In this review we integrate results of long term experimental study on ant “language” and intelligence which were fully based on fundamental ideas of Information Theory, such as the Shannon entropy, the Kolmogorov complexity, and the Shannon’s equation connecting the length of a message (l and its frequency (p, i.e., l = –log p for rational communication systems. This approach enabled us to obtain the following important results on ants’ communication and intelligence: (i to reveal “distant homing” in ants, that is, their ability to transfer information about remote events; (ii to estimate the rate of information transmission; (iii to reveal that ants are able to grasp regularities and to use them for “compression” of information; (iv to reveal that ants are able to transfer to each other the information about the number of objects; (v to discover that ants can add and subtract small numbers. The obtained results show that information theory is not only excellent mathematical theory, but many of its results may be considered as Nature laws.
Given the vast amount of legal information available, it is sometimes very difficult - and certainly very time consuming - to know where to start looking for the specific information you require. This book, covering the most up-to-date information sources (printed and electronic), helps guide the reader towards the information they need. It is an accessible and easy-to-use directory of legal information sources for librarians, lawyers, students and anyone needing legal information. The book covers mainly British and European Union law and includes general material and the main subject areas, including online and internet sources. It also lists reference material, such as legal dictionaries and directories. The book is essentially a directory of information sources, with publishing details (including ISBN), and short comments where useful. Electronic sources are mentioned where relevant, with details of scope and any limitations of coverage. Comprehensive and up-to-date (covering electronic sources and importa...
Petrova Irina Yur’evna
Full Text Available The article considers the modern requirements for integrated management systems of a smart home. The authors propose a hierarchical classification of the levels of house automation, which allows allocating different levels of information transfer. The article considers the trends of development of information-measuring and control systems of intelligent buildings. The generalized scheme of information-measuring and control subsystems of an intelligent building are given. The energy-information model of the knowledge base of physical and technical effects described in the article allows developing a system of automated support of the conceptual stage of elements design in information measuring and control systems. With the help of this knowledge base the system allows dozens of times expanding the scope of knowledge actively used by specialists and two or three times reducing the time of creating new solutions by selecting the most efficient of the options and the underlying calculation of the essential characteristics of their conceptual models, which significantly reduces the number of created prototypes and field tests.
Funkhouser, Ellen; Agee, Bonita S; Gordan, Valeria V
journals online, obtained continuing education (CDE) through online sources, rated an online source as most influential, and reported frequently using an online source for guidance. Demographics, journals read, and use of various sources of information for practice guidance in terms of frequency...
Open source techniques are an increasingly important tool for in safeguards. From social networking sites, such as Linkedin, to B2B portals like Alibaba, there are large open source databases that touch all aspects of the nuclear fuel cycle, from goods to scientists. This is in addition to the wealth of more traditional open source tools such as search engines. In this paper we focus on the potential of B2B sites to provide dual use goods for use in the nuclear fuel cycle. We will discuss the availability of these items as well as the frequency and content of tenders. As many of the largest sites—by traffic and content—are in Asia we will examine the potential of these sites to provide goods used in the nuclear fuel cycle. (author)
Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee
information source selection and management framework and presents an algorithm which selects the information source based on the information mismatch probability . The sampling rate for every access is decided as per the maximum allowable power consumption limit. Index Terms-wireless sensor network...
Crawford, Chelsi; Grossman, Julie; Warren, Sarah T.; Cubbage, Fred
This article reports on a study to determine which information sources organic growers use to inform farming practices by conducting in-depth semi-structured interviews with 23 organic farmers across 17 North Carolina counties. Effective information sources included: networking, agricultural organizations, universities, conferences, Extension, Web…
Conner, Ronald C.
This 25-page annotated bibliography describes the legal reference materials in the special collection of a medium-sized public library. Sources are listed in 12 categories: cases, dictionaries, directories, encyclopedias, forms, references for the lay person, general, indexes, laws and legislation, legal research aids, periodicals, and specialized…
Batik, Albert; Hale, Eleanor
Among the data described are infrared indexes, mass spectral data, chromatographic data, X-ray emmission data, odor and taste threshold data, and thermodynamics data. This paper provides the chemical documentarian a complete reference source to a wide variety of analytical data. (Author/NH)
V. A. Vishniakov
Full Text Available Two problems the use of intelligence technologies in information defense (ITID – creating specialized knowledge bases with threats simulation and high the security level in corporative nets and cloud computing are presented. The analysis of t wo directions of the second ITID problem: the intelligence decision support systems and the malt y-agent system use are given. As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing.
phenomenon. This Research Paper, by contrast, considers another source of data that could inform this analysis, namely the financial intelligence (FININT generated by the huge quantities of transaction data gathered by the financial-services industry as it processes bank transfers, ATM withdrawals and credit-card transactions. It asks what barriers exist to greater partnership and information sharing between the security authorities and the financial-services industry in tackling terrorism. And whether, within the parameters of acceptable data-privacy restrictions, an intelligent and intelligence-led relationship between the security authorities and the financial-services industry could provide greater and more timely insight into which individuals are travelling to Syria or are already in-country, and (perhaps most importantly who, having been exposed to the extremist ideology espoused by groups such Daesh, has returned home. The lack of partnership and information sharing between the public and private sectors is dramatically hindering the valuable role banks could play in assisting in disrupting terrorism. Advances in technology and transaction-monitoring systems have immeasurably improved the capabilities of banks and other financial institutions, such as large-scale remittance companies, to play the front-line role that is required of them by the authorities. The security threat posed by FTFs – and the apparent struggle faced by national security authorities in identifying and tracking such individuals – provides an ideal and timely platform from which to discuss the role that banks can play in countering terrorist threats, which requires urgent re-evaluation and enhancement. The FTF phenomenon has caught security authorities across the globe off guard. Authorities in many Western capitals only awoke, belatedly, to the threat once many hundreds of their citizens had made the journey to Syria and had begun openly to promote their actions via social media. Significant
To communicate information on chemical pollution health risks effectively, policy makers must know .... opinions, and perception of environmental health risks,. (ii) know their .... information on health risks from multiple sources. Similarly when ...
Full Text Available The interplay of an ever-growing number of inhabitants, sprawl development, soil sealing, changes in urban traffic characteristics, as well as observed climate trends gives rise to more frequent pluvial flooding in cities, a higher run-off of water, and an increasing pollution of surface water. The aim of this research is to develop a location intelligence system for the assessment of pluvial flooding risks and the identification of storm water pollutant sources from roads in newly-developed areas. The system combines geographic information systems and business intelligence software, and it is based on the original Pluvial Flood Risk Assessment tool. The location intelligence system effectively identifies the spatial and temporal distribution of pluvial flood risks, allows to preliminarily evaluate the total run-off from roads, and helps localise potential places for new water management infrastructure. Further improvements concern the modelling of a flow accumulation and drainage system, the application of weather radar precipitation data, and traffic monitoring and modelling.
Inasaka, Fujio; Nariai, Hideki
At the Ship Research Institute, a series of the experimental studies on the thermal-hydraulic characteristics of an integrated type marine water reactor has been conducted. This current study aims at developing an intelligent information database program with the thermal-hydraulic characteristics of a future marine water reactor on the basis of the valuably experimental knowledge, which was obtained from the above-mentioned studies. In this paper, the experimental knowledge with the flow boiling of a once-through steam generator and the natural circulation of primary water under a ship rolling motion was converted into an intelligent information database program. The program was created as a Windows application using the Visual Basic. Main functions of the program are as follows: (1) steady state flow boiling analysis and determination of stability for any helical-coil type once-through steam generator design, (2) reference and graphic display of the experimental data, (3) reference of the information such as analysis method and experimental apparatus. The program will be useful for the design of not only the future integrated type marine water reactor but also the small sized reactor with helical-coil type steam generator. (author)
Kwiatkowski, L.; Verhoef, C.
IT has become a production means for many organizations and an important element of business strategy. Even though its effective management is a must, reality shows that this area still remains in its infancy. IT management relies profoundly on relevant information which enables risk mitigation or
The study investigated the adequacy of pharmaceutical scientists' information environment in feeding their occupational activities. Data was collected through observation and through questionnaire administration to all the twenty-seven scientists in two large pharmaceutical companies in Lagos, Nigeria. Findings revealed ...
The very Paper introduces the contemporary challenges faced by the profession of technical intelligence on nuclear power, and expatiates the functions of technical intelligence such as sources of experience feedback, background information and supports for decision-making. Afterwards, the Paper explains characteristics of technical intelligence and its working methods, i.e., quantitative changes to reach qualitative changes, approve-negate-approve and oppositeness unity of comprehensiveness and limitation of technical intelligence. (authors)
Intelligence : Understanding the Hidden Side of Government. Vol. 1. Westport, CT: Praeger Security International, 2007. 4 Ibid., 4. 8 • OSINT – Open ... source intelligence from open literature such as newspapers • SIGINT – Signals intelligence from capturing communications from one person to... intelligence community. The fire service in gaining access to information and adding untapped sources of information/ intelligence can add value to the
Saito, Yoshihito; Matsuo, Tokuro
Education institutions such as universities have a lot of information including book information, equipment administrative information, student information, and several others. The institutions also have multiple information in time series. As collective intelligence in campus, integrating and reusing these preserved information regarding career and taking a class, university can effectively support students' decision making of their getting jobs and subjects choice. Our purpose of support is to increase student's motivation. In this paper, we focus on course record and job information included in students' information, and propose the method to analyze correlation between a pattern of taking class and job lined up. Afterwards, we propose a support system regarding getting a job and taking class by using our proposed method. For a student who has his/her favorite job to get, the system supports his/her decision making of lecture choice by recommending a set of appropriate lecture groups. On another hand, for a student who does not have favorite job to get, the system supports his/her decision making of getting job by presenting appropriate job families related with lecture group in which he/she has ever taken. The contribution of this paper is showing a concrete method to reuse the campus collective information, implementing a system, and user perspectives.
to their production. The study therefore examines the various sources of information available to farmers on climate change and their level of awareness. .... Source of Financial Capital. Bank loan. 8.1. Coop loan. 21.1. Self financed. 60.2. Mode=Self financed. Friends and Relations. 10.5. Source: Field survey, 2011.
Background: Access to and use of electronic information sources for clinical decision is the key to the attainment of health related sustainable goals. Therefore, this study was to assess Electronic Information Sources (EIS) access and use for healthcare service among hospitals of Western Oromia, Ethiopia, 2013. Materials ...
Babalhavaeji, Fahimeh; Farhadpoor, Mohammad Reza
Purpose: This article examines characteristics of the external environment of library and information centres of Islamic Azad University in Iran, focusing on perceived environmental uncertainty and perceived source accessibility and quality, and their impacts on the amount of scanning and the frequency of information source use. Methods: This…
Sources of drug information and their influence on the prescribing behaviour of doctors in a teaching hospital in Ibadan, Nigeria. ... Drug information was sourced from colleagues (161, 98.8%), reference books (158, 96.9%), pharmaceutical sales representatives-PSRs (152, 93.2%), promotion materials (151, 92.6%), ...
The paper concludes that, though there are a number of sources through which young people may be receiving sexual health information, the majority of them are not satisfied with the quality of information they get from many of such sources. Key words: Parents, health workers, teachers, students, sexuality education, rural ...
It is argued that to evaluate an information source (e.g., a Wikipedia article), it is necessary to relate the content of that source to an interpretation of the state of knowledge at the research front (which is typically developing dynamically). In the research literature, there is a controversy...... about the effect of screening programs for breast cancer. This controversy is used to compare the value of Wikipedia with Encyclopedia Britannica and two Danish encyclopedias as information sources. It is argued that this method of examining information sources is preferable to other methods which have...
Making quick and effective decisions in environment management are based on multiple and complex parameters, a data warehouse is a powerful tool for the over all management of massive environmental information. Selecting the right data from a warehouse is an important factor consideration for end-users. This paper proposed an intelligent environmental data warehouse system. It consists of data warehouse to feed an environmental researchers and managers with desire environmental information needs to their research studies and decision in form of geometric and attribute data for study area, and a metadata for the other sources of environmental information. In addition, the proposed intelligent search engine works according to a set of rule, which enables the system to be aware of the environmental data wanted by the end-user. The system development process passes through four stages. These are data preparation, warehouse development, intelligent engine development and internet platform system development. (author)
Malvache, P.; Mourlevat, J.L.
Artificial Intelligence techniques are already used in nuclear plants for assistance to operation: synthesis from numerous information sources may be then derived, based on expert knowledge. Artificial intelligence may be used also for quality and reliability assessment of software-based control-command systems. Various expert systems developed by CEA, EDF and Framatome are presented
Full Text Available This study considers an intelligent control system to integrate flexibly its components by using weighted information where the system evaluation is reflected. Such system evaluates the information flowing through the components and converts them by weighting depending on the degree of importance. Integration of components based on the system evaluation enables a system consisting of them to realize various, flexible and adaptive control. In this study, the intelligent control method is applied to a swing up and stabilization control problem of a number of cart and pendulum systems on a restricted straight guide. To stabilize the pendulum in a restricted environment, each system should realize not only a swing-up and stabilization control of the pendulum, but also a position control of the cart to avoid collision or deadlock. The experiment using a real apparatus demonstrated that the controller learning light interaction acquires egoistic character, the controller learning heavy interaction behaves altruistically, and the controller equally considering self cart and another cart becomes cooperative. In other words, these autonomous decentralized controllers can acquire various characters and flexibility for cooperation.
Villarubia, Gabriel; De Paz, Juan F.; Bajo, Javier
The use of electric bikes (e-bikes) has grown in popularity, especially in large cities where overcrowding and traffic congestion are common. This paper proposes an intelligent engine management system for e-bikes which uses the information collected from sensors to optimize battery energy and time. The intelligent engine management system consists of a built-in network of sensors in the e-bike, which is used for multi-sensor data fusion; the collected data is analysed and fused and on the basis of this information the system can provide the user with optimal and personalized assistance. The user is given recommendations related to battery consumption, sensors, and other parameters associated with the route travelled, such as duration, speed, or variation in altitude. To provide a user with these recommendations, artificial neural networks are used to estimate speed and consumption for each of the segments of a route. These estimates are incorporated into evolutionary algorithms in order to make the optimizations. A comparative analysis of the results obtained has been conducted for when routes were travelled with and without the optimization system. From the experiments, it is evident that the use of an engine management system results in significant energy and time savings. Moreover, user satisfaction increases as the level of assistance adapts to user behavior and the characteristics of the route. PMID:29088087
Daniel H. De La Iglesia
Full Text Available The use of electric bikes (e-bikes has grown in popularity, especially in large cities where overcrowding and traffic congestion are common. This paper proposes an intelligent engine management system for e-bikes which uses the information collected from sensors to optimize battery energy and time. The intelligent engine management system consists of a built-in network of sensors in the e-bike, which is used for multi-sensor data fusion; the collected data is analysed and fused and on the basis of this information the system can provide the user with optimal and personalized assistance. The user is given recommendations related to battery consumption, sensors, and other parameters associated with the route travelled, such as duration, speed, or variation in altitude. To provide a user with these recommendations, artificial neural networks are used to estimate speed and consumption for each of the segments of a route. These estimates are incorporated into evolutionary algorithms in order to make the optimizations. A comparative analysis of the results obtained has been conducted for when routes were travelled with and without the optimization system. From the experiments, it is evident that the use of an engine management system results in significant energy and time savings. Moreover, user satisfaction increases as the level of assistance adapts to user behavior and the characteristics of the route.
De La Iglesia, Daniel H; Villarrubia, Gabriel; De Paz, Juan F; Bajo, Javier
The use of electric bikes (e-bikes) has grown in popularity, especially in large cities where overcrowding and traffic congestion are common. This paper proposes an intelligent engine management system for e-bikes which uses the information collected from sensors to optimize battery energy and time. The intelligent engine management system consists of a built-in network of sensors in the e-bike, which is used for multi-sensor data fusion; the collected data is analysed and fused and on the basis of this information the system can provide the user with optimal and personalized assistance. The user is given recommendations related to battery consumption, sensors, and other parameters associated with the route travelled, such as duration, speed, or variation in altitude. To provide a user with these recommendations, artificial neural networks are used to estimate speed and consumption for each of the segments of a route. These estimates are incorporated into evolutionary algorithms in order to make the optimizations. A comparative analysis of the results obtained has been conducted for when routes were travelled with and without the optimization system. From the experiments, it is evident that the use of an engine management system results in significant energy and time savings. Moreover, user satisfaction increases as the level of assistance adapts to user behavior and the characteristics of the route.
G?mez, Jaime; Salazar, Idana; Vargas, Pilar
In this paper we use a panel of manufacturing firms in Spain to examine the extent to which they use internal and external sources of information (customers, suppliers, competitors, consultants and universities) to generate product and process innovation. Our results show that, although internal sources are influential, external sources of information are key to achieve innovation performance. These results are in line with the open innovation literature because they show that firms that are ...
Pulido-Martos, Manuel; Lopez-Zafra, Esther; Estévez-López, Fernando; Augusto-Landa, José María
This study analyzes the role of Perceived Emotional Intelligence (PEI) on sources of job stress and mental health in 250 elementary school teachers from Jaén (Spain). The aim of the study was two-fold: (1) to analyze the associations between Perceived Emotional Intelligence (PEI), sources of occupational stress and mental health; and (2) to determine whether PEI moderates the relationship between sources of occupational stress and mental health. An initial sample of 250 teachers was assessed Three questionnaires, the Trait Meta-Mood Scale, the Sources of Stress Scale in Teachers and the Medical Outcomes Study 36-item Short Form Health Survey, were used to evaluate PEI, sources of occupational stress and mental health, respectively. Teachers with higher levels of emotional attention reported lower levels of mental health (r = -.30; p relationship between sources of occupational stress and emotional role. Specifically, each significant interaction (i.e., deficiencies x attention, adaptation x attention, and adaptation x clarity) made a small and unique contribution in the explanation of emotional role (all p < .05, all sr 2 ∼ .02). Finally, our results imply that PEI is an important moderator of teachers´ occupational stressors on mental health.
Payne, Perry W
The National Plan to Address Alzheimer's Disease calls for a new relationship between researchers and members of the public. This relationship is one that provides research information to patients and allows patients to provide ideas to researchers. One way to describe it is a "bidirectional translational relationship." Despite the numerous sources of online and offline information about Alzheimer's disease, there is no information source which currently provides this interaction. This article proposes the creation an Alzheimer's research information source dedicated to monitoring Alzheimer's research literature and providing user friendly, publicly accessible summaries of data written specifically for a lay audience. This information source should contain comprehensive, updated, user friendly, publicly available, reviews of Alzheimer's research and utilize existing online multimedia/social networking tools to provide information in useful formats that help patients, caregivers, and researchers learn rapidly from one another.
Lawson, Rob; Forbes, Sarah; Williams, John
To understand the different patterns of trust that exist regarding different sources of information about health issues. Data from a large national health lifestyles survey of New Zealanders was examined using a factor analysis of trust toward 24 health information sources (HIS). Differences in trust are compared across a range of demographic variables. Factor analysis identified six different groupings of health information. Variations in trust in sources for health information are identified by age, employment status, level of education, income, sex and ethnic group. Systematic variations exist in the trust that people report with respect to different sources of health information. Understanding these variations may assist policymakers and other agencies which are responsible for planning the dissemination of health information.
Walraven, Amber; Brand-Gruwel, Saskia; Boshuizen, Henny P. A.
The World Wide Web (WWW) has become the biggest information source for students while solving information problems for school projects. Since anyone can post anything on the WWW, information is often unreliable or incomplete, and it is important to evaluate sources and information before using them. Earlier research has shown that students have…
Willcox, Jane C.; Campbell, Karen J.; McCarthy, Elizabeth A.; Lappas, Martha; Ball, Kylie; Crawford, David; Shub, Alexis; Wilkinson, Shelley A.
Background Promoting healthy gestational weight gain (GWG) is important for preventing obstetric and perinatal morbidity, along with obesity in both mother and child. Provision of GWG guidelines by health professionals predicts women meeting GWG guidelines. Research concerning women?s GWG information sources is limited. This study assessed pregnant women?s sources of GWG information and how, where and which women seek GWG information. Methods Consecutive women (n?=?1032) received a mailed que...
Through the course of this paper we define Locationbased Intelligence (LBI) which is outgrowing from process of amalgamation of geolocation and Business Intelligence. Amalgamating geolocation with traditional Business Intelligence (BI) results in a new dimension of BI named Location-based Intelligence. LBI is defined as leveraging unified location information for business intelligence. Collectively, enterprises can transform location data into business intelligence applic...
Malybaev, Saken K.; Malaybaev, Nurlan S.; Isina, Botakoz M.; Kenzhekeeva, Akbope R.; Khuangan, Nurbol
The article presents the results of researches aimed at the creation of automated workplaces for railway transport specialists with the help of intelligent information systems. The analysis of tendencies of information technologies development in the transport network was conducted. It was determined that the most effective approach is to create…
Gómez, Jaime; Salazar, Idana; Vargas, Pilar
In this paper we use a panel of manufacturing firms in Spain to examine the extent to which they use internal and external sources of information (customers, suppliers, competitors, consultants and universities) to generate product and process innovation. Our results show that, although internal sources are influential, external sources of information are key to achieve innovation performance. These results are in line with the open innovation literature because they show that firms that are opening up their innovation process and that use different information sources have a greater capacity to generate innovations. We also find that the importance of external sources of information varies depending on the type of innovation (product or process) considered. To generate process innovation, firms mainly rely on suppliers while, to generate product innovation, the main contribution is from customers. The potential simultaneity between product and process innovation is also taken into consideration. We find that the generation of both types of innovation is not independent.
Full Text Available In this paper we use a panel of manufacturing firms in Spain to examine the extent to which they use internal and external sources of information (customers, suppliers, competitors, consultants and universities to generate product and process innovation. Our results show that, although internal sources are influential, external sources of information are key to achieve innovation performance. These results are in line with the open innovation literature because they show that firms that are opening up their innovation process and that use different information sources have a greater capacity to generate innovations. We also find that the importance of external sources of information varies depending on the type of innovation (product or process considered. To generate process innovation, firms mainly rely on suppliers while, to generate product innovation, the main contribution is from customers. The potential simultaneity between product and process innovation is also taken into consideration. We find that the generation of both types of innovation is not independent.
Doak, J.; Howell, J.A.
This work was initially performed for the International Atomic Energy Agency (IAEA) to help with the Open Source Task of the 93 + 2 Initiative; however, the information should be of interest to anyone working with open sources. The authors cover all aspects of an open source information system (OSIS) including, for example, identifying relevant sources, understanding copyright issues, and making information available to analysts. They foresee this document as a reference point that implementors of a system could augment for their particular needs. The primary organization of this document focuses on specific aspects, or components, of an OSIS; they describe each component and often make specific recommendations for its implementation. This document also contains a section discussing the process of collecting open source data and a section containing miscellaneous information. The appendix contains a listing of various providers, producers, and databases that the authors have come across in their research.
In this paper we use a panel of manufacturing firms in Spain to examine the extent to which they use internal and external sources of information (customers, suppliers, competitors, consultants and universities) to generate product and process innovation. Our results show that, although internal sources are influential, external sources of information are key to achieve innovation performance. These results are in line with the open innovation literature because they show that firms that are opening up their innovation process and that use different information sources have a greater capacity to generate innovations. We also find that the importance of external sources of information varies depending on the type of innovation (product or process) considered. To generate process innovation, firms mainly rely on suppliers while, to generate product innovation, the main contribution is from customers. The potential simultaneity between product and process innovation is also taken into consideration. We find that the generation of both types of innovation is not independent. PMID:27035456
McDaniel, Michael A.; Whetzel, Deborah L.
[Gottfredson, L. S. (2003). Dissecting practical intelligence theory: Its claims and evidence. Intelligence, 31, 343-397.] provided a detailed critique of Sternberg's [Sternberg, R. J., Fotsythe, G. B., Hedlund, J., Horvath, J. A., Wagner, R. K., Williams, W. M., Snook, S. A., Grigorenko, E. L. (2000). Practical intelligence in everyday life. New…
Hashimoto, H. [The University of Tokyo, Tokyo (Japan). Institute of Industrial Science
Intelligent mechatronics (IM) was explained as follows: a study of IM essentially targets realization of a robot namely, but in the present stage the target is a creation of new values by intellectualization of machine, that is, a combination of the information infrastructure and the intelligent machine system. IM is also thought to be constituted of computers positively used and micromechatronics. The paper next introduces examples of IM study, mainly those the author is concerned with as shown below: sensor gloves, robot hands, robot eyes, tele operation, three-dimensional object recognition, mobile robot, magnetic bearing, construction of remote controlled unmanned dam, robot network, sensitivity communication using neuro baby, etc. 27 figs.
Jones, Rachel K.; Biddlecom, Ann E.; Hebert, Luciana; Mellor, Ruth
Based on semistructured interviews with a racially and ethnically diverse sample of 58 U.S. high school students, this study examines teens' exposure to contraceptive information from a range of sources and the extent to which they trust this information. Teens report exposure to contraceptive information from many individuals and places, most…
Ruggeri, Azzurra; Lombrozo, Tania; Griffiths, Thomas L.; Xu, Fei
Children are active learners: they learn not only from the information people offer and the evidence they happen to observe, but by actively seeking information. However, children's information search strategies are typically less efficient than those of adults. In two studies, we isolate potential sources of developmental change in how children…
Full Text Available In the modern world the alternative energy sources, which considerably depend on a region, play more and more significant role. However, the transition of regions to new energy sources lead to the change of transport and logistic network configuration. The formation of optimal core transport network today is a guarantee of the successful economic development of a region tomorrow. The present article studies the issue of advanced core transport network development in a region based on the experience of European and Asian countries and the opportunity to adapt the best foreign experience to Russian conditions. On the basis of artificial intelligence methods for forest industry complex of Sverdlovskaya Oblast the algorithm of problem solution of an optimal logistic infrastructure allocation is offered and some results of a regional transport network are presented. These methods allowed to solve the set task in the conditions of information uncertainty. There are suggestions on the improvement of transport and logistic network in the territory of Sverdlovskaya Oblast. Traditionally the logistics of mineral fuel plays main role in regions development. Actually it is required to develop logistic strategic plans to be able to provide different possibilities of power-supply, flexible enough to change with the population density, transport infrastructure and demographics of different regions. The problem of logistic centers allocation was studied by many authors. The approach, offered by the authors of this paper is to solve the set of tasks by applying artificial intelligence methods, such as fuzzy set theory and genetic algorithms.
Yılmaz, Özgün; Erdur, Rıza Cenk; Türksever, Mustafa
In this paper, SAMS, a novel health information system architecture for developing intelligent health information systems is proposed and also some strategies for developing such systems are discussed. The systems fulfilling this architecture will be able to store electronic health records of the patients using OWL ontologies, share patient records among different hospitals and provide physicians expertise to assist them in making decisions. The system is intelligent because it is rule-based, makes use of rule-based reasoning and has the ability to learn and evolve itself. The learning capability is provided by extracting rules from previously given decisions by the physicians and then adding the extracted rules to the system. The proposed system is novel and original in all of these aspects. As a case study, a system is implemented conforming to SAMS architecture for use by dentists in the dental domain. The use of the developed system is described with a scenario. For evaluation, the developed dental information system will be used and tried by a group of dentists. The development of this system proves the applicability of SAMS architecture. By getting decision support from a system derived from this architecture, the cognitive gap between experienced and inexperienced physicians can be compensated. Thus, patient satisfaction can be achieved, inexperienced physicians are supported in decision making and the personnel can improve their knowledge. A physician can diagnose a case, which he/she has never diagnosed before, using this system. With the help of this system, it will be possible to store general domain knowledge in this system and the personnel's need to medical guideline documents will be reduced.
Thomm, Eva; Bromme, Rainer
When laypeople read controversial scientific information in order to make a personally relevant decision, information on the source is a valuable resource with which to evaluate multiple, competing claims. Due to their bounded understanding, laypeople rely on the expertise of others and need to identify whether sources are credible. The present…
Wei, Xuejuan; Wu, Hao; Cui, Shuqi; Ge, Caiying; Wang, Li; Jia, Hongyan; Liang, Wannian
To evaluate the effect of an intelligent Internet-based information system upon optimising the management of patients diagnosed with type 2 diabetes mellitus (T2DM). In 2015, a T2DM information system was introduced to optimise the management of T2DM patients for 1 year in Fangzhuang community of Beijing, China. A total of 602 T2DM patients who were registered in the health service centre of Fangzhuang community were enrolled based on an isometric sampling technique. The data from 587 patients were used in the final analysis. The intervention effect was subsequently assessed by statistically comparing multiple parameters, such as the prevalence of glycaemic control, standard health management and annual outpatient consultation visits per person, before and after the implementation of the T2DM information system. In 2015, a total of 1668 T2DM patients were newly registered in Fangzhuang community. The glycaemic control rate was calculated as 37.65% in 2014 and significantly elevated up to 62.35% in 2015 ( p information system, the rate of standard health management was increased from 48.04% to 85.01% ( p information system optimised the management of T2DM patients in Fangzhuang community and decreased the outpatient numbers in both community and general hospitals, which played a positive role in assisting T2DM patients and their healthcare providers to better manage this chronic illness.
Full Text Available Due to the extensive social influence, public health emergency has attracted great attention in today’s society. The booming social network is becoming a main information dissemination platform of those events and caused high concerns in emergency management, among which a good prediction of information dissemination in social networks is necessary for estimating the event’s social impacts and making a proper strategy. However, information dissemination is largely affected by complex interactive activities and group behaviors in social network; the existing methods and models are limited to achieve a satisfactory prediction result due to the open changeable social connections and uncertain information processing behaviors. ACP (artificial societies, computational experiments, and parallel execution provides an effective way to simulate the real situation. In order to obtain better information dissemination prediction in social networks, this paper proposes an intelligent computation method under the framework of TDF (Theory-Data-Feedback based on ACP simulation system which was successfully applied to the analysis of A (H1N1 Flu emergency.
Hu, Hongzhi; Mao, Huajuan; Hu, Xiaohua; Hu, Feng; Sun, Xuemin; Jing, Zaiping; Duan, Yunsuo
Due to the extensive social influence, public health emergency has attracted great attention in today's society. The booming social network is becoming a main information dissemination platform of those events and caused high concerns in emergency management, among which a good prediction of information dissemination in social networks is necessary for estimating the event's social impacts and making a proper strategy. However, information dissemination is largely affected by complex interactive activities and group behaviors in social network; the existing methods and models are limited to achieve a satisfactory prediction result due to the open changeable social connections and uncertain information processing behaviors. ACP (artificial societies, computational experiments, and parallel execution) provides an effective way to simulate the real situation. In order to obtain better information dissemination prediction in social networks, this paper proposes an intelligent computation method under the framework of TDF (Theory-Data-Feedback) based on ACP simulation system which was successfully applied to the analysis of A (H1N1) Flu emergency.
Full Text Available With the development of economy and society, big data storage in enterprise management has become a problem that can’t be ignored. How to manage and optimize the allocation of tasks better is an important factor in the sustainable development of an enterprise. Now the enterprise information intelligent management has become a hot spot of management mode and concept in the information age. It presents information to the business managers in a more efficient, lower cost, and global form. The system uses the SG-UAP development tools, which is based on Eclipse development environment, and suits for Windows operating system, with Oracle as database development platform, Tomcat network information service for application server. The system uses SOA service-oriented architecture, provides RESTful style service, and HTTP(S as the communication protocol, and JSON as the data format. The system is divided into two parts, the front-end and the backs-end, achieved functions like user login, registration, password retrieving, enterprise internal personnel information management and internal data display and other functions.
Mustonen, T. [Kuopio Univ. (Finland); Isoaho, S. [Tampere Univ. (Finland)
''Waste'' - Intelligent Information System for Waste Management - is a joint project of the University of Kuopio and the Tampere University of Technology. The main objective of the project is to create a basis for more comprehensive utilisation and management of waste management data and for the development of database management systems. The results of the project are numerous. A study of the present state of data management in the field of waste management was carried out. The studied aspects were for example information needs of different actors and their requirements for the information quality, interfaces for information exchange between different actors, and the characteristics of the software products. During the second phase of the project, a hyper document describing waste management systems, and a software application for describing material flows and their management will be finalized. Also methodologies and practices for processing data into information, which is needed in the decision making process, will be developed. The developed methodologies include e.g. data mining techniques, and the practices include e.g. the prediction of waste generation and optimisation of waste collection and transport. (orig.)
Diana, Rachel A.; Van den Boom, Wijnand; Yonelinas, Andrew P.; Ranganath, Charan
Source memory tests typically require subjects to make decisions about the context in which an item was encoded and are thought to depend on recollection of details from the study episode. Although it is generally believed that familiarity does not contribute to source memory, recent behavioral studies have suggested that familiarity may also support source recognition when item and source information are integrated, or “unitized”, during study (Diana, Yonelinas, and Ranganath 2008). However,...
In addition, information generated from the abattoirs are important in the formulation of effective ... However, meat from sheep, goats and pigs are equally important sources of protein. (Momoh et al. .... man and animal. Scientific publication No.
Agata Anna Salwa
Conclusions. Despite their doubts about their effectiveness and safety, parents expressed their positive opinion about the use of immunization in children. Increase physician activation as they are the primary source of health information for parents.
Olivia A. Wackowski
Conclusions: Future research should explore the content of e-cigarette information sources, their potential impact, and ways they might be strengthened or changed through regulatory and/or educational efforts.
SOURCES AND USE OF EXTENSION INFORMATION AMONG MAIZE ... play one role or the other toward ensuring that research-based technologies ..... alternative means of controlling weeds (e.g. hoeing), high cost of herbicides and the risk.
Amir Alishahi Tabriz
Conclusion : Although during 8 years of study radio and television remained as main source of health information but there is an increasing tendency to use internet especially in men. Policymakers should revise their broadcasting strategies based on people demand.
A. V. Masloboev
Full Text Available The paper deals with engineering problems and application perspectives of virtual cognitive centers as intelligent systems for information support of interagency activities in the field of complex security management of regional development. A research prototype of virtual cognitive center for regional security management in crisis situations, implemented as hybrid cloud service based on IaaS architectural framework with the usage of multi-agent and web-service technologies has been developed. Virtual cognitive center is a training simulator software system and is intended for solving on the basis of distributed simulation such problems as: strategic planning and forecasting of risk-sustainable development of regional socioeconomic systems, agents of management interaction specification synthesis for regional components security in different crisis situations within the planning stage of joint anti-crisis actions.
Julian G. Elliott
Full Text Available This paper examines the value of intelligence testing for the purpose of informing us how best to intervene with children with reading disability. While the original function of IQ testing was to ascertain whether a child was capable of profiting from schooling, there are many who now claim that cognitive assessment offers a range of diagnostic and prescriptive functions which can help teachers in delivering effective educational programs. This paper interrogates such assertions in relation to the assessment of IQ, cognitive strengths and weaknesses, executive functions, and the use of dynamic testing/assessment. The paper concludes that current evidence indicates that cognitive measures have limited relevance for instructional planning, and cognitive training programs have yet to show sufficient academic gains. For these reasons, it is recommended that our energies should be directed to the continuing development of powerful forms of academic skills-based instruction operating within a response to intervention framework.
An Informal Workshop on Intense Polarized Ion Sources was held on March 6, 1980, at the O'Hare Hilton Hotel, Chicago, Illinois. The purpose of the Workshop was to discuss problems in developing higher-intensity polarized proton sources, particularly the optically-pumped source recently proposed by L.W. Anderson of the University of Wisconsin. A summary of the discussions is reported
This thesis focuses on the information resources suitable for analysis of political and economic development. The main aim is to present sources which deal with the intelligence. The term "intelligence" is also subject to closer examination. The following chapters describe various sources of valuable information: from providers of security and political analyses to country intelligence.
Hendrawaty, Manise; Harisno, Harisno
Food is the main basic need of human, because of that fulfillment of human need of food has to be fulfilled. So it can fulfill that need, then government institution, Food Security Agency (BKP) is formed so it can monitor fulfillment of food need of society. The goals of this writing are to develop food security information system that provides dashboard facility based on business intelligence, to develop food security information system that can give fast, precise and real time information a...
Nunes, Paulo; Correia, Anacleto; Teodoro, M. Filomena
Since long ago, information is a key factor for military organizations. In military context the success of joint and combined operations depends on the accurate information and knowledge flow concerning the operational theatre: provision of resources, environment evolution, targets' location, where and when an event will occur. Modern military operations cannot be conceive without maps and geospatial information. Staffs and forces on the field request large volume of information during the planning and execution process, horizontal and vertical geospatial information integration is critical for decision cycle. Information and knowledge management are fundamental to clarify an environment full of uncertainty. Geospatial information (GI) management rises as a branch of information and knowledge management, responsible for the conversion process from raw data collect by human or electronic sensors to knowledge. Geospatial information and intelligence systems allow us to integrate all other forms of intelligence and act as a main platform to process and display geospatial-time referenced events. Combining explicit knowledge with person know-how to generate a continuous learning cycle that supports real time decisions, mitigates the influences of fog of war and provides the knowledge supremacy. This paper presents the analysis done after applying a questionnaire and interviews about the GI and intelligence management in a military organization. The study intended to identify the stakeholder's requirements for a military spatial data infrastructure as well as the requirements for a future software system development.
Verhoeven, A.A.H.; Boerma, E.J.; Meyboom-de Jong, B
Analysis of the use of information sources by family physicians is important for both practical and theoretical reasons. First, analysis of the ways in which family physicians handle information may point to opportunities for improvement. Second, such efforts may lead to improvements in the
Alan D. Bright; Andrew W. Don Carlos; Jerry J. Vaske; James D. Absher
Understanding how residents of the wildlandurban interface (WUI) react to information about firewise behavior can enhance efforts to communicate safety information to the public. This study explored the multiple roles of source credibility on the elaboration and impact of messages about conducting firewise behaviors in the WUI. A mail-back survey to residents of the...
... plant spacing, fertilizer application, post-harvest processing, and storage. Recommendations on herbicides and pesticides were however, not utilized to a great extent by the respondents. Key words: Extension information, improved maize, utilization, sources of information. Journal Of Agriculture And Social Research Vol.
This study examined how retirement planning information search was related to retirement savings of working women. By controlling for sociodemographic variables, the study further explored factors associated with individual information sources for retirement planning. An online survey was developed to collect data from a national population,…
Population in Nigeria is turning into an issue that needs public alertness. Informing men on family planning services and contraceptives is extremely necessary. For this will promote more favorable attitudes and increase their involvement. This study aimed at investigating the source of family planning information for married ...
... report and shall set forth what efforts it has made to obtain the information. ... 10 Energy 1 2010-01-01 2010-01-01 false Access to sources of information. 4.33 Section 4.33 Energy... FEDERAL FINANCIAL ASSISTANCE FROM THE COMMISSION Regulations Implementing Title VI of the Civil Rights Act...
Thiruvenkadam, G.; Brombacher, A.C.; Lu, Y.; Ouden, den P.H.
In this paper we report the findings of a study intended to assess the usability of consumer related information sources in order to improve the design processes of innovative electronic products. Specifically, an evaluation is done of the quality and content of information that would help product
What is the impact of introducing an automated management information system within a microfinance institution or savings and credit cooperative on the employees, the clients and the business processes? The project will involve deployment of an open source management information system (Mifos Vanilla) in two ...
Efraim, Hadar; Yacov, Nadav; Kanter, Ido; Shental, Ori
We consider the detection of correlated information sources in the ubiquitous code-division multiple-access (CDMA) scheme. We propose a message-passing based scheme for detecting correlated sources directly, with no need for source coding. The detection is done simultaneously over a block of transmitted binary symbols (word). Simulation results are provided, demonstrating a substantial improvement in bit error rate in comparison with the unmodified detector and the alternative of source compression. The robustness of the error-performance improvement is shown under practical model settings, including wrong estimation of the generating Markov transition matrix and finite-length spreading codes
Jensen, Jesper; Taal, C.H.
of Shannon information the critical-band amplitude envelopes of the noisy/processed signal convey about the corresponding clean signal envelopes. The resulting intelligibility predictor turns out to be a simple function of the correlation between noisy/processed and clean amplitude envelopes. The proposed...
Full Text Available The topics of this research cover all phases of “Information Design” applied to detect and profit from weak signals in economic intelligence (EI or business intelligence (BI. The field of the information design (ID applies to the process of translating complex, unorganized or unstructured data into valuable and meaningful information. ID practice requires an interdisciplinary approach, which combines skills in graphic design (writing, analysis processing and editing, human performances technology and human factors. Applied in the context of information system, it allows end-users to easily detect implicit topics known as “weak signals” (WS. In our approach to implement the ID, the processes cover the development of a knowledge management (KM process in the context of EI. A case study concerning information monitoring health resources is presented using ID processes to outline weak signals. Both French and American bibliographic databases were applied to make the connection to multilingual concepts in the health watch process.
Diana, Rachel A; Van den Boom, Wijnand; Yonelinas, Andrew P; Ranganath, Charan
Source memory tests typically require subjects to make decisions about the context in which an item was encoded and are thought to depend on recollection of details from the study episode. Although it is generally believed that familiarity does not contribute to source memory, recent behavioral studies have suggested that familiarity may also support source recognition when item and source information are integrated, or "unitized," during study (Diana, Yonelinas, and Ranganath, 2008). However, an alternative explanation of these behavioral findings is that unitization affects the manner in which recollection contributes to performance, rather than increasing familiarity-based source memory. To discriminate between these possibilities, we conducted an event-related potential (ERP) study testing the hypothesis that unitization increases the contribution of familiarity to source recognition. Participants studied associations between words and background colors using tasks that either encouraged or discouraged unitization. ERPs were recorded during a source memory test for background color. The results revealed two distinct neural correlates of source recognition: a frontally distributed positivity that was associated with familiarity-based source memory in the high-unitization condition only and a parietally distributed positivity that was associated with recollection-based source memory in both the high- and low-unitization conditions. The ERP and behavioral findings provide converging evidence for the idea that familiarity can contribute to source recognition, particularly when source information is encoded as an item detail. Copyright © 2010 Elsevier B.V. All rights reserved.
Yang, Tiantian; Asanjan, Ata Akbari; Welles, Edwin; Gao, Xiaogang; Sorooshian, Soroosh; Liu, Xiaomang
Reservoirs are fundamental human-built infrastructures that collect, store, and deliver fresh surface water in a timely manner for many purposes. Efficient reservoir operation requires policy makers and operators to understand how reservoir inflows are changing under different hydrological and climatic conditions to enable forecast-informed operations. Over the last decade, the uses of Artificial Intelligence and Data Mining [AI & DM] techniques in assisting reservoir streamflow subseasonal to seasonal forecasts have been increasing. In this study, Random Forest [RF), Artificial Neural Network (ANN), and Support Vector Regression (SVR) are employed and compared with respect to their capabilities for predicting 1 month-ahead reservoir inflows for two headwater reservoirs in USA and China. Both current and lagged hydrological information and 17 known climate phenomenon indices, i.e., PDO and ENSO, etc., are selected as predictors for simulating reservoir inflows. Results show (1) three methods are capable of providing monthly reservoir inflows with satisfactory statistics; (2) the results obtained by Random Forest have the best statistical performances compared with the other two methods; (3) another advantage of Random Forest algorithm is its capability of interpreting raw model inputs; (4) climate phenomenon indices are useful in assisting monthly or seasonal forecasts of reservoir inflow; and (5) different climate conditions are autocorrelated with up to several months, and the climatic information and their lags are cross correlated with local hydrological conditions in our case studies.
Full Text Available In today?s competitive, complex and rapidly changing business world, based on information, it is very essential to have timely and accurate insight of business conditions and activities to check whether they are healthy and according to business norms. Information obviously plays a critical role to have this insight and it can only be of avail, if it is directional, focused, timely and easily accessible and also if it gives both the macro/strategic and the micro/operational view of the company. Due to the advancement in information technology, state-of-the-art technologies like business intelligence (BI have been developed to provide us the above features. This paper provides reader an insight of BI and its strategic importance. It also explains how BI can be effective technology in industries like banking to overcome critical issue like fraud discovery and detection. The methodology, based on BI, in the form of model named BI model for fraud discovery and detection has been devised and suggested at the end of paper along with it its details for overcoming the above mentioned issue in more effective and efficient manner.
Full Text Available In spite of the voluminous studies in the field of intelligent retrieval systems, effective retrieving of information has been remained an important unsolved problem. Implementations of different conceptual knowledge in the information retrieval process such as ontology have been considered as a solution to enhance the quality of results. Furthermore, the conceptual formalism supported by typical ontology may not be sufficient to represent uncertainty information due to the lack of clear-cut boundaries between concepts of the domains. To tackle this type of problems, one possible solution is to insert fuzzy logic into ontology construction process. In this article, a novel approach for fuzzy ontology generation with two uncertainty degrees is proposed. Hence, by implementing linguistic variables, uncertainty level in domain's concepts (Software Maintenance Engineering (SME domain has been modeled, and ontology relations have been modeled by fuzzy theory consequently. Then, we combined these uncertain models and proposed a new ontology with two degrees of uncertainty both in concept expression and relation expression. The generated fuzzy ontology was implemented for expansion of initial user's queries in SME domain. Experimental results showed that the proposed model has better overall retrieval performance comparing to keyword-based or crisp ontology-based retrieval systems.
To ascertain parents' preferences in sources of health information concerning their children's general health care needs, and caring for their children when they are sick. Exploratory/descriptive design. A telephone survey secured data for the study and qualitative content analysis and descriptive statistics were used for analysis. Part 2 of a larger study in which Part I evaluated parents' satisfaction with a paediatric telephone triage service. One hundred of the 101 parents who were recruited for Part 1 of the study participated in Part 2, an examination of parents' preferences in information sources relating to their child's health. Parents' preferences in child health information sources varied according to the perceived severity of their child's illness. Parents frequently selected more than one item on a list of health information sources provided. In a non-urgent situation when children were sick a total of 170 selections were made by parents, with 'telephone advice line' the source most frequently selected (58, 34%), followed by general practitioner (27, 15.8%). In an emergency situation the most frequently selected information source was again 'telephone advice line' (74, n=129, 57.4%), followed by 'other' (31, n=129, 24.3%) often identified as relating to dialing '000' (Australia's emergency services number). Finally, when parents required information about the general health care needs of their child, 'other' (most frequently identified as books) was selected on 40 (n=185, 21.6%) occasions, followed by child health clinic (35, n= 185, 18.9%). Parents prefer to receive information about the health care needs of their child from another person rather than a printed or audio-visual source.
Bobić, Branko; Štajner, Tijana; Nikolić, Aleksandra; Klun, Ivana; Srbljanović, Jelena; Djurković-Djaković, Olgica
Health education of women of childbearing age has been shown to be an acceptable approach to the prevention of toxoplasmosis, the most frequent congenitally transmitted parasitic infection. The aim of this study was to evaluate the Internet as a source of health education on toxoplasmosis in pregnancy. A group of 100 pregnant women examined in the National Reference Laboratory for Toxoplasmosis was surveyed by a questionnaire on the source of their information on toxoplasmosis. We also analyzed information offered by websites in the Serbian and Croatian languages through the Google search engine, using "toxoplasmosis" as a keyword. The 23 top websites were evaluated for comprehensiveness and accuracy of information on the impact of toxoplasmosis on the course of pregnancy, diagnosis and prevention. Having knowledge on toxoplasmosis was confirmed by 64 (64.0%) examined women, 40.6% (26/64) of whom learned about toxoplasmosis through the Internet, 48.4% from physicians, and 10.9% from friends. Increase in the degree of education was found to be associated with the probability that pregnant women would be informed via the Internet (RR=3.15, 95% CI=1.27-7.82, p=0.013). Analysis of four interactive websites (allowing users to ask questions) showed that routes of infection were the most common concern, particularly the risk presented by pet cats and dogs, followed by the diagnosis of infection (who and when should be tested, and how should the results be interpreted). Of 20 sites containing educational articles, only seven were authorized and two listed sources. Evaluation confirmed that information relevant to pregnant women was significantly more accurate than comprehensive, but no site gave both comprehensive and completely accurate information. Only four sites (20%) were good sources of information for pregnant women. Internet has proved itself as an important source of information. However, despite numerous websites, only a few offer reliable information to the
Ekanem, Enefiok P.; Muhammad, Safdar; Tegegne, Fisseha; Singh, Surendra P.
Although much has been written on consumer attitudes toward genetically modified foods, not much is known about how or where consumers get the information for the decisions they make about genetically modified foods. This paper reports on the media used by consumers in acquiring information about biotech food and nutrition issues, and examines how much trust consumers put in selected information sources. The paper also discusses how socio-economic variables affect level of trust in selected s...
Joshua L Kalla
Full Text Available The Internet has dramatically expanded citizens' access to and ability to engage with political information. On many websites, any user can contribute and edit "crowd-sourced" information about important political figures. One of the most prominent examples of crowd-sourced information on the Internet is Wikipedia, a free and open encyclopedia created and edited entirely by users, and one of the world's most accessed websites. While previous studies of crowd-sourced information platforms have found them to be accurate, few have considered biases in what kinds of information are included. We report the results of four randomized field experiments that sought to explore what biases exist in the political articles of this collaborative website. By randomly assigning factually true but either positive or negative and cited or uncited information to the Wikipedia pages of U.S. senators, we uncover substantial evidence of an editorial bias toward positivity on Wikipedia: Negative facts are 36% more likely to be removed by Wikipedia editors than positive facts within 12 hours and 29% more likely within 3 days. Although citations substantially increase an edit's survival time, the editorial bias toward positivity is not eliminated by inclusion of a citation. We replicate this study on the Wikipedia pages of deceased as well as recently retired but living senators and find no evidence of an editorial bias in either. Our results demonstrate that crowd-sourced information is subject to an editorial bias that favors the politically active.
Kalla, Joshua L; Aronow, Peter M
The Internet has dramatically expanded citizens' access to and ability to engage with political information. On many websites, any user can contribute and edit "crowd-sourced" information about important political figures. One of the most prominent examples of crowd-sourced information on the Internet is Wikipedia, a free and open encyclopedia created and edited entirely by users, and one of the world's most accessed websites. While previous studies of crowd-sourced information platforms have found them to be accurate, few have considered biases in what kinds of information are included. We report the results of four randomized field experiments that sought to explore what biases exist in the political articles of this collaborative website. By randomly assigning factually true but either positive or negative and cited or uncited information to the Wikipedia pages of U.S. senators, we uncover substantial evidence of an editorial bias toward positivity on Wikipedia: Negative facts are 36% more likely to be removed by Wikipedia editors than positive facts within 12 hours and 29% more likely within 3 days. Although citations substantially increase an edit's survival time, the editorial bias toward positivity is not eliminated by inclusion of a citation. We replicate this study on the Wikipedia pages of deceased as well as recently retired but living senators and find no evidence of an editorial bias in either. Our results demonstrate that crowd-sourced information is subject to an editorial bias that favors the politically active.
Appel, Edward J
Section I Behavior and TechnologyThe Internet's Potential for Investigators and Intelligence OfficersIntroductionGrowth of Internet UseA Practitioner's PerspectiveThe SearchInternet Posts and the People They ProfileFinding the NeedlesThe Need for SpeedSufficiency of SearchesNotesBehavior OnlineInternet Use GrowthEvolution of Internet UsesPhysical World, Virtual ActivitiesConnections and DisconnectingNotesUse and Abuse: Crime and Mis
The main goal of master thesis is to analyze and propose possible low cost Business Intelligence solution with open source technologies and comparison of available tools for implementation in middle size company. We compare Pentaho and Jaspersoft tools implemented on local hardware and cloud environment with Microsoft Azure services. The theoretical part focuses mainly on understanding the business intelligence and its architecture, because architecture is an important part of the work. Actua...
Suspicious Activity Reporting Initiative ODNI Office of the Director of National Intelligence OSINT Open Source Intelligence PERF Police Executive...Fusion centers are encouraged to explore all available information sources to enhance the intelligence analysis process. It follows then that fusion...WSIC also utilizes ACCURINT, a web-based, subscription service. ACCURINT searches open source information and is able to collect and collate
Luo, Jianjun; Cong, Zhen; Liang, Daan
Taking proper protective action upon receiving tornado warnings is critical to reducing casualties. With more warning information sources becoming available, how the number of such information sources affects decision making should be quantitatively investigated. To examine how the number of warning information sources affected individuals' decisions to take protective action during tornadoes. A telephone survey using random sampling was conducted in 2012 with residents in Tuscaloosa AL and Joplin MO, resulting in a working sample of 782 respondents. Both cities were struck by violent tornadoes (Enhanced Fujita Scale [EF]4 and EF5) in 2011. The analysis was conducted in 2013. Logistic regression analysis showed that relative to having only one warning information source, having two and three or more warning information sources significantly increased the odds of taking protective action in Joplin but not in Tuscaloosa; having three or more sources had a significantly stronger effect on taking protective action in Joplin than in Tuscaloosa. Having an emergency preparation plan in both cities and being white in Tuscaloosa significantly increased the odds of taking protective action, whereas being divorced in Joplin reduced these odds. Receiving warnings from more warning information sources might be more beneficial in places with less previous exposure to tornadoes and for populations with lower awareness of a potential tornado and higher probability of receiving no warnings. Emergency management agencies and public health officials should give priority to these places and populations when formulating disaster mitigation decisions and policies. Copyright © 2015 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.
Kammerer, Yvonne; Kalbfell, Eva; Gerjets, Peter
In two experiments we systematically examined whether contradictions between two web pages--of which one was commercially biased as stated in an "about us" section--stimulated university students' consideration of source information both during and after reading. In Experiment 1 "about us" information of the web pages was…
Full Text Available At present, information technologies (IT are intensively used all over the world in various sectors, and today medical institutions cannot do without them when organizing the process of medical diagnostic. The IT efficiency is determined by the degree of their intellectualization that is by including knowledge bases as their component and by the transition from data processing to the processing of knowledge. The efficiency of making decisions in various areas of activity is determined by the quality and quick delivery of information. Medicine constitutes no exception in this sense. The advanced level of computer technology, applied tools, diagnostics on the basis of automated systems of decision support made it possible to solve the tasks of assessing the state of the object at a qualitatively new level. The subject matter of this study is to ensure the mathematical support of the intelligent information system (IS of assessing the state of the object. The object is understood as a patient who came through a myocardial infarction (MI. The goal of the study is to develop mathematical support of the intelligent IS of assessing and predicting a patient’s condition. To achieve the stated goal, the following tasks were solved: statistically valid and uncorrelated signs were specified; these signs enable distinguishing the group of patients who survived from those who died, “decisive rules” were formulated for predicting the MI clinical outcome. In the process of the study, the mathematical IT of assessing the state of the object was developed. The following result was obtained: the suggested mathematical models for predicting the outcome of myocardial infarction that were developed with the use of the method of discriminant function and took into account human blood values can prevent sudden coronary death and improve the diagnostic efficiency. Conclusions. Mathematical models were developed to predict the state of the object in the event of
Full Text Available The paper reports findings from a study of CI activities involving Internet start-up companies in the telecommunications industry. The CI gathering was conducted by graduate students in library and information science in the context of a class project for a real business client, itself a small Internet start-up company. The primary objective of the study was to provide empirical insights into the applicability of specific types of secondary information resources to finding competitive intelligence information on small Internet start-up companies. An additional objective was to identify the characteristics of research strategies applied in the collection of CI on Internet start-ups from the perspective of current conceptual frameworks of information-seeking behaviour presented in the library and information science literature. This study revealed some interesting findings regarding the types of secondary information resources that can be used to find competitive intelligence on small, Internet start-up companies. The study also provided insight into the characteristics of the overall information-seeking strategies that are applied in this type of competitive intelligence research.
Adrian Liviu IVAN
Full Text Available An important part of the reform of the intelligence community is felt in the opening linked with the widening spectrum of methods and spaces which can be used to collect and analyse dates and information. One of these methods that produce large mutations in the system is connected to the world of social media which proves to be a huge source of information. Social Media Intelligence (SOCMINT, the newest member of the family INT's, is undoubtedly a separate domain, a practice rooted in the work of the intelligence community. This paper proposes a general characterization of the most important aspects of Social Media Intelligence, a brand new way for the intelligence community to collect and analyse information for national security purposes (but not only in the context of the current global challenges. Moreover, the work is focused in identifying the further limitations and opportunities of this practice in the upcoming decade.
Students' academic success may be influenced not only by their actual ability, but also by their beliefs about their intelligence. Studies have found that students enter a classroom with one of two distinct conceptions of their intellectual ability: some students believe their intelligence is expandable (growth mindset), while others believe their…
Rosman, Tom; Mayer, Anne-Kathrin; Krampen, Günter
Introduction: The present paper argues that adequate self-perceptions of academic ability are essential for students' realization of their intellectual potential, thereby fostering learning of complex skills, e.g., information-seeking skills. Thus, academic self-concept should moderate the relationship between intelligence and information…
Juhlin, Jonas A.; Richardson, John
Social media has become a dominating feature in modern life. Platforms like Facebook, Twitter, and Google have users all over the world. People from all walks of life use social media. For the intelligence services, social media is an element that cannot be ignored. It holds immense amount of information, and the potential to extract useful intelligence cannot be ignored. Social media has been around for sufficient time that most intelligence services recognize the fact that social media needs some form of attention. However, for the intelligence collector and analyst several aspects must be uncovered in order to fully exploit social media for intelligence purposes. This paper will present Project Avatar, an experiment in obtaining effective intelligence from social media sources, and several emerging analytic techniques to expand the intelligence gathered from these sources.
Juhlin, Jonas Alastair
be uncovered in order to fully exploit social media for intelligence purposes. This paper will present Project Avatar, an experiment in obtaining effective intelligence from social media sources, and several emerging analytic techniques to expand the intelligence gathered from these sources.......Social media has become a dominating feature in modern life. Platforms like Facebook, Twitter, and Google have users all over the world. People from all walks of life use social media. For the intelligence services, social media is an element that cannot be ignored. It holds immense amount...... of information, and the potential to extract useful intelligence cannot be ignored. Social media has been around for sufficient time that most intelligence services recognize the fact that social media needs some form of attention. However, for the intelligence collector and analyst several aspects must...
Full Text Available The complexity of information is issued from interacting information sources (IS, and could be better exploited with respect to relevance of information. In distributed IS system, relevant information has a content that is in connection with other contents in information network, and is used for a certain purpose. The highlighting point of the proposed model is to contribute to information system agility according to a three-dimensional view involving the content, the use and the structure. This reflects the relevance of information complexity and effective methodologies through self organized principle to manage the complexity. This contribution is primarily focused on presenting some factors that lead and trigger for self organization in a Service Oriented Architecture (SOA and how it can be possible to integrate self organization mechanism in the same.
Potančok, Martin; Voříšek, Jiří
Healthcare facilities use a number of information system/information and communication technologies. Each healthcare facility faces a need to choose sourcing strategies most suitable to ensure provision of information system/information and communication technology services, processes and resources. Currently, it is possible to observe an expansion of sourcing possibilities in healthcare informatics, which creates new requirements for sourcing strategies. Thus, the aim of this article is to identify factors influencing information system/information and communication technology sourcing strategies in healthcare facilities. The identification was based on qualitative research, namely, a case study. This study provides a set of internal and external factors with their impact levels. The findings also show that not enough attention is paid to these factors during decision-making. © The Author(s) 2015.
This presentation deals with external electronic information sources (e-sources) i. e. about data bases which are formed no by users or their institutes. Data bases are compiled by producers of data which are publishing in different forms and offerer it for users by different form. In the first part of contribution e-sources are described at the first generally. In the second part, some most significant data bases about environment in on-line medium of Internet, are described in detail
Lu Yan; Xin Pingping; Wu Jian
Quality control of intelligence research is the core issue of intelligence management, is a problem in study of information science This paper focuses on the performance of intelligence to explain the significance of intelligence research quality control. In summing up the results of the study on the basis of the analysis, discusses quality control methods in intelligence research, introduces the experience of foreign intelligence research quality control, proposes some recommendations to improve quality control in intelligence research. (authors)
Vance, Karl; Howe, William; Dellavalle, Robert P
Social media websites, such as YouTube, Facebook, MySpace, Twitter, and Second Life are rapidly emerging as popular sources of health information especially for teens and young adults. Social media marketing carries the advantages of low cost, rapid transmission through a wide community, and user interaction. Disadvantages include blind authorship, lack of source citation, and presentation of opinion as fact. Dermatologists and other health care providers should recognize the importance of social media websites and their potential usefulness for disseminating health information.
Marshall, Andrea P; West, Sandra H; Aitken, Leanne M
Variability in clinical practice may result from the use of diverse information sources to guide clinical decisions. In routine clinical practice, nurses privilege information from colleagues over more formal information sources. It is not clear whether similar information-seeking behaviour is exhibited when critical care nurses make decisions about a specific clinical practice, where extensive practice variability exists alongside a developing research base. This study explored the preferred sources of information intensive care nurses used and their perceptions of the accessibility and usefulness of this information for making decisions in clinically uncertain situations specific to enteral feeding practice. An instrumental case study design, incorporating concurrent verbal protocols, Q methodology and focus groups, was used to determine intensive care nurses' perspectives of information use in the resolution of clinical uncertainty. A preference for information from colleagues to support clinical decisions was observed. People as information sources were considered most useful and most accessible in the clinical setting. Text and electronic information sources were seen as less accessible, mainly because of the time required to access the information within the documents. When faced with clinical uncertainty, obtaining information from colleagues allows information to be quickly accessed and applied within the context of a specific clinical presentation. Seeking information from others also provides opportunities for shared decision-making and potential validation of clinical judgment, although differing views may exacerbate clinical uncertainty. The social exchange of clinical information may meet the needs of nurses working in a complex, time-pressured environment but the extent of the evidence base for information passed through verbal communication is unclear. The perceived usefulness and accessibility of information is premised on the ease of use and access
Bass, Ellen J; DeVoge, Justin Michael; Waggoner-Fountain, Linda A; Borowitz, Stephen M
To characterize question types that residents received on overnight shifts and what information sources were used to answer them. Across 30 overnight shifts, questions asked of on-call senior residents, question askers' roles, and residents' responses were documented. External sources were noted. 158 of 397 questions (39.8%) related to the plan of care, 53 (13.4%) to medical knowledge, 48 (12.1%) to taskwork knowledge, and 44 (11.1%) to the current condition of patients. For 351 (88.4%) questions residents provided specific, direct answers or visited the patient. For 16 of these, residents modeled or completed the task. For 216 questions, residents used previous knowledge or their own clinical judgment. Residents solicited external information sources for 118 questions and only a single source for 77 (65.3%) of them. For the 118, most questions concerned either the plan of care or the patient's current condition and were asked by interns and nurses (those with direct patient care responsibilities). Resident physicians serve as an information system and they often specifically answer the question using previous knowledge or their own clinical judgment, suggesting that askers are contacting an appropriately knowledgeable person. However, they do need to access patient information such as the plan of care. They also serve an educator role and answer many knowledge-related questions. As synchronous verbal communications continue to be important pathways for information flow, informaticians need to consider the relationship between such communications and workflow in the development of healthcare support tools.
Recognition of the improvements in patient safety, quality of patient care, and efficiency that health care information systems have the potential to bring has led to significant investment. Globally the sale of health care information systems now represents a multibillion dollar industry. As policy makers, health care professionals, and patients, we have a responsibility to maximize the return on this investment. To this end we analyze alternative licensing and software development models, as well as the role of standards. We describe how licensing affects development. We argue for the superiority of open source licensing to promote safer, more effective health care information systems. We claim that open source licensing in health care information systems is essential to rational procurement strategy. PMID:21447469
Kolodny, Michael A.
Today's battlefield space is extremely complex, dealing with an enemy that is neither well-defined nor well-understood. Adversaries are comprised of widely-distributed, loosely-networked groups engaging in nefarious activities. Situational understanding is needed by decision makers; understanding of adversarial capabilities and intent is essential. Information needed at any time is dependent on the mission/task at hand. Information sources potentially providing mission-relevant information are disparate and numerous; they include sensors, social networks, fusion engines, internet, etc. Management of these multi-dimensional informational sources is critical. This paper will present a new approach being undertaken to answer the challenge of enhancing battlefield understanding by optimizing the utilization of available informational sources (means) to required missions/tasks as well as determining the "goodness'" of the information acquired in meeting the capabilities needed. Requirements are usually expressed in terms of a presumed technology solution (e.g., imagery). A metaphor of the "magic rabbits" was conceived to remove presumed technology solutions from requirements by claiming the "required" technology is obsolete. Instead, intelligent "magic rabbits" are used to provide needed information. The question then becomes: "WHAT INFORMATION DO YOU NEED THE RABBITS TO PROVIDE YOU?" This paper will describe a new approach called Mission-Informed Needed Information - Discoverable, Available Sensing Sources (MINI-DASS) that designs a process that builds information acquisition missions and determines what the "magic rabbits" need to provide in a manner that is machine understandable. Also described is the Missions and Means Framework (MMF) model used, the process flow utilized, the approach to developing an ontology of information source means and the approach for determining the value of the information acquired.
Full Text Available One of the important factors that contribute to agricultural development is information. As such agricultural extension workers that link agricultural agencies to the farmers must have adequate and up-to-date information about agricultural practices before they could inform, educate and train the farmers in method and techniques of farming. This study aims to determine the types of information needed by agricultural extension workers; to determine the sources of information used by the agricultural extension workers; and to determine the comparison between types of information with information sources used by agricultural extension workers. The present study was a descriptive study using a survey design and conducted at Daerah Istimewa Yogyakarta (DIY Province. The populations of the study consists 181 agricultural extension workers divisible in the district level, namely Sleman, Kulon Progo, Gunung Kidul dan Bantul. Sampling procedure in this study used cluster sampling. The method for gathering data from the respondents is based on a structured questionnaire. Descriptive statistics was to describe the characteristics of the respondents and the dependent variables of the study. As a result, most of agricultural extension workers strongly needed the innovation information in seeking information followed by extension service information and extension role information. The result of information sources used by agricultural extension worker for extension service information, innovation information and extension role information indicates that agricultural extension workers used interpersonal source. Most of them never sought information use Internet, they use radio more frequently than television and video, agricultural extension worker also used mass media as information source.
Barbara Coelho Neves
Full Text Available This paper presents the experience report about the implementation of the Center for Information Management and Intelligence administered by the Library of the Public Defender of the State of Bahia. The Center aims to corroborate the information stock, based on capturing the tacit knowledge of public Defenders of DPE. Aspires to social inclusion and the preservation of memory used in human rights activities defensoriais developed. The biggest benefit of creating the Center for Information Management and Intelligence is to provide the availability of information gained by the defenders in a structured way, to all persons interested in the topics defensoriais seized through legal experiences, conferences, training courses, seminars, workshops , Among others. The Center for Information Management and Intelligence of the DPE Library is an important way to efficiently connect "those who know" with those who "need to know" and converting personal knowledge into the organization's memory. For this, the proposal develops the collection, storage, management and dissemination of knowledge with a methodology based on models of the authors Nonaka and Takeuchi, with the help of teenagers "apprentices" in fulfillment of socio-educational measure the Mother City Foundation.
Dong-Fan, Xie; Zi-You, Gao; Xiao-Mei, Zhao
The effect of cars with intelligent transportation systems (ITSs) on traffic flow near an on-ramp is investigated by car-following simulations. By numerical simulations, the dependences of flux on the inflow rate are investigated for various proportions of cars with ITSs. The phase diagrams as well as the spatiotemporal diagrams are presented to show different traffic flow states on the main road and the on-ramp. The results show that the saturated flux on the main road increases and the free flow region is enlarged with the increase of the proportion of cars with ITS. Interestingly, the congested regions of the main road disappear completely when the proportion is larger than a critical value. Further investigation shows that the capacity of the on-ramp system can be promoted by 13% by using the ITS information, and the saturated flux on the on-ramp can be kept at an appropriate value by adjusting the proportion of cars with ITS. (general)
Full Text Available Two years ago, 63 people died and more than 150 were seriously injured in Beijing (China because of damage to a hydrocarbon pipeline. Urban networks are invisible because usually buried between 1 and 1,5 meters underground. They should be identified to prevent such accidents which involve workers as well as the public. Rural and urban districts, network concessionaries and contractors: everyone could benefit from their networks becoming safer. To prevent such accidents and protect workers and the public as well, some new regulations propose to identify and secure the buried networks. That’s why it is important to develop a software which deals with the risk management process and also about the risk visualization. This work is structured around three major sections:– the utility of the Geographical Information to determine the minimal distances and the topological relations between the networks themselves, and also with the other element in their vicinity;– the use of some Artificial Intelligence tools, and more particularly of Expert System, to take the current regulation into account and determine the accident risk probability;– the contribution of virtual reality to perceive the underground world.
This paper surveys important aspects of Web Intelligence (WI) in the context of Artificial Intelligence in Education (AIED) research. WI explores the fundamental roles as well as practical impacts of Artificial Intelligence (AI) and advanced Information Technology (IT) on the next generation of Web-related products, systems, services, and…
Mejia, Christian R; Caceres, Onice J; Vera, Claudia A; Nizama-Vía, Ayar; Curioso, Walter H; Mayta-Tristán, Percy
In order to determine the use of information sources by recently graduated physicians of Lima, Peru in 2011, a survey was conducted among graduated physicians at seven universities. They were asked about the use of search engines in the health area during their year of medical internship [last year of medical school]. Regular use was defined as the source being used once a week or daily. For 490 respondents, regularly used information sources were SciELO, accessed by 173 (36.4%); PubMed 165 (34.4%); HINARI 117 (25.5%); UpToDate 98 (22.3%); Cochrane Library 94 (20.6%); LILACS 91 (19.8%); a hospital institutional library 70 (15.0%); LIPECS 39 (8.7%); and Peru BVS 42 (9.3%). Only a minority regularly accessed information sources related to health. It is necessary to improve capacity in the efficient use of various resources of scientific information in a continuous way and that reaches students and health professionals.
Senior managers shoulder the responsibility of formulating policies that organization needs for the smooth running of their individuals establishments. The quality of decision made is also dependent on how current the sources of information utilized to make it. Much of policies formulated for national development have little ...
This paper exposes security vulnerabilities of the web based Open Source Information Systems (OSIS) from both system angle and human perspectives.It shows the extent of risk that can likely hinder adopting organization from attaning full intended benefits of using OSIS software. To undertake this study, a case study ...
Horak, K.; Bleakly, D.; McDaniel, M.
Great advances have been made in the application of open-source information for Safeguards. However, the open-source 'ecosystem' is rapidly evolving. Recently, the combination of powerful smart-phones and the World Wide Web have led to novel developments for mapping the impact of natural and man-made disasters. Researchers are learning to harness online volunteers as citizen scientists. Online social media such as Facebook, LinkedIn, and Twitter are becoming accepted channels of credible information. Geo-spatially-aware applications (augmented reality applications) are capable of overlaying data upon a smart-phone's view screen. The authors review available open-source tools and technologies. These and other developments will have a significant effect on the collection, evaluation, structuring, analysis, and dissemination of safeguards-relevant information. In addition, the modern, open Internet is posing new security threats.not just viruses and their ilk, but threats based on digital traces left by browsing the open Web. The authors present a case study of the disastrous toxic flood near Devecser, Hungary in October 2010 for which we get 621,000 results for everything related to search terms, 68,000 blog posts on the topic, 43,300 images available and then give recommendations for the future use of open-source information and software tools. (authors)
This is a detailed comparative analysis of electronic information sources (EIS) utilized by pharmacy lecturers in South-South universities in Nigeria. The purpose of this study is to analyze the extent to which EIS are utilized among pharmacy lecturers in South-South Nigeria. The aim is to explore the emerging pattern of ...
Aro, Arja R.; Oenema, Anke; de Zwart, Onno; Richardus, Jan Hendrik; Bishop, George D.
Severe acute respiratory syndrome (SARS)–related risk perceptions, knowledge, precautionary actions, and information sources were studied in the Netherlands during the 2003 SARS outbreak. Although respondents were highly aware of the SARS outbreak, the outbreak did not result in unnecessary precautionary actions or fears. PMID:15496256
Background: While burns take seconds to occur, injuries incurred result in pain and undesirable long term effects that might take a lifetime to overcome. The study was carried out to determine the measures of first aid delivered by caregivers after a burn injury and sources of the information. Methods: A cross- sectional study ...
Wackowski, Olivia A; Bover Manderski, Michelle T; Delnevo, Cristine D
Few studies have explored sources of e-cigarette awareness and peoples' e-cigarette information needs, interests or behaviors. This study contributes to both domains of e-cigarette research. Results are based on a 2014 e-cigarette focused survey of 519 current smokers from a nationally representative research panel. Smokers most frequently reported seeing e-cigarettes in stores (86.4%) and used in person (83%). Many (73%) had also heard about e-cigarettes from known users, broadcast media ads (68%), other (print, online) advertisements (71.5%), and/or from the news (60.9%); sources of awareness varied by e-cigarette experience. Most smokers (59.9%) believed e-cigarettes are less harmful than regular cigarettes, a belief attributed to "common sense" (76.4%), the news (39.2%) and advertisements (37.2%). However, 79.5% felt e-cigarette safety information was important. Over one-third said they would turn to a doctor first for e-cigarette safety information, though almost a quarter said they would turn to the Internet or product packaging first. Most (59.6%) ranked doctors as the most trustworthy risk source, and 6.8% had asked a health professional about e-cigarettes. Future research should explore the content of e-cigarette information sources, their potential impact, and ways they might be strengthened or changed through regulatory and/or educational efforts.
HIV/AIDS Care and Treatment in Specialized Teaching Hospitals of. Ethiopia, 2016. Senait Samuel Bramo. 1. , Tesfamichael Alaro Agago. 2*. OPEN ACCESS. Citation: Senait Samuel Bramo,. Tesfamichael Alaro Agago. Utilization. Status of Electronic Information Sources. (EIS) for HIV/AIDS Care and Treatment.
Horak, K.; Bleakly, D.; McDaniel, M. [Sandia National Laboratories, Albuquerque, NM (United States)
Great advances have been made in the application of open-source information for Safeguards. However, the open-source 'ecosystem' is rapidly evolving. Recently, the combination of powerful smart-phones and the World Wide Web have led to novel developments for mapping the impact of natural and man-made disasters. Researchers are learning to harness online volunteers as citizen scientists. Online social media such as Facebook, LinkedIn, and Twitter are becoming accepted channels of credible information. Geo-spatially-aware applications (augmented reality applications) are capable of overlaying data upon a smart-phone's view screen. The authors review available open-source tools and technologies. These and other developments will have a significant effect on the collection, evaluation, structuring, analysis, and dissemination of safeguards-relevant information. In addition, the modern, open Internet is posing new security threats.not just viruses and their ilk, but threats based on digital traces left by browsing the open Web. The authors present a case study of the disastrous toxic flood near Devecser, Hungary in October 2010 for which we get 621,000 results for everything related to search terms, 68,000 blog posts on the topic, 43,300 images available and then give recommendations for the future use of open-source information and software tools. (authors)
This is a questionnaire base study targeting 350 married men in Ekpoma. Participation was by choice and the ... KEYWORDS: Family planning, Information source, Married men, Contraceptive, Nigeria. INTRODUCTION. Organized family ... 1988 population policy played a key role in raising demand and supply for family ...
Racz, William J.; Ecobichon, Donald J.; Baril, Marc
This paper will provide an overview of the on-line resources available in toxicology in Canada. It will describe a brief history of The Society of Toxicology of Canada, with reference to other societies and also provide information on education, research and other resources related to toxicology. Toxicology in Canada emerged as a distinct and vibrant discipline following the thalidomide tragedy of the 1960s. In the pharmaceutical industry and government, toxicology was readily established as an essential component of drug development and safety, and as the need for toxicologists expanded, training programs were established, usually in collaboration with departments of pharmacology. In the last two to three decades other disciplines, environmental biology, analytical chemistry and epidemiology joined the ranks of toxicology. The on-line sources of toxicology information are rapidly expanding. This article describes those sources considered by the authors to be important from a national and international perspective. The majority of these sources are professional organizations and government agencies
Over the last sixty years, classical information theory has revolutionized the understanding of the nature of information, and how it can be quantified and manipulated. Quantum information processing extends these lessons to quantum systems, where the properties of intrinsic uncertainty and entanglement fundamentally defy classical explanation. This growing field has many potential applications, including computing, cryptography, communication, and metrology. As inherently mobile quantum particles, photons are likely to play an important role in any mature large-scale quantum information processing system. However, the available methods for producing and detecting complex multi-photon states place practical limits on the feasibility of sophisticated optical quantum information processing experiments. In a typical quantum information protocol, a source first produces an interesting or useful quantum state (or set of states), perhaps involving superposition or entanglement. Then, some manipulations are performed on this state, perhaps involving quantum logic gates which further manipulate or entangle the intial state. Finally, the state must be detected, obtaining some desired measurement result, e.g., for secure communication or computationally efficient factoring. The work presented here concerns the first and last stages of this process as they relate to photons: sources and detectors. Our work on sources is based on the need for optimized non-classical states of light delivered at high rates, particularly of single photons in a pure quantum state. We seek to better understand the properties of spontaneous parameteric downconversion (SPDC) sources of photon pairs, and in doing so, produce such an optimized source. We report an SPDC source which produces pure heralded single photons with little or no spectral filtering, allowing a significant rate enhancement. Our work on detectors is based on the need to reliably measure single-photon states. We have focused on
Wisch, A.; Kunzier, J.; Limaye, D.; Orlando, J.
Through use of a comprehensive interviewing schedule designed to elicit information needs from state policymakers, this study has shown a statewide need for a workable energy information network. As a counterpoint to this needs survey, it was also demonstrated that many of the components of such an information base already are available at the state and Federal levels. In order to assure that Pennsylvania's decision makers have access to this required information in a current and useful format at a minimal cost, this study has suggested a three-pronged action program: (1) In order to construct a workable energy information network for use by the Commonwealth, a liaison should be established with the Governor's Energy Council and the various national and regional energy information sources as cited in this report. (2) An information directory on State, Federal and private sources should be maintained and distributed on a continuing basis. An assessment of each source should be included with information on ease of access and relevance of the source to Pennsylvania. (3) After an information need is unable to be met through use of (1) the state energy information network and/or (2) the state energy information directory, effort should be initiated to satisfy that specific requirement.
Soderberg, Eric; Glenney, William
.... At a time when the threat environment has shifted in emphasis to COIN, terrorism, and cyber war, IT-enhanced data mining capabilities could provide some of the critical intelligence demanded by these types of threats...
Jespersen, Kristina Risom
different Scandinavian companies. Data was analyzed using hierarchical regression models across decision criteria dimensions and NPD stages as well as analyzing the combination of selected information sources. Rather than forwarding one optimal search behavior for the entire NPD process, we find optimal...... information search behavior at either end of the exploitation/exploration continuum. Additionally, we find that overexploitation and overexploration is caused by managerial bias. This creates managerial misbehavior at gate decision-points of the NPD process.......The purpose of this study is to examine how the exploration/exploitation continuum is applied by decision-makers in new product gate decision-making. Specifically, we analyze at gate decision-points how the evaluation of a new product project is affected by the information source exploitation...
Nguyen, Anh B; Robinson, Joelle; O'Brien, Erin Keely; Zhao, Xiaoquan
This article describes sources of health information, types of tobacco information sought, and trust in sources of tobacco information among U.S. racial/ethnic groups (Whites, Blacks, Hispanics, Asian and Pacific Islanders, and Other). Cross-sectional data (N = 3,788) from a nationally representative survey, HINTS-FDA 2015, were analyzed to examine unadjusted and adjusted associations between race/ethnicity and (a) first source of health information, (b) tobacco information seeking, and (c) trust in sources of tobacco information. Adjusted associations controlled for current tobacco product use and sociodemographic variables. Findings indicated that the Internet was the most common first source of health information while health care providers were the second most common source for all racial/ethnic groups. Tobacco-related health information seeking was more prevalent than other tobacco product information seeking. Unadjusted analyses indicated that a higher proportion of Whites sought other tobacco product information compared to Asians and Pacific Islanders. Trust was rated highest for doctors while trust for health organizations was rated second highest. Asians and Pacific Islanders had higher trust in the government compared to all other groups. Blacks had higher trust in religious organizations compared to all other groups besides Hispanics. Blacks had higher trust for tobacco companies compared to Whites and Other. Many of these differences were attenuated in adjusted analyses. This research has implications for tobacco control practice and policymaking by identifying potential dissemination strategies.
As an application of the IntelligentPad system, the NRDF database system is redesigned and developed. In the system, every component of the user interface is represented by reactive media objects called Pad. The exploitation of the IntelligentPad architecture in developing the system enhances the usability and reusability of the tools developed. Several pads specially designed for the NRDF database system are shown together with the examples of how to use them. (author)
Information is a peculiar quantity. Unlike matter or energy, the aggregation of knowledge from many individuals can in fact produce more (or less) information than the sum of its parts. We use the formalism of information theory to derive general principles of information aggregation and collective organization under which information pooling can be synergetic or to identify when it will be redundant. We then show how several problems of collective cognition and coordination can be understood in terms of the conditions that allow for the minimization of uncertainty (maximization of predictability) under information pooling over many individuals. We discuss in some detail how collective coordination in swarms, markets, language processing and collaborative filtering may be guided by the optimal aggregation of information over many sources and identify circumstances when these processes fail, leading e.g. to inefficient markets. The contrast to approaches to understand coordination and collaboration via traditional decision and game theory is discussed as well as the incentives to individuals and groups to find optimal information aggregation mechanisms.
Stolowy, Hervé; Baker, Richard; Jeanjean, Thomas; Messner, Martin
In this paper, we use the investment fraud of Bernard Madoff to inquire into the possibilities and limits of an “intelligent accountability” in the context of financial decision making. Drawing primarily upon data related to U.S. Individual investors (interviews and letters), we investigate the role of information and trust in investment decisions. We find that trust played an important role in the Madoff case. We also find that, in face-to-face encounters with the investors, Madoff successfu...
Mbondji, Peter Ebongue; Kebede, Derege; Soumbey-Alley, Edoh William; Zielinski, Chris; Kouvividila, Wenceslas; Lusamba-Dikassa, Paul-Samson
To identify key data sources of health information and describe their availability in countries of the World Health Organization (WHO) African Region. An analytical review on the availability and quality of health information data sources in countries; from experience, observations, literature and contributions from countries. Forty-six Member States of the WHO African Region. No participants. The state of data sources, including censuses, surveys, vital registration and health care facility-based sources. In almost all countries of the Region, there is a heavy reliance on household surveys for most indicators, with more than 121 household surveys having been conducted in the Region since 2000. Few countries have civil registration systems that permit adequate and regular tracking of mortality and causes of death. Demographic surveillance sites function in several countries, but the data generated are not integrated into the national health information system because of concerns about representativeness. Health management information systems generate considerable data, but the information is rarely used because of concerns about bias, quality and timeliness. To date, 43 countries in the Region have initiated Integrated Disease Surveillance and Response. A multitude of data sources are used to track progress towards health-related goals in the Region, with heavy reliance on household surveys for most indicators. Countries need to develop comprehensive national plans for health information that address the full range of data needs and data sources and that include provision for building national capacities for data generation, analysis, dissemination and use. © The Royal Society of Medicine.
Sun, Zhi-Yuan; Li, Yue; Qu, Wen-Cong; Chen, Yan-Yan
In order to improve the efficiency of traffic control system in the era of big data, a new variable cycle control model based on multi-source information is presented for intersection in this paper. Firstly, with consideration of multi-source information, a unified framework based on cyber-physical system is proposed. Secondly, taking into account the variable length of cell, hysteresis phenomenon of traffic flow and the characteristics of lane group, a Lane group-based Cell Transmission Model is established to describe the physical properties of traffic flow under different traffic signal control schemes. Thirdly, the variable cycle control problem is abstracted into a bi-level programming model. The upper level model is put forward for cycle length optimization considering traffic capacity and delay. The lower level model is a dynamic signal control decision model based on fairness analysis. Then, a Hybrid Intelligent Optimization Algorithm is raised to solve the proposed model. Finally, a case study shows the efficiency and applicability of the proposed model and algorithm.
John A. E. Vervaele
Full Text Available Intelligence sharing between intelligence and police services with a view to preventing and combating terrorism is high on the political agenda in Brussels and The Hague. The Netherlands is one of the few countries in the EU where this topic is subject of political scrutiny. It also led to controversial case law. Recently, Justice Minister Donner has used an expedited procedure to submit a legislative proposal concerning shielded witnesses. This Bill raises many questions, that concern, amongst others, the discretion of intelligence services to determine which information will be provided for use in criminal proceedings and the relationship between this discretionary power and the connected legal duty of secrecy on the one hand and the rights of the defence to test and question that information on the other. Furthermore, questions raise regarding the evidentiary quality of this information. The proposed rules also influence the legitimacy of criminal law and the position of the criminal courts. What effect does the paradigm of security-orientated thinking have on the historical connection between criminal law and the rule of law? This issue is also addressed in this article.
Datta, Shoumen Palit Austin
The elusive quest for intelligence in artificial intelligence prompts us to consider that instituting human-level intelligence in systems may be (still) in the realm of utopia. In about a quarter century, we have witnessed the winter of AI (1990) being transformed and transported to the zenith of tabloid fodder about AI (2015). The discussion at hand is about the elements that constitute the canonical idea of intelligence. The delivery of intelligence as a pay-per-use-service, popping out of ...
Olivia A. Wackowski; Michelle T. Bover Manderski; Cristine D. Delnevo
Introduction: Few studies have explored sources of e-cigarette awareness and peoples' e-cigarette information needs, interests, or behaviors. This study contributes to both domains of e-cigarette research. Methods: Results are based on a 2014 e-cigarette focused survey of 519 current smokers from a nationally representative research panel. Results: Smokers most frequently reported seeing e-cigarettes in stores (86.4%) and used in person (83%). Many (73%) had also heard about e-cigarette...
Matziou, V; Perdikaris, P; Petsios, K; Gymnopoulou, E; Galanis, P; Brokalaki, H
Human sexuality is a complex part of life and is considered a multidimensional phenomenon. Therefore there is an increased need for adequate and comprehensive sex education, especially for teenagers and young adults. The main aim of the study was to evaluate the level of students' sexual knowledge, as well as to identify their sources of information regarding sexual life and reproduction. A cross-sectional study using a designed self-report questionnaire was performed. The study population consisted of 936 students who were attending 10 high schools and four medical schools in Attica. Data were collected after obtaining permission from the Pedagogic Institute of the Greek Ministry of Education. The main sources of students' sexual information about reproduction were friends (29.1%) and parents (24.0%), whereas school was reported by 14.3% of them. The preferred sources of information, according to students' perceptions, were sex education specialists (65.6%), followed by school (39.1%), parents (32.2%) and friends (27.7%). The importance of school, peer and parent support upon adolescents' sexual life was revealed by the results of the study. Students' knowledge level on sex topics is not satisfactory and therefore there is a need for sex education specialists and special courses regarding sex education in Greek schools.
Lockyer, Jocelyn; Armson, Heather; Chesluk, Benjamin; Dornan, Timothy; Holmboe, Eric; Loney, Elaine; Mann, Karen; Sargeant, Joan
Self-assessment is a process of interpreting data about one's performance and comparing it to explicit or implicit standards. To examine the external data sources physicians used to monitor themselves. Focus groups were conducted with physicians who participated in three practice improvement activities: a multisource feedback program; a program providing patient and chart audit data; and practice-based learning groups. We used grounded theory strategies to understand the external sources that stimulated self-assessment and how they worked. Data from seven focus groups (49 physicians) were analyzed. Physicians used information from structured programs, other educational activities, professional colleagues, and patients. Data were of varying quality, often from non-formal sources with implicit (not explicit) standards. Mandatory programs elicited variable responses, whereas data and activities the physicians selected themselves were more likely to be accepted. Physicians used the information to create a reference point against which they could weigh their performance using it variably depending on their personal interpretation of its accuracy, application, and utility. Physicians use and interpret data and standards of varying quality to inform self-assessment. Physicians may benefit from regular and routine feedback and guidance on how to seek out data for self-assessment.
Huang, Ean-Wen; Chiou, Shwu-Fen; Pan, Mei-Lien; Wu, Hua-Huan; Jiang, Jia-Rong; Lu, Yi-De
Rapid progress in information and communication technologies and the increasing popularity of healthcare-related applications has increased interest in the topic of intelligent medical care. This topic emphasizes the use of information and communication technologies to collect and analyze a variety of data in order to provide physicians and other healthcare professionals with clinical decision support. At present, so-called smart hospitals are the focal point of most intelligent-systems development activity, with little attention currently being focused on long-term care needs. The present article discusses the application of intelligent systems in the field of long-term care, especially in community and home-based models of care. System-implementation components such as the data entry interface components of mobile devices, the data transmission and synchronization components between the mobile device and file server, the data presentation, and the statistics analysis components are also introduced. These components have been used to develop long-term care service-related applications, including home health nursing, home-care services, meals on wheels, and assistive devices rental. We believe that the findings will be useful for the promotion of innovative long-term care services as well as the improvement of healthcare quality and efficiency.
The aim of this article is to propose work methodology for Competitive Intelligence teams in one of the intelligence cycle’s specific area, in the so-called “Intelligence Analysis”. Intelligence Analysis is one of the stages of the Intelligence Cycle in which data from both the primary and secondary research are analyzed. The main result of the effort is the creation of added value for the information collected. Company Competiitve Intelligence, correctly understood and implemented in busines...
I H, Monrad Aas
Global Assessment of Functioning (GAF) is an assessment instrument that is known worldwide. It is widely used for rating the severity of illness. Results from evaluations in psychiatry should characterize the patients. Rating of GAF is based on collected information. The aim of the study is to identify the factors involved in collecting information that is relevant for rating GAF, and gaps in knowledge where it is likely that further development would play a role for improved scoring. A literature search was conducted with a combination of thorough hand search and search in the bibliographic databases PubMed, PsycINFO, Google Scholar, and Campbell Collaboration Library of Systematic Reviews. Collection of information for rating GAF depends on two fundamental factors: the sources of information and the methods for information collection. Sources of information are patients, informants, health personnel, medical records, letters of referral and police records about violence and substance abuse. Methods for information collection include the many different types of interview - unstructured, semi-structured, structured, interviews for Axis I and II disorders, semistructured interviews for rating GAF, and interviews of informants - as well as instruments for rating symptoms and functioning, and observation. The different sources of information, and methods for collection, frequently result in inconsistencies in the information collected. The variation in collected information, and lack of a generally accepted algorithm for combining collected information, is likely to be important for rated GAF values, but there is a fundamental lack of knowledge about the degree of importance. Research to improve GAF has not reached a high level. Rated GAF values are likely to be influenced by both the sources of information used and the methods employed for information collection, but the lack of research-based information about these influences is fundamental. Further development of
Camila Leoni Nascimento
Full Text Available The social networks have caused changes in the consumption habits and in the ways of relationship among companies and consumers, emerging a more demanding and informed consumer. In this paper it is aimed to assess the social networks as a source of information for the purchase of goods or services. In the study it was applied a research of exploratory nature through the survey method, conducted through personal interviews using a questionnaire with closed-ended questions. The sample of non-probabilistic type was comprised of 200 individuals from a higher education institution of São Paulo State hinterland. The survey data were analyzed descriptively. Overall, the results showed the use of social networks as a source of information search, in which the main motive is the practicality. The results corroborate the studies of Kotler and Keller (2006 when they state that the consumer seeks information on social networks to help him in the purchase, as Edelman and Hirshberg (2006 when approaching the user confidence in their friends’ opinion. For future works it is recommended to check what strategies and in what ways the companies could work in order to provide more detailed data to Internet users, aiming to support them in the decision
Sargis, J. C.; Gray, W. A.
The APWS allows user friendly access to several legacy systems which would normally each demand domain expertise for proper utilization. The generalized model, including objects, classes, strategies and patterns is presented. The core components of the APWS are the Microsoft Windows 95 Operating System, Oracle, Oracle Power Objects, Artificial Intelligence tools, a medical hyperlibrary and a web site. The paper includes a discussion of how could be automated by taking advantage of the expert system, object oriented programming and intelligent relational database tools within the APWS.
Pulsifer, P. L.; Stieglitz, M.
that social and community-building aspects are as important as technology. Establishing cyberinfrastructure for informed, intelligent decision making for the polar regions will require an innovative combination of emerging technologies and community-building across stakeholders.
Full Text Available Testability plays an important role in improving the readiness and decreasing the life-cycle cost of equipment. Testability demonstration and evaluation is of significance in measuring such testability indexes as fault detection rate (FDR and fault isolation rate (FIR, which is useful to the producer in mastering the testability level and improving the testability design, and helpful to the consumer in making purchase decisions. Aiming at the problems with a small sample of testability demonstration test data (TDTD such as low evaluation confidence and inaccurate result, a testability evaluation method is proposed based on the prior information of multiple sources and Bayes theory. Firstly, the types of prior information are analyzed. The maximum entropy method is applied to the prior information with the mean and interval estimate forms on the testability index to obtain the parameters of prior probability density function (PDF, and the empirical Bayesian method is used to get the parameters for the prior information with a success-fail form. Then, a parametrical data consistency check method is used to check the compatibility between all the sources of prior information and TDTD. For the prior information to pass the check, the prior credibility is calculated. A mixed prior distribution is formed based on the prior PDFs and the corresponding credibility. The Bayesian posterior distribution model is acquired with the mixed prior distribution and TDTD, based on which the point and interval estimates are calculated. Finally, examples of a flying control system are used to verify the proposed method. The results show that the proposed method is feasible and effective.
Wang Chao; Qiu Jing; Liu Guanjun; Zhang Yong
Testability plays an important role in improving the readiness and decreasing the life-cycle cost of equipment. Testability demonstration and evaluation is of significance in measuring such testability indexes as fault detection rate (FDR) and fault isolation rate (FIR), which is useful to the producer in mastering the testability level and improving the testability design, and helpful to the consumer in making purchase decisions. Aiming at the problems with a small sample of testabil-ity demonstration test data (TDTD) such as low evaluation confidence and inaccurate result, a test-ability evaluation method is proposed based on the prior information of multiple sources and Bayes theory. Firstly, the types of prior information are analyzed. The maximum entropy method is applied to the prior information with the mean and interval estimate forms on the testability index to obtain the parameters of prior probability density function (PDF), and the empirical Bayesian method is used to get the parameters for the prior information with a success-fail form. Then, a parametrical data consistency check method is used to check the compatibility between all the sources of prior information and TDTD. For the prior information to pass the check, the prior credibility is calculated. A mixed prior distribution is formed based on the prior PDFs and the corresponding credibility. The Bayesian posterior distribution model is acquired with the mixed prior distribution and TDTD, based on which the point and interval estimates are calculated. Finally, examples of a flying control system are used to verify the proposed method. The results show that the proposed method is feasible and effective.
Du, Junping; Li, Hongbo; Zhang, Weicun; CISC’15
This book presents selected research papers from the 2015 Chinese Intelligent Systems Conference (CISC’15), held in Yangzhou, China. The topics covered include multi-agent systems, evolutionary computation, artificial intelligence, complex systems, computation intelligence and soft computing, intelligent control, advanced control technology, robotics and applications, intelligent information processing, iterative learning control, and machine learning. Engineers and researchers from academia, industry and the government can gain valuable insights into solutions combining ideas from multiple disciplines in the field of intelligent systems.
Wunderlich, Shahla; Gatto, Kelsey A
Genetically modified organisms (GMOs) have been available for commercial purchase since the 1990s, allowing producers to increase crop yields through bioengineering that creates herbicide-resistant and insect-resistant varieties. However, consumer knowledge about GMOs has not increased at the same rate as the adoption of GMO crops. Consumers worldwide are displaying limited understanding, misconceptions, and even unfamiliarity with GMO food products. Many consumers report that they receive information about GMO food products from the media, Internet, and other news sources. These sources may be less reliable than scientific experts whom consumers trust more to present the facts. Although many in the United States support mandatory GMO labeling (similar to current European standards), consumer awareness of current GMO labeling is low. A distinction must also be made between GMO familiarity and scientific understanding, because those who are more familiar with it tend to be more resistant to bioengineering, whereas those with higher scientific knowledge scores tend to have less negative attitudes toward GMOs. This brings to question the relation between scientific literacy, sources of information, and overall consumer knowledge and perception of GMO foods. © 2015 American Society for Nutrition.
Full Text Available In this paper, a robust energy management solution which will facilitate the optimum and economic control of energy flows throughout a microgrid network is proposed. The increased penetration of renewable energy sources is highly intermittent in nature; the proposed solution demonstrates highly efficient energy management. This study enables precise management of power flows by forecasting of renewable energy generation, estimating the availability of energy at storage batteries, and invoking the appropriate mode of operation, based on the load demand to achieve efficient and economic operation. The predefined mode of operation is derived out of an expert rule set and schedules the load and distributed energy sources along with utility grid.
To implement intelligent computers, the problem of formalization of human intellectual activity must be considered. Insight into formalized intellectual activity can be gained by examination of its four abilities: (1) problem-solving; (2) learning, recognition and understanding; (3) language analysis and understanding; and (4) intellectual interaction. These are the topics discussed in the paper. 68 references.
Ercan, Orhan; Ural, Evrim; Köse, Sinan
For a sustainable world, it is very important for students to develop positive environmental attitudes and to have awareness of energy use. The study aims to investigate the effect of web assisted instruction with emotional intelligence content on 8th grade students' emotional intelligence, attitudes towards environment and energy saving, academic…
Park, SoHyun; Oh, Heung-Kwon; Park, Gibeom; Suh, Bongwon; Bae, Woo Kyung; Kim, Jin Won; Yoon, Hyuk; Kim, Duck-Woo; Kang, Sung-Bum
Despite the rapid penetration of social media in modern life, there has been limited research conducted on whether social media serves as a credible source of health information. In this study, we propose to identify colorectal cancer information on Twitter and assess its informational credibility. We collected Twitter messages containing colorectal cancer-related keywords, over a 3-month period. A review of sample tweets yielded content and user categorization schemes. The results of the sample analysis were applied to classify all collected tweets and users, using a machine learning technique. The credibility of the information in the sampled tweets was evaluated. A total of 76,119 tweets were analyzed. Individual users authored the majority of tweets (n = 68,982, 90.6%). They mostly tweeted about news articles/research (n = 16,761, 22.0%) and risk/prevention (n = 14,767, 19.4%). Medical professional users generated only 2.0% of total tweets (n = 1509), and medical institutions rarely tweeted (n = 417, 0.6%). Organizations tended to tweet more about information than did individuals (85.2% vs 63.1%; P users. Coupled with the Internet's potential to increase social support, Twitter may contribute to enhancing public health and empowering users, when used with proper caution.
Kopec, D; Eckhardt, R; Tamang, S; Reinharth, D
The United Nations Security Council reports HIV/AIDS as the fastest growing threat to human development. In addition, the World Health Organization  reports that nearly 5 million persons (4.3 million adults and 700,000 children) are newly infected with HIV each year; more than 95% of them found in developing countries. Since STDs as a group are a personal problem which few people feel comfortable discussing, we believe that hand-held PDAs can provide an opportunity for learning about this disease while insuring anonymity. This device will employ the newest technologies including Bluetooth wireless technology, which can transmit and receive data via a short-range radio link using a globally available frequency band (2.4 GHz ISM band), enabling rapid and accurate synchronous and asynchronous data communication. The first generation of Bluetooth permits exchange of data up to a rate of 1 Mbps, even in areas with much electromagnetic disturbance. This emerging technology can facilitate HIV/AIDS outreach around the globe.Recent advances in learning have taken a particularly cognitive perspective and these findings have implications for education in general as well as for the development of intelligent tutoring systems in particular. In the past, effective SmartBookstrade markhave been developed for AIDS education to disseminate the critical knowledge relevant to this epidemic .Since 1993, the proliferation of the World Wide Web has created a plethora of new opportunities for the delivery of electronic distance learning systems. However, we feel that it is important that a whatever technology is employed is based on a sound educational theory. A new, comprehensive, web-based learning system called SmartTutor has been developed, at Brooklyn College of The City University of New York . This technology provides a user-friendly, self-paced, easy to modify, software environment intended to serve the user's learning needs and is based on a generic Smart
Wagner, Boris; Eck, Ralf; Unmüessig, Gabriel; Peinsipp-Byma, Elisabeth
When a spatiotemporal events happens, multi-source intelligence data is gathered to understand the problem, and strategies for solving the problem are investigated. The difficulties arising from handling spatial and temporal intelligence data represent the main problem. The map might be the bridge to visualize the data and to get the most understand model for all stakeholders. For the analysis of geodata based intelligence data, a software was developed as a working environment that combines geodata with optimized ergonomics. The interaction with the common operational picture (COP) is so essentially facilitated. The composition of the COP is based on geodata services, which are normalized by international standards of the Open Geospatial Consortium (OGC). The basic geodata are combined with intelligence data from images (IMINT) and humans (HUMINT), stored in a NATO Coalition Shared Data Server (CSD). These intelligence data can be combined with further information sources, i.e., live sensors. As a result a COP is generated and an interaction suitable for the specific workspace is added. This allows the users to work interactively with the COP, i.e., searching with an on board CSD client for suitable intelligence data and integrate them into the COP. Furthermore, users can enrich the scenario with findings out of the data of interactive live sensors and add data from other sources. This allows intelligence services to contribute effectively to the process by what military and disaster management are organized.
.... Improved situational awareness is expected to be a product of the Information Revolution in which telecommunications, sensors, all sources of intelligence, and global positioning are integrated...
Luca, Massimiliano Di
Offers a unique multidisciplinary overview of how humans interact with soft objects and how multiple sensory signals are used to perceive material properties, with an emphasis on object deformability. The authors describe a range of setups that have been employed to study and exploit sensory signals involved in interactions with compliant objects as well as techniques to simulate and modulate softness - including a psychophysical perspective of the field. Multisensory Softness focuses on the cognitive mechanisms underlying the use of multiple sources of information in softness perception. D
Marta Lígia Pomim Valentim
Full Text Available A prospecção e o monitoramento informacional são atividades base para a inteligência competitiva, entendida como um processo dinâmico, composto pela gestão da informação e pela gestão do conhecimento. O processo de inteligência competitiva (I. C. nas organizações ocorre a partir de diferentes atividades informacionais, dentre elas estão as ligadas a prospecção e ao monitoramento. O papel destas atividades é essencial, pois alimentam todo o processo com dados, informação e conhecimento, constroem diversas estruturas formais e informais de informação dentro da organização, além do que, as atividades de prospecção e monitoramento geram serviços e produtos informacionais sistematizados, com alto valor agregado.The information scanning and information mining are activities base for the competitive intelligence, understood as a dynamic process, composed by the information management and knowledge management. The process of competitive intelligence (I. C. in the organizations it happens starting from different informational activities, they are the tied up ones information scanning and information mining. The function of these activities is essential, because they feed the whole process with data, information and knowledge, they build several formal structures and you inform inside of information of the organization, in addition, the information scanning and information mining activities generate information services and products systematized, with high value aggregate.
Full Text Available The pervasive use of new mobile devices has allowed a better characterization in space and time of human concentrations and mobility in general. Besides its theoretical interest, describing mobility is of great importance for a number of practical applications ranging from the forecast of disease spreading to the design of new spaces in urban environments. While classical data sources, such as surveys or census, have a limited level of geographical resolution (e.g., districts, municipalities, counties are typically used or are restricted to generic workdays or weekends, the data coming from mobile devices can be precisely located both in time and space. Most previous works have used a single data source to study human mobility patterns. Here we perform instead a cross-check analysis by comparing results obtained with data collected from three different sources: Twitter, census, and cell phones. The analysis is focused on the urban areas of Barcelona and Madrid, for which data of the three types is available. We assess the correlation between the datasets on different aspects: the spatial distribution of people concentration, the temporal evolution of people density, and the mobility patterns of individuals. Our results show that the three data sources are providing comparable information. Even though the representativeness of Twitter geolocated data is lower than that of mobile phone and census data, the correlations between the population density profiles and mobility patterns detected by the three datasets are close to one in a grid with cells of 2×2 and 1×1 square kilometers. This level of correlation supports the feasibility of interchanging the three data sources at the spatio-temporal scales considered.
Full Text Available The goal of the article is to determine the place and role of opinion giving services in consumer behaviours. The discussion is conducted around the thesis saying that in the information society, opinion giving services constitute an important source of information for consumers in the process of selecting and purchasing both products and services. In the article the research approach based on the theoretical and empirical examinations was presented. The discussion starts with presenting a defi nition and types of opinion giving services which constitute the base for the characteristics of activities and usefulness of web portals collecting consumers opinions. The use of opinion giving services provided in the purchase process was evaluated. An essential interest in other consumers opinions, placed in Internet, was observed together with perceiving them as credible. Positive assessment of the functionality of opinion giving services was noticed.
Figure V-7 Source Stress Contributions for the Example ............................................ V-24 Figure V-8 ROC Curve for the Example...resilience is the ability of the organization “to avoid disintegration when coming under stress (Milward & Raab, 2006, p. 351).” Despite numerous...members of the network. Examples such as subordinates directed to meetings in place of their superiors, virtual participation via telecommuting
Litvinenko, E I; Astakhov, Yu A [Frank Laboratory of Neutron Physics, Joint Institute for Nuclear Research, Dubna (Russian Federation); Akishina, E P [Moscow State Engineering Physics Institute (Technical University), Moscow (Russian Federation); Semenov, R N; Smol` kov, I S [International University ` Dubna` , Dubna (Russian Federation)
The work on the creation of the hypertext information system has been performed on the basis of the web-server of the Frank Laboratory of Neutron Physics, JINR. The initial project proposed the creation of HTML information resources and did not consider the usage of any database for the information management. During the project implementation it became obvious that the system should have well defined structured informational model and it might be helpful to imply the relational database as a part of the system. The ORACLE server at the Laboratory of Computing Techniques and Automation (LCTA) of the JINR has been used for this task. Now we have a set of ORACLE tables designed using CASE tools for the informational model of the system, structured information about neutron sources, neutron instruments, printed publications and URL addresses. We have also the web interface to these tables using free ware gateway ORALINK installed on our Pentium PC with Windows NT and some tools to administer database and view pictures stored in the tables. We took into account NeXuS specifications while tried to design the informational model of the system, and we continue to work on its creation 15 refs., 2 figs., 1 tab. Submitted to the Proceedings of the International Workshop on New Opportunities for Better User Group Software (NOBUGS`97), 10-12 Dec 1997, USA
Litvinenko, E.I; Astakhov, Yu.A.; Akishina, E.P.; Semenov, R.N.; Smol'kov, I.S.
The work on the creation of the hypertext information system has been performed on the basis of the web-server of the Frank Laboratory of Neutron Physics, JINR. The initial project proposed the creation of HTML information resources and did not consider the usage of any database for the information management. During the project implementation it became obvious that the system should have well defined structured informational model and it might be helpful to imply the relational database as a part of the system. The ORACLE server at the Laboratory of Computing Techniques and Automation (LCTA) of the JINR has been used for this task. Now we have a set of ORACLE tables designed using CASE tools for the informational model of the system, structured information about neutron sources, neutron instruments, printed publications and URL addresses. We have also the web interface to these tables using free ware gateway ORALINK installed on our Pentium PC with Windows NT and some tools to administer database and view pictures stored in the tables. We took into account NeXuS specifications while tried to design the informational model of the system, and we continue to work on its creation
This environmental information handbook was prepared to assist both the non-technical reader (i.e., homeowner) and technical persons (such as researchers, policy analysts, and builders/designers) in understanding the current state of knowledge regarding combustion sources of indoor air pollution. Quantitative and descriptive data addressing the emissions, indoor concentrations, factors influencing indoor concentrations, and health effects of combustion-generated pollutants are provided. In addition, a review of the models, controls, and standards applicable to indoor air pollution from combustion sources is presented. The emphasis is on the residential environment. The data presented here have been compiled from government and privately-funded research results, conference proceedings, technical journals, and recent publications. It is intended to provide the technical reader with a comprehensive overview and reference source on the major indoor air quality aspects relating to indoor combustion activities, including tobacco smoking. In addition, techniques for determining potential concentrations of pollutants in residential settings are presented. This is an update of a 1985 study documenting the state of knowledge of combustion-generated pollutants in the indoor environment. 191 refs., 51 figs., 71 tabs.
Cong, Zhen; Luo, Jianjun; Liang, Daan; Nejat, Ali
People may receive tornado warnings from multiple information sources, but little is known about factors that affect the number of warning information sources (WISs). This study examined predictors for the number of WISs with a telephone survey on randomly sampled residents in Tuscaloosa, Alabama, and Joplin, Missouri, approximately 1 year after both cities were struck by violent tornadoes (EF4 and EF5) in 2011. The survey included 1006 finished interviews and the working sample included 903 respondents. Poisson regression and Zero-Inflated Poisson regression showed that older age and having an emergency plan predicted more WISs in both cities. Education, marital status, and gender affected the possibilities of receiving warnings and the number of WISs either in Joplin or in Tuscaloosa. The findings suggest that social disparity affects the access to warnings not only with respect to the likelihood of receiving any warnings but also with respect to the number of WISs. In addition, historical and social contexts are important for examining predictors for the number of WISs. We recommend that the number of WISs should be regarded as an important measure to evaluate access to warnings in addition to the likelihood of receiving warnings. (Disaster Med Public Health Preparedness. 2017;11:168-172).
SIGINT), human intelligence (HUMINT), open source intelligence , ( OSINT ), and measurement and signatures intelligence (MASINT). All sources progress...the underlying principles of MASINT technologies and the operators and analysts who have intelligence questions that MASINT sources may be able to...integrity, analysts should instead use these sources of MASINT in support of less time-sensitive intelligence problems. Through creative or
Full Text Available The present article focuses on the research and development planning for innovative railway systems. Within such a general framework, the specific objectives of the research have been defined within the framework of a large Intelligent Railway System project in Hungary. Our theoretical research work at the university is combined with practical experience gained at the Hungarian State Railways. In the course of this research work, the development of an intelligent railway system has been investigated by leveraging on the fruitful cooperation between academic and industrial partners, in order to promote the application and integration possibilities of the development results, as well as the introduction of innovative components in the railway system. In such a context, this article discusses the research plan, preliminary and long-term expected results, sharing objectives and experiences with the aim of providing novel views in an extremely current and challenging field of research.
SWOT analysis 18. Customary surveillance methods and frequencies 48. Assess market share held by prospective suppliers 19. Typical service and...threats ( SWOT ) analysis . The environment dimension involves holding industry days and issuing requests for information (RFI) periodically to monitor...above-listed benefits , the ARP will endeavor to stimulate this dialogue through various means throughout the year as we interact with our
Biloukha, O; Utermohlen, V
To identify the major perceived influences on food choice, to examine the use of and trust in information sources concerning healthy eating, and to assess attitudes towards and barriers to adopting healthy eating practices in a post-USSR country (Ukraine). A survey of an urban adult population. The questions were adopted from the Pan-European Union (EU) Survey of Consumer Attitudes to Food, Nutrition and Health (1995-1996). Lviv city, Ukraine. The survey included 296 adults (84 males, 212 females) aged 18-55 years; they were primarily college students and subjects with tertiary education--the groups most likely to be both interested in healthy eating and affected by current socioeconomic downturns. The major factors in food choice were: 'quality/freshness' (cited by 80%), 'price' (58%) and 'taste' (47%); only 34% cited 'trying to eat healthily'. More older people cited 'price' than 'quality/freshness', and men were more likely than women to cite 'taste'. Sources of healthy eating information included: 'relatives/friends' (cited by 65%, trusted by 85%) and health professionals (trusted by 92%, but used by only 35%); while advertising was the least trusted source (cited by 28%). Fifty-three per cent of respondents considered their diet to be healthy enough without further changes; 50% thought of the nutritional aspects of the food they ate; fewer women than men considered their diet healthy, and more women than men thought about nutrition. Barriers to healthy eating included: 'cost' (cited by 65%), 'lack of time' (55%), 'self-control' (54%), 'selection influences' (41%), 'lack of knowledge' (32%), 'unpleasant foods' and 'resistance to change' (both 30%). Strategies to encourage healthy eating in this population should involve word-of-mouth nutrition education concerning low-cost healthy alternatives.
Intelligent transportation systems (ITS) are gaining acceptance around the world and the connected vehicle component of ITS is recognized as a high priority research and development area in many technologically advanced countries. Connected vehicles are expected to have the capability of safe, efficient and eco-driving operations whether these are under human control or in the adaptive machine control mode of operations. The race is on to design the capability to operate in connected traffic ...
Full Text Available The most difficult but important problem in advance driver assistance system development is how to measure and model the behavioral response of drivers with focusing on the cognition process. This paper describes driver's deceleration and acceleration behavior based on driving situation awareness in the car-following process, and then presents several driving models for analysis of driver's safety approaching behavior in traffic operation. The emphasis of our work is placed on the research of driver's various information process and multi-ruled decisionmaking mechanism by considering the complicated control process of driving; the results will be able to provide a theoretical basis for intelligent driving shaping model.
Круковський, Ігор Анатолійович; Хомів, Богдан Арсенович; Гаврилюк, Всеволод Леонідович
The actuality of integration of Social Media Analytics/Social CRM with Decision Support Systems on the basis of Business Intelligence 2.0 (DSS/BI 2.0) and with the Geographic Information System is presented. On the basis of their integration a new type of DSS is offered - Social Media Spatial DSS/BI. The variant is shown of this system realization on the programmatic platform of Social Media Analytics of the SemanticForce Company, which has its own semantic analyzer Blueberry. The suitability...
Dennis, Joshua M.
Approved for public release; distribution is unlimited The United States Fire Service has not only a role but a need to be included in the domestic intelligence community. The fire service in gaining access to information and adding untapped sources of information/intelligence can add value to the efforts of the domestic intelligence community and in return provide value added to fire departments day-to-day operations. Absent is a strong national guidance for fire service intelligence inte...
The subject is covered in chapters, entitled: chance and the universe (synthesis of proteins; the primordial soup); the gospel according to Darwin (discussion of Darwin theory of evolution); life did not originate on earth (fossils from space; life in space); the interstellar connection (living dust between the stars; bacteria in space falling to the earth; interplanetary dust); evolution by cosmic control (microorganisms; genetics); why aren't the others here (a cosmic origin of life); after the big bang (big bang and steady state); the information rich universe; what is intelligence up to; the intelligent universe.
Melentiyeva, Anastasiya; Kucheryavskiy, Sergey; Bogomolov, Andrey
analysis. The main task here is to extract individual quantitative information on milk fat and total protein content from spectral data. This is particularly challenging problem in the case of raw natural milk, where the fat globule sizes may essentially differ depending on source. Fig. 1. Spots of light...... designed set of raw milk samples with simultaneously varying fat, total protein and particle size distribution has been analyzed in the Vis spectral region. The feasibility of raw milk analysis by PLS regression on spectral data has been proved. The root mean-square errors below 0.10% and 0.04% for fat....... 3J&M Analytik AG, Willy-Messerschmitt-Strasse 8, 73457 Essingen, Germany. email@example.com Fat and protein are two major milk nutrients that are routinely analyzed in the dairy industry. Growing food quality requirements promote the dissemination of spectroscopic analysis, enabling real...
Abolfazlian, Ali Reza Kian
I denne artikel præsenteres argumenter for, hvorfor den Kartesianske management model baseret på en kognitiv psykologisk forståelse af organisationer, ikke kan beskrive de forandringsprocesser, som indførelsen af ny informationsteknologi i organisationer forårsager. På denne baggrund definerer vi...... Post-Kartesiansk management. Endvidere argumenteres for, hvordan Intelligent Software Agents kan hjælpe managers med at få en bedre forståelse for de førnævnte forandringer i organisationerne....
The International Nuclear Information System (INIS) provides links to useful nuclear related information sources in Internet by the name of 'INIS Web Services' and the Energy Technology Data Exchange (ETDE) also provides links to useful energy related information sources in Internet by the name of Energy Information Source'. This paper outlines these two services. (author)
Lelek, V.; Marek, T.
It is important to make all analyses and collect all information from the work of the new facility (which the transmutation demonstration unit will surely be) to be sure that the operation corresponds to the forecast or to correct the equations of the facility. The behaviour of the molten salt reactor and in particular the system of measurement are very different from that of the solid fuel reactor. Key information from the long time kinetics could be the nearly on line knowledge of the fuel composition. In this work it is shown how to include it into the control and use such data for the correction of neutron cross-sections for the high actinides or other characteristics. Also the problem of safety - change of the boundary problem to the initial problem - is mentioned. The problem is transformed into the generalised perturbation theory in which the adjoint function is obtained through the solution of the equations with right hand side having the form of source. Such an approach should be a theoretical base for the calculation of the sensitivity coefficients. (authors)
Schroeder, M.; Stender, V.; Jüngling, S.
Full Text Available The aim of the paper is to present the 19th Central European Conference on Information and Intelligent Systems, CECIIS 2008, which took place between 24th and 26th September in Varaždin and was organised by the Faculty of Organisation and Informatics in Varaždin. The central theme of this year’s conference was e-government. During those 3 days, 250 participants could attend presentations of 90 scientific and professional works in 15 sections and 9 invited lectures on the newest trends in the area of information and communication technology management, information technologies, security of information systems, multimedia systems, strategic planning of information systems, education for information society. Two other parallel events were held within the international conference, namely the workshop ‘Activities towards ICT professionalism’ and a round table on the subject ‘Competences of ICT Professionals’. Experts in the field of human resources, leaders of information centres and managers of the leading Croatian companies participated in the latter.
Tambo, Torben; Gabel, Ole Dahl; Olsen, Martin
Business Intelligence (BI) is playing a major role in most Enterprise Information Systems (EIS) architectures providing strategic and tactical management information on selected issues. BI is typically detached from mainstream transaction systems and provides a translated view of the business...... present findings within the relationship between technology and business in BI is particularly complex as operational issues are secondary to the desired systems outcome’s character of a management construct. A management framework is proposed for BI related to its special characteristics involving...... to a dualistic understanding of BI as both a technological and a social system. The originality of this paper is in its augmentation of IS management with a better comprehension of the BI aspect intended to contribute to a distinct management framework for BI....
Nagler, Rebekah H; Romantan, Anca; Kelly, Bridget J; Stevens, Robin S; Gray, Stacy W; Hull, Shawnika J; Ramirez, A Susana; Hornik, Robert C
Little is known about how patients move among information sources to fulfill unmet needs. We interviewed 43 breast, prostate, and colorectal cancer patients. Using a grounded theory approach, we identified patterns and motivations for movement among information sources. Overall, patients reported using one source (e.g., newspaper) followed by the use of another source (e.g., Internet), and five key motivations for such cross-source movement emerged. Patients' social networks often played a central role in this movement. Understanding how patients navigate an increasingly complex information environment may help clinicians and educators to guide patients to appropriate, high-quality sources.
Full Text Available Objectives. Existing findings on cancer patients' use of information sources were synthesized to 1 rank the most and least used information sources and the most helpful information sources and to 2 find the impact of patient demographics and situations on use of information sources. Method. . To synthesize results found across studies, a systematic review was conducted. Medline and CINAHL were searched to retrieve literature on cancer patients' information source use. The retrieved articles were carefully selected according to predetermined criteria, and several articles were eliminated in a systematic approach. Analysis. The twelve articles that met the criteria were systematically analysed by extracting data from articles and summarizing data for the purpose of synthesis to determine the meaning of findings on most used information sources, least used information sources, most helpful information sources, effect of patient characteristics on preference for an information source, and effect of patient situations on preference for an information source. Results. In descending order of use, health care professionals, medical pamphlets, and family and friends were most used information sources. Internet and support groups were least used. In descending order of helpfulness, books, health care professionals and medical pamphlets were found to be most helpful information sources. Younger patients used health care professionals and certain forms of written information sources more than older patients. Conclusion. . The systematic review shows that many areas of cancer patients' information source use have been either neglected or barely analysed. An in-depth understanding of cancer patients' use of information sources and the characteristics in information sources they consider to be helpful is important for developing successful interventions to better inform patients.
Applied Computational Intelligence in Engineering and Information Technology Revised and Selected Papers from the 6th IEEE International Symposium on Applied Computational Intelligence and Informatics SACI 2011
Precup, Radu-Emil; Preitl, Stefan
This book highlights the potential of getting benefits from various applications of computational intelligence techniques. The present book is structured such that to include a set of selected and extended papers from the 6th IEEE International Symposium on Applied Computational Intelligence and Informatics SACI 2011, held in Timisoara, Romania, from 19 to 21 May 2011. After a serious paper review performed by the Technical Program Committee only 116 submissions were accepted, leading to a paper acceptance ratio of 65 %. A further refinement was made after the symposium, based also on the assessment of the presentation quality. Concluding, this book includes the extended and revised versions of the very best papers of SACI 2011 and few invited papers authored by prominent specialists. The readers will benefit from gaining knowledge of the computational intelligence and on what problems can be solved in several areas; they will learn what kind of approaches is advised to use in order to solve these problems. A...
Giménez Toledo, Elea; Román Román, Adelaida
[ES] Las actividades de vigilancia tecnológica e inteligencia competitiva son herramientas de trabajo fundamentales para mejorar la competitividad de las organizaciones. Su éxito depende en gran medida de los sistemas de gestión del conocimiento en los que se apoyen. Este trabajo pretende dar a conocer la relación entre la gestión de la información y sus profesionales con las actividades de vigilancia tecnológica e inteligencia competitiva, así como presentar los principales agentes que traba...
Garcia, Leonardo Guimarães
Discute a idéia de uma Inteligência Competitiva (IC) com enfoque empreendedor, seus fundamentos e sua implementação em organizações de diversos tipos. Apresenta um programa que articula ensino e pesquisa, voltado à geração de conhecimento e à preparação de profissionais da informação na graduação para a prática dessa idéia. Discute os resultados já atingidos com a implantação desse programa no âmbito da graduação em Ciência da Informação. Discusses the concept of Competitive Intelligence (...
Bedubourg, Gabriel; Wiik, H; Queyriaux, B; Lausund, P; Meynard, J-B
There is a requirement for adequate medical expertise to be available throughout the range of potential future operations involving members of the North Atlantic Treaty Organization (NATO). The aim of this study was to assess the collection and sharing of medical intelligence and medical information (M2I) by NATO Nations, Partner Nations and NATO Command Structure and NATO Force Structure Headquarters (NCS/NFS HQs). A transversal survey was conducted between December 2014 and March 2015 using a survey form on M2I sent to NATO Nations and Partnership for Peace (PfP) Nations as well as NCS/NFS HQs. Correctly completed responses were received from 15/40 (37.5%) of the possible NATO and PfP Nations (37.5%) and 7/8 (87.5%) of the NCS/NFS HQs (100.0%). Deficiencies in the collection of M2I data were found due to lack of specific doctrines, networks, tools, structures and organisation. The survey provided an indication even though the participation rate was low for Nations. Part of the problem is thought to be that medical information and medical intelligence often lie in different chains of command. Future directions for this research could include studying the possibilities of a new specific information technology (IT) system to collect and to share M2I. Collection and sharing of M2I within the NATO/PfP community requires facilitation in order to strengthen the basis for decision-making and force health protection. The development of a dedicated NATO IT system may be a precondition for the implementation of an efficient M2I network. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Danckert, Stacey L; MacLeod, Colin M; Fernandes, Myra A
Jacoby, Shimizu, Daniels, and Rhodes (Psychonomic Bulletin & Review, 12, 852-857, 2005) showed that new words presented as foils among a list of old words that had been deeply encoded were themselves subsequently better recognized than new words presented as foils among a list of old words that had been shallowly encoded. In Experiment 1, by substituting a deep-versus-shallow imagery manipulation for the levels-of-processing manipulation, we demonstrated that the effect is robust and that it generalizes, also occurring with a different type of encoding. In Experiment 2, we provided more direct evidence for context-related encoding during tests of deeply encoded words, showing enhanced priming for foils presented among deeply encoded targets when participants made the same deep-encoding judgments on those items as had been made on the targets during study. In Experiment 3, we established that the findings from Experiment 2 are restricted to this specific deep judgment task and are not a general consequence of these foils being associated with deeply encoded items. These findings provide support for the source-constrained retrieval hypothesis of Jacoby, Shimizu, Daniels, and Rhodes: New information can be influenced by how surrounding items are encoded and retrieved, as long as the surrounding items recruit a coherent mode of processing.
the addressee with subtle clues about personality or cultural background. Gestures are an extremly rich source of communication-specific and contextual information for interactions in ambient intelligence environments. This chapter reviews the semantic layers of gestural interaction, focusing on the layer...
Adeline S.A. du Toit
Research purpose: The purpose was to determine how these countries can use competitive intelligence to increase their competitiveness in the global economy. Motivation for the study: Competitive intelligence is a challenge in developing economies. Research design, approach and method: A questionnaire survey was sent to competitive intelligence professionals in the four study countries. Main findings: The most important primary information source used in all four countries is direct customer feedback and the most important secondary information source used is corporate websites. Companies in all four countries did not use advanced analysis techniques. Practical/managerial implications: It is recommended that all four countries should develop a competitive intelligence culture by creating awareness of competitive intelligence amongst their employees. Contribution/value added: It is crucial to apply competitive intelligence in the four countries in order to become more competitive in the global economy.
Lipavská, Helena; Žárský, Viktor
The concept of plant intelligence, as proposed by Anthony Trewavas, has raised considerable discussion. However, plant intelligence remains loosely defined; often it is either perceived as practically synonymous to Darwinian fitness, or reduced to a mere decorative metaphor. A more strict view can be taken, emphasizing necessary prerequisites such as memory and learning, which requires clarifying the definition of memory itself. To qualify as memories, traces of past events have to be not only stored, but also actively accessed. We propose a criterion for eliminating false candidates of possible plant intelligence phenomena in this stricter sense: an “intelligent” behavior must involve a component that can be approximated by a plausible algorithmic model involving recourse to stored information about past states of the individual or its environment. Re-evaluation of previously presented examples of plant intelligence shows that only some of them pass our test. “You were hurt?” Kumiko said, looking at the scar. Sally looked down. “Yeah.” “Why didn't you have it removed?” “Sometimes it's good to remember.” “Being hurt?” “Being stupid.”—(W. Gibson: Mona Lisa Overdrive) PMID:19816094
Ganguli, Sayak; Gupta, Manoj Kumar; Basu, Protip; Banik, Rahul; Singh, Pankaj Kumar; Vishal, Vineet; Bera, Abhisek Ranjan; Chakraborty, Hirak Jyoti; Das, Sasti Gopal
With the advent of age of big data and advances in high throughput technology accessing data has become one of the most important step in the entire knowledge discovery process. Most users are not able to decipher the query result that is obtained when non specific keywords or a combination of keywords are used. Intelligent access to sequence and structure databases (IASSD) is a desktop application for windows operating system. It is written in Java and utilizes the web service description language (wsdl) files and Jar files of E-utilities of various databases such as National Centre for Biotechnology Information (NCBI) and Protein Data Bank (PDB). Apart from that IASSD allows the user to view protein structure using a JMOL application which supports conditional editing. The Jar file is freely available through e-mail from the corresponding author.
explosive device ISR intelligence, surveillance and reconnaissance J2 joint staff intelligence section NATO North Atlantic Treaty Organization OSINT open...commonly referring to the technical means of collection to the exclusion of HUMINT, open source intelligence ( OSINT ), and other information coming...is using to gain popular support or to delegitimize the supported government. The 10th Mountain Division determined OSINT was an important component
A simple extension of the CAMAC standard is described which allows distributed intelligence at the crate level. By distributed intelligence is meant that there is more than one source of control in a system. This standard is just now emerging from the NIM Dataway Working Group and its European counterpart. 1 figure
With the explosion in information resources being developed by computer scientists, subject specialists, librarians, and commercial companies, the challenge for the information professional is to keep abreast of the most significant developments and to distill the information for a wide range of users. This paper looks at some of the developments…
Turner, Adrienne; Kabashi, Arta; Guthrie, Hannah; Burket, Roger; Turner, Philip
With Web 2.0, the variety of information sources for parents of paediatric psychiatric patients has increased dramatically. Information use theory suggests newer sources supplement rather than supplant traditional sources of health information. This study sought to determine the use and value of traditional and emerging sources of information and whether the subjects had access to highly valued sources of information. One hundred parents indicated the use and value of six sources of information on the child's symptoms, diagnoses and treatment. The data were analyzed to determine if significant relationships existed between type of source and the use and value of the information sources. Ninety-four percent of the subjects had access to the Internet and almost half of those reported using the Social Web. Eighty-five percent had at least one high-value information source. The psychiatrist in the clinic, the Internet and the primary care physician were the most highly used and valued sources. Use of digital information sources was greater than found in other studies of similar populations. This use appears to complement rather than supplant more traditional sources. Further studies are needed to see if the negative impact of lack of Internet access is replicated. © 2011 The authors. Health Information and Libraries Journal © 2011 Health Libraries Group.
Secor-Turner, Molly; Sieving, Renee E.; Eisenberg, Marla E.; Skay, Carol
The objective of this study was to describe prevalent informal sources of information about sex and examine associations between informal sources of information about sex and sexual risk outcomes among sexually experienced adolescents. Work involved the secondary analysis of data from the Minnesota Student Survey, a statewide survey to monitor…
Taha, Jessica; Sharit, Joseph; Czaja, Sara
Purpose: Older adults generally have an increased need for health care information. Whereas some use the Internet to look for this information, others use more traditional sources. This study gathered data from older adults to determine their health information needs, the perceived usefulness of sources of health information, and if there are…
This paper discusses the sources of radiation in the narrow perspective of radioactivity and the even narrow perspective of those sources that concern environmental management and restoration activities at DOE facilities, as well as a few related sources. Sources of irritation, Sources of inflammatory jingoism, and Sources of information. First, the sources of irritation fall into three categories: No reliable scientific ombudsman to speak without bias and prejudice for the public good, Technical jargon with unclear definitions exists within the radioactive nomenclature, and Scientific community keeps a low-profile with regard to public information. The next area of personal concern are the sources of inflammation. This include such things as: Plutonium being described as the most dangerous substance known to man, The amount of plutonium required to make a bomb, Talk of transuranic waste containing plutonium and its health affects, TMI-2 and Chernobyl being described as Siamese twins, Inadequate information on low-level disposal sites and current regulatory requirements under 10 CFR 61, Enhanced engineered waste disposal not being presented to the public accurately. Numerous sources of disinformation regarding low level radiation high-level radiation, Elusive nature of the scientific community, The Federal and State Health Agencies resources to address comparative risk, and Regulatory agencies speaking out without the support of the scientific community
Holappa, Miina; Ahonen, Riitta; Vainio, Kirsti; Hämeen-Anttila, Katri
Previous studies have indicated the use of medication by children to be dependent on the attitudes of knowledge of their parents; however, little is known about sources parents might use in driving medication use decisions. The aim of this study was to describe the information sources that parents use regarding their children's medication and their perceptions of the reliability of these information sources. This study is part of a cross-sectional population survey with a random sample of 6000 children younger than 12 years. The response rate of the questionnaire was 67%. Parents were asked about the use of information sources and their perception of reliability with a list of 16 information sources. The information sources that parents reported having used were physicians (72%), patient information leaflets (PILs) (67%), public or school health nurses (52%), and pharmacists (44%). Regardless of the child's age, physicians were the parents' most-used information source. Physicians were the most-used information source also when the child had at least 1 of the 4 most common long-term diseases among children in Finland (asthma, diabetes, epilepsy, and juvenile idiopathic arthritis). Parents considered physicians (50%), PILs (31%), pharmacists (27%), nurses (20%), and public or school health nurses (17%) very reliable information sources. Finnish parents seek information from health care professionals and PILs when looking for information concerning their children's medication. Furthermore, they find health care professionals and PILs to be reliable information sources. Copyright © 2012 Elsevier Inc. All rights reserved.
Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock
The abundance of information regarding any topic makes the Internet a very good resource. Even though searching the Internet is very easy, what remains difficult is to automate the process of information extraction from the available online information due to the lack of structure and the diversity...... in the sharing methods. Most of the times, information is stored in different proprietary formats, complying with different standards and protocols which makes tasks like data mining and information harvesting very difficult. In this paper, an information harvesting tool (heteroHarvest) is presented...... with objectives to address these problems by filtering the useful information and then normalizing the information in a singular non hypertext format. Finally we describe the results of experimental evaluation. The results are found promising with an overall error rate equal to 6.5% across heterogeneous formats....
Cornand, Camille; Heinemann, Frank
We propose a speculative attack model in which agents receive multiple public signals. It is characterised by its focus on an informational structure, which sets free from the strict separation between public information and private information. Diverse pieces of public information can be taken into account differently by players and are likely to lead to different appreciations ex post. This process defines players’ private value. The main result is to show that equilibrium uniqueness depend...
Munteanu, Cristian R; Gonzalez-Diaz, Humberto; Garcia, Rafael; Loza, Mabel; Pazos, Alejandro
The molecular information encoding into molecular descriptors is the first step into in silico Chemoinformatics methods in Drug Design. The Machine Learning methods are a complex solution to find prediction models for specific biological properties of molecules. These models connect the molecular structure information such as atom connectivity (molecular graphs) or physical-chemical properties of an atom/group of atoms to the molecular activity (Quantitative Structure - Activity Relationship, QSAR). Due to the complexity of the proteins, the prediction of their activity is a complicated task and the interpretation of the models is more difficult. The current review presents a series of 11 prediction models for proteins, implemented as free Web tools on an Artificial Intelligence Model Server in Biosciences, Bio-AIMS (http://bio-aims.udc.es/TargetPred.php). Six tools predict protein activity, two models evaluate drug - protein target interactions and the other three calculate protein - protein interactions. The input information is based on the protein 3D structure for nine models, 1D peptide amino acid sequence for three tools and drug SMILES formulas for two servers. The molecular graph descriptor-based Machine Learning models could be useful tools for in silico screening of new peptides/proteins as future drug targets for specific treatments.
Fowler, Kendra; Bridges, Eileen
Among the proficiencies that marketing students should acquire, information literacy, the ability to gather and apply pertinent information to aid in decision making, is commonly overlooked. In this article, information literacy is explored along four complementary dimensions: instrumental, conceptual, reflective, and symbolic. Furthermore, the…
Full Text Available The authors analyses the problems of using artificial intelligence to manage complex techno-organizational systems on the basis of the convergence of the telematic, computing and information services in order to manage complex techno-organizational systems in the aerospace industry. This means getting the space objects a higher level of management based on the self-organizing integration principle. Using the artificial intelligence elements allows us to get more optimal and limit values parameters of the ordinal and critical situations in real time. Thus, it helps us to come closer to the limit values parameters of the managed objects due to rising managing and observant possibilities.
aesonnigeria.org ... sources on adoption of animal and crop technologies among farming households in Imo State, Nigeria. Structured ... used to improve the condition of human and natural environment as well as carry out some other socio-economic ...
Geoffrey H. Donovan; David L. Nicholls; Joseph. Roos
Survey data from home shows in Seattle, Washington and Anchorage, Alaska were used to determine the sources of product information used by consumers when buying kitchen cabinets. Results show that in-store sales staff are the most common source of product information, and that consumers' favorite wood species, age, and gender can influence the source of product...
Weld, Daniel S.; Bansal, Gagan
Since Artificial Intelligence (AI) software uses techniques like deep lookahead search and stochastic optimization of huge neural networks to fit mammoth datasets, it often results in complex behavior that is difficult for people to understand. Yet organizations are deploying AI algorithms in many mission-critical settings. In order to trust their behavior, we must make it intelligible --- either by using inherently interpretable models or by developing methods for explaining otherwise overwh...
technical intelli- gence e.g. signals and sensors (SIGINT and MASINT), imagery (!MINT), as well and human and open source intelligence (HUMINT and OSINT ...Clark 2006). The ability to capture large amounts of da- ta and the plenitude of modem intelligence information sources provides a rich cache of...many tech- niques for managing information collected and derived from these sources , the exploitation of intelligence assets for decision-making
Golder, Su; Loke, Yoon K
The aim of this study is to determine the relative value and contribution of searching different sources to identify adverse effects data. The process of updating a systematic review and meta-analysis of thiazolidinedione-related fractures in patients with type 2 diabetes mellitus was used as a case study. For each source searched, a record was made for each relevant reference included in the review noting whether it was retrieved with the search strategy used and whether it was available but not retrieved. The sensitivity, precision, and number needed to read from searching each source and from different combinations of sources were also calculated. There were 58 relevant references which presented sufficient numerical data to be included in a meta-analysis of fractures and bone mineral density. The highest number of relevant references were retrieved from Science Citation Index (SCI) (35), followed by BIOSIS Previews (27) and EMBASE (24). The precision of the searches varied from 0.88% (Scirus) to 41.67% (CENTRAL). With the search strategies used, the minimum combination of sources required to retrieve all the relevant references was; the GlaxoSmithKline (GSK) website, Science Citation Index (SCI), EMBASE, BIOSIS Previews, British Library Direct, Medscape DrugInfo, handsearching and reference checking, AHFS First, and Thomson Reuters Integrity or Conference Papers Index (CPI). In order to identify all the relevant references for this case study a number of different sources needed to be searched. The minimum combination of sources required to identify all the relevant references did not include MEDLINE.
Ariana Anamaria CORDOȘ; Sorana D. BOLBOACĂ; Tudor C. DRUGAN
Introduction: The scope of the research was a more detailed understanding of the influence of social media and the importance of student’s usage of social media context in relation to medical information. The research aimed to increase the understanding of social media and the impact on medical information use, informing policy and practice while highlighting gaps in the literature and areas for further research. Methods: The search of PubMed database was performed in October 2015, using term...
Pedrycz, Witold; Chen, Shyi-Ming
Information granules are conceptual entities that aid the perception of complex phenomena. This book looks at granular computing techniques such as algorithmic pursuits and includes diverse applications and case studies from fields such as power engineering.
National Aeronautics and Space Administration — We propose a system that focuses on how improved information flow between agents acting in a flight deck environment can improve safety performance. Agents are...
National Aeronautics and Space Administration — Our Phase I work focused on how improved information flow between actors in a flight deck environment can improve safety performance. An operational prototype was...
Liapis, A.; Kantorovitch, J.; Malins, J.; Zafeiropoulos, A.; Haesen, M.; Lopez, M.; Funk, M.; Muñoz Alcantara, J.; Moore, J.P.; Maciver, F.
Rapid developments in hardware and software are creating opportunities to enhance the user experience. For example, advances in social analytics can provide near instant feedback. State of the art information extraction tools, filtering, categorization and presentation mechanisms all greatly
... the chaos and leverage that coverage and flow of information. Leveraging the coverage only refers to improving and maintaining the leadership's situational awareness in a volatile, uncertain, complex, and ambiguous (VUCA) world...
Bansal, Aasthaa; Koepl, Lisel M; Fedorenko, Catherine R; Li, Chunyu; Smith, Judith Lee; Hall, Ingrid J; Penson, David F; Ramsey, Scott D
Information sources about prostate cancer treatment and outcomes are typically designed for patients. Little is known about the availability and utility of information for partners. The objectives of our study were to evaluate information sources used by partners to understand prostate cancer management options, their perceived usefulness, and the relationship between sources used and satisfaction with treatment experience. A longitudinal survey of female partners of men newly diagnosed with local-stage prostate cancer was conducted in three different geographic regions. Partners and associated patients were surveyed at baseline (after patient diagnosis but prior to receiving therapy) and at 12 months following diagnosis. Information sources included provider, literature, friends or family members, Internet websites, books, traditional media, and support groups. Utility of an information source was defined as whether the partner would recommend it to caregivers of other patients with local-stage prostate cancer. Our study cohort included 179 partner-patient pairs. At diagnosis, partners consulted an average of 4.6 information sources. Non-Hispanic white partners were more likely than others to use friends and family as an information source (OR = 2.44, 95% CI (1.04, 5.56)). More educated partners were less likely to use support groups (OR = 0.31, 95% CI (0.14, 0.71)). At 12-month follow-up, partners were less likely to recommend books (OR = 0.23, 95% CI (0.11, 0.49)) compared to baseline. Partners consulted a large number of information sources in researching treatment options for local-stage prostate cancer and the types of sources accessed varied by race/ethnicity and educational attainment. Additional resources to promote selection of high-quality non-provider information sources are warranted to enable partners to better aid patients in their treatment decision-making process.
Intelligence sharing between intelligence and police services with a view to preventing and combating terrorism is high on the political agenda in Brussels and The Hague. The Netherlands is one of the few countries in the EU where this topic is subject of political scrutiny. It also led to
Muusses, L.D.; van Weert, J.C.M.; van Dulmen, S; Jansen, extern
Objective Fulfilling patients' information needs can help them cope with illness and improve their well-being. Little research has been conducted on the characteristics of patients using different information sources. This study aims to get insight into which information sources patients receiving
Eversole, Jillian S.; Berglas, Nancy F.; Deardorff, Julianna; Constantine, Norman A.
Adolescence is a common time for sexual initiation and information seeking about sexual health, yet little is known about how adolescents' sources of information about sex influence their sexual beliefs and behaviors. This is particularly true for Latino adolescents, whose sources of sex information and sexual behaviors are vastly understudied. A…
... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Sources of information and relevant data... Sources of information and relevant data. When considering any revision of the lists, the Secretary shall..., administrative reports, maps or other graphic materials, information received from experts on the subject, and...
Chudyk, C.; Müller, H.; Uhler, M.; Würriehausen, F.
Since 2010, the state of Rhineland-Palatinate in Germany has developed a cultural landscape information system as a process to secure and further enrich aggregate data about its cultural assets. In an open dialogue between governing authorities and citizens, the intention of the project is an active cooperation of public and private actors. A cultural landscape information system called KuLIS was designed as a web platform, combining semantic wiki software with a geographic information system. Based on data sets from public administrations, the information about cultural assets can be extended and enhanced by interested participants. The developed infrastructure facilitates local information accumulation through a crowdsourcing approach. This capability offers new possibilities for e-governance and open data developments. The collaborative approach allows governing authorities to manage and supervise official data, while public participation enables affordable information acquisition. Gathered cultural heritage information can provide incentives for touristic valorisation of communities or concepts for strengthening regional identification. It can also influence political decisions in defining significant cultural regions worth of protecting from industrial influences. The presented cultural landscape information allows citizens to influence the statewide development of cultural landscapes in a democratic way.
Rugg, T.J.; Wong, S.C.
The Australian Atomic Energy Commission's INIS database is available for on-line searching by non-AAEC personnel from all parts of Australia. An introduction to the International Nuclear Information System is followed by information on searching AAEC INIS, AAEC INIS retrieval software and accessing AAEC INIS
Daneback, Kristian; Mansson, Sven-Axel; Ross, Michael W.; Markham, Christine M.
To use the Internet for sex educational purposes and for sex information has been recognised by prior research as benefits of the technological development and important areas to investigate, but few empirical studies have so far been conducted. The purpose of this study was to identify those who use the Internet to seek information about sexual…
The Deputy Director CIA manages the CIAP. Funds CIA activities to include HUMINT and OSINT . The CIAP funds everything related to the CIA. It...Human Intelligence (HUMINT); Imagery Intelligence (IMINT); Measurement and Signature Intelligence (MASINT); Open Source Intelligence ( OSINT ); and
Simoes, Claudia; Soares, Ana Maria
Higher education institutions are facing increasingly complex challenges, which demand a deeper understanding of the sources prospective students use when applying to a higher education institution. This research centres on students' decision-making process for higher education institutions, focusing on the pre-purchase period, and, in particular,…
Millar-Schijf, Carla C.J.M.; Choi, C.J.; Russell, E.T.; Kim, J.-B.
Purpose - To reframe analysis of the open source software (OSS) phenomenon from an AQAL perspectiveDesign/methodology/approach - The approach is a review of current research thinking and application of the AQAL framework to suggest resolution of polarizations.Findings - The authors find that AQAL is
Ryan, Edward Francis
Faced with significant budget constraints, state governments and local municipalities have been reducing the financial support they provide to public colleges and universities. To deal with these funding shortfalls, community colleges have begun searching for alternate sources of funding. Rather than raise tuition, which would limit access for…
Sircar, S S
A hypothesis is proposed here to reconcile the inconsistencies observed in the IQ-P3 latency relation. The hypothesis stems from the observation that task-induced increase in P3 latency correlates positively with IQ scores. It is hypothesised that: (a) there are several parallel information processing pathways of varying complexity which are associated with the generation of P3 waves of varying latencies; (b) with increasing workload, there is a shift in the 'information processing level' through progressive recruitment of more complex polysynaptic pathways with greater processing power and inhibition of the oligosynaptic pathways; (c) high-IQ subjects have a greater reserve of higher level processing pathways; (d) a given 'task-load' imposes a greater 'mental workload' in subjects with lower IQ than in those with higher IQ. According to this hypothesis, a meaningful comparison of the P3 correlates of IQ is possible only when the information processing level is pushed to its limits.
Riest, Carina; Jorschick, Annett B; de Ruiter, Jan P
During conversations participants alternate smoothly between speaker and hearer roles with only brief pauses and overlaps. There are two competing types of accounts about how conversationalists accomplish this: (a) the signaling approach and (b) the anticipatory ('projection') approach. We wanted to investigate, first, the relative merits of these two accounts, and second, the relative contribution of semantic and syntactic information to the timing of next turn initiation. We performed three button-press experiments using turn fragments taken from natural conversations to address the following questions: (a) Is turn-taking predominantly based on anticipation or on reaction, and (b) what is the relative contribution of semantic and syntactic information to accurate turn-taking. In our first experiment we gradually manipulated the information available for anticipation of the turn end (providing information about the turn end in advance to completely removing linguistic information). The results of our first experiment show that the distribution of the participants' estimation of turn-endings for natural turns is very similar to the distribution for pure anticipation. We conclude that listeners are indeed able to anticipate a turn-end and that this strategy is predominantly used in turn-taking. In Experiment 2 we collected purely reacted responses. We used the distributions from Experiments 1 and 2 together to estimate a new dependent variable called Reaction Anticipation Proportion. We used this variable in our third experiment where we manipulated the presence vs. absence of semantic and syntactic information by low-pass filtering open-class and closed class words in the turn. The results suggest that for turn-end anticipation, both semantic and syntactic information are needed, but that the semantic information is a more important anticipation cue than syntactic information.
Full Text Available The issues of the influence of the changed conditions for obtaining probably-determined information on the operation of generating equipment and power consumption regimes on the decisions taken to ensure the required level of reservation of the territorial zones of the UES of Russia in the current regulatory environment to the indicators of balance reliability are considered. Comparison of the present conditions for presenting the initial information for the estimation of the balance sheet reliability of electric power systems with the conditions for the development of methodological recommendations (MR for the design of power systems in 2003 and not approved by the Ministry of Energy of Russia MR 2012.
This study discussed theoretical aspects of user modeling, modeling cases of commecial systems and elements that need consideration when constructing user models. The results of this study are 1) Comprehensive and previous analysis of system users is required to bulid user model. 2) User information is collected from users directly and inference. 3) Frame structure is compatible to build user model. 4) Prototype user model is essential to bulid a user model and based on previous user analysis. 5) User model builder has interactive information collection, inference, flexibility, model updating functions. 6) User model builder has to reflect user's feedback
This study discussed theoretical aspects of user modeling, modeling cases of commecial systems and elements that need consideration when constructing user models. The results of this study are 1) Comprehensive and previous analysis of system users is required to bulid user model. 2) User information is collected from users directly and inference. 3) Frame structure is compatible to build user model. 4) Prototype user model is essential to bulid a user model and based on previous user analysis. 5) User model builder has interactive information collection, inference, flexibility, model updating functions. 6) User model builder has to reflect user's feedback.
Shahsavarani, Somayeh Bahar
High-level, top-down information such as linguistic knowledge is a salient cortical resource that influences speech perception under most listening conditions. But, are all listeners able to exploit these resources for speech facilitation to the same extent? It was found that children with cochlear implants showed different patterns of benefit from contextual information in speech perception compared with their normal-haring peers. Previous studies have discussed the role of non-acoustic factors such as linguistic and cognitive capabilities to account for this discrepancy. Given the fact that the amount of acoustic information encoded and processed by auditory nerves of listeners with cochlear implants differs from normal-hearing listeners and even varies across individuals with cochlear implants, it is important to study the interaction of specific acoustic properties of the speech signal with contextual cues. This relationship has been mostly neglected in previous research. In this dissertation, we aimed to explore how different acoustic dimensions interact to affect listeners' abilities to combine top-down information with bottom-up information in speech perception beyond the known effects of linguistic and cognitive capacities shown previously. Specifically, the present study investigated whether there were any distinct context effects based on the resolution of spectral versus slowly-varying temporal information in perception of spectrally impoverished speech. To that end, two experiments were conducted. In both experiments, a noise-vocoded technique was adopted to generate spectrally-degraded speech to approximate acoustic cues delivered to listeners with cochlear implants. The frequency resolution was manipulated by varying the number of frequency channels. The temporal resolution was manipulated by low-pass filtering of amplitude envelope with varying low-pass cutoff frequencies. The stimuli were presented to normal-hearing native speakers of American
Full Text Available Accounting information system is a complex system of registration and processing of goods movement, the reflection of the rights and obligations with economic value; it is necessary and indispensable to the economy. Through its own system of concepts and procedures, accounting is the only discipline that can provide information that form the basis of the assessment of an organization by a wide category of users. Those in need of information for the purpose of making accounting decisions on allocating economic resources efficiently and effectively.
Albert I Matti
Full Text Available Albert I Matti1, Helen McCarl2, Pamela Klaer2, Miriam C Keane1, Celia S Chen11Department of Ophthalmology, Flinders Medical Centre and Flinders University, Bedford Park, SA, Australia; 2The Multiple Sclerosis Society of South Australia and Northern Territory, Klemzig, SA, AustraliaObjective: To investigate the current information sources of patients with multiple sclerosis (MS in the early stages of their disease and to identify patients’ preferred source of information. The relative amounts of information from the different sources were also compared.Methods: Participants at a newly diagnosed information session organized by the Multiple Sclerosis Society of South Australia were invited to complete a questionnaire. Participants were asked to rate on a visual analog scale how much information they had received about MS and optic neuritis from different information sources and how much information they would like to receive from each of the sources.Results: A close to ideal amount of information is being provided by the MS society and MS specialist nurses. There is a clear deficit between what information patients are currently receiving and the amount of information they actually want from various sources. Patients wish to receive significantly more information from treating general practitioners, eye specialists, neurologists, and education sessions. Patients have identified less than adequate information received on optic neuritis from all sources.Conclusion: This study noted a clear information deficit regarding MS from all sources. This information deficit is more pronounced in relation to optic neuritis and needs to be addressed in the future.Practice implications: More patient information and counselling needs to be provided to MS patients even at early stages of their disease, especially in relation to management of disease relapse.Keywords: information sources, information needs, MS patients, optic neuritis
The best for an efficient communication is to stimulate the teachers' demand for information about nuclear energy. CEA, seen as the best information source for teachers, tries to apply this method (books, exhibitions, conferences, workshops). It is necessary to communicate following its legitimacy, to take into account the various sources of information, to communicate to these various sources and finally to help the citizen to detect the exaggerations of all kinds. In brief, inspire confidence
Xie, Bo; Su, Zhaohui; Liu, Yihao; Wang, Mo; Zhang, Ming
Little is known about the information sources of Chinese patients with cancer and their family caregivers, yet this knowledge is critical for providing patient-centred care. To assess and compare the information sources used by Chinese patients with cancer and their family caregivers. The validated Health Information Wants Questionnaire (HIWQ) was translated and administered in March 2014. The oncology department of a general hospital in south-west China. A convenience sample of 198 individuals, including 79 patients with cancer (mean age=55.24, SD=13.80) and 119 family caregivers (mean age=46.83, SD=14.61). Ratings on the HIWQ items assessing information sources for different types of information. The interaction between information source and group was significant (F 3,576 =6.32, Pinformation than patients from the Internet. Caregivers and patients did not differ in the amount of information they obtained from doctors/nurses, interpersonal contacts or mass media. The interaction between information type and information source was significant (F 18,3456 =6.38, Pinformation of all types from doctors/nurses than from the other three sources and obtained more information from interpersonal contacts than from mass media or the Internet. The information sources of Chinese patients with cancer and their family caregivers were similar, with an important difference that caregivers obtained more online information than patients. These findings have important implications for patient care and education in China where the family typically plays a major role in the care and decision making. © 2016 The Authors. Health Expectations Published by John Wiley & Sons Ltd.
problem of balancing the investments of the corporation between several possible assets; buildings, machine tools, training, R&D and "information...and quality of worklife /learning/empowerment. For the moment the driving factor for the DoD has been identified as cost reduction, however it is clear
Hutson, Peter M.
Downsizing information systems from large and centralized mainframe computing architectures to smaller and distributed desktop systems is one of the most difficult and critical strategic decisions facing both corporate and government organizations. Vendor advertisements and media hype often boast of huge cost savings and greater flexibility while retaining mainframe-strength performance. Cryptic terminology, biased vendor assistance, and rapidly changing technology complicate already difficul...
Describes the development and validation of a microcomputer software system that enhances undergraduate students' interests in becoming engineering graduate students. The development of a database with information on engineering graduate programs is discussed, and a model that matches individual and institutional needs using Southwell's Relaxation…
Courtois, Cédric; All, Anissa
This paper presents the results of a study concerning the use of profile pages by adolescents to get to know more about offline friends and acquaintances. Previous research has indicated that social network sites are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online profiles are meaningful in gathering information on these 'offline' friends and acquai...
Courtois, Cédric; All, Anissa; Vanwynsberghe, Hadewijch
This paper presents the results of a study concerning the use of online profile pages by adolescents to know more about “offline” friends and acquaintances. Previous research has indicated that social networking sites (SNSs) are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online connections are meaningful in gathering information on offline friends and...
According to the Hungarian legislation safety assessment is required in the preparation-, establishment-, operational-, closure-licensing phase of repository development and during the operation of the repository the safety assessment should be reviewed and updated regularly. It means that the safety assessment will be made many times during the repository developing process, between two consecutive safety assessments more decades may elapse and between the first and the last safety assessment more than one century will elapse. The assessment of long-term safety is based partly upon geo-scientific information. Will the information originated from many decades or 100 years old research be really used as the basis of the new safety case? Does the geo-scientific information age? Does the confidence in information or quality of information remain on the same level during several decades? If not, what are the causes and consequences of this confidence-level decrease, what can we do to prevent or to postpone this confidence-level decrease? When does an information become too old to use it in a safety assessment? Are each part of the assessment capability touched by the decrease of confidence in the same extent? (authors)
Forrester, Bruce; den Hollander, Kees
Social Media (SM) is a relatively new phenomenon. Intelligence agencies have been struggling to understand how to exploit the social pulse that flows from this source. The paper starts with a brief overview of SM with some examples of how it is being used by adversaries and how we might be able to exploit this usage. Often treated as another form of open source intelligence (OSINT), we look at some of the differences with traditional OSINT compared to SM then outline the possible uses by military intelligence. The next section looks at how SM fits into the different phases of the intelligence cycle: Direction, Collection, Processing and Dissemination. For the first phase, Direction, a number of questions are identified that can be answered typically by SM. For the second phase, the Collection, it is explained how SM, as an asset, transfers questions into methods and the use of different SM resources (e.g. marketer, cognitive behavioral psychologist) and sources to seek the required information. SM is exploited as a multi-intelligence capability. For the Processing phase some aspects are described in how to deal with this capacity (e.g. enabling other intelligence sources) and also which techniques are used to be able to validate the SM sources used.
Davenport, Elisabeth; Cronin, Blaise
Presents an overview of issues concerning civilian competitive intelligence (CI). Topics discussed include competitive advantage in academic and research environments; public domain information and libraries; covert and overt competitive intelligence; data diversity; use of the Internet; cooperative intelligence; and implications for library and…
Artificial Intelligence (AI) has been mainly studied within the realm of computer based technologies. Various computational models and knowledge based systems have been developed for automated reasoning, learning, and problem-solving. However, there still exist several grand challenges. The AI research has not produced major breakthrough recently due to a lack of understanding of human brains and natural intelligence. In addition, most of the AI models and systems will not work well when dealing with large-scale, dynamically changing, open and distributed information sources at a Web scale.
healthcare system, and also to other SMs and Veterans by way of a variety of social networking tools (e.g., 2nd Life, Facebook, etc.). The user can progress... CyberPsychology and Behavior 8, 3 (2005), 187-211.  T. Parsons & A.A. Rizzo, Affective Outcomes of Virtual Reality Exposure Therapy for Anxiety...VH System for Providing Healthcare Information and Support508  G. Riva, Virtual Reality in Psychotherapy: Review, CyberPsychology and Behavior 8
Among its many activities to improve the safety and security of sealed sources, the IAEA has been investigating the root causes of major accidents and incidents since the 1980's and publishes findings so that others can learn from them. There are growing concerns today about the possibility that an improperly stored source could be stolen and used for malicious purposes. To improve both safety and security, information needs to be in the hands of those whose actions and decisions can prevent a source from being lost or stolen in the first place. The IAEA developed this booklet to help improve communication with key groups about hazards that may result from the loss of control over sealed radioactive sources and measures that should be implemented to prevent such loss of control. Many people may benefit from the information contained in this booklet, particularly those working with sources and those likely to be involved if control over a source is lost; especially: officials in government agencies, first responders, medical users, industrial users and the metal recycling industry. The general public may also benefit from an understanding of the fundamentals of radiation safety. This booklet is comprised of several stand-alone chapters intended to communicate with these key groups. Various accidents that are described and information that is provided are relevant to more than one key group and therefore, some information is repeated throughout the booklet. This booklet seeks to raise awareness of the importance of the safety and security of sealed radioactive sources. However, it is not intended to be a comprehensive 'how to' guide for implementing safety and security measures for sealed radioactive sources. For more information on these measures, readers are encouraged to consult the key IAEA safety and security-related publications identified in this booklet
Syn, Sue Yeon; Kim, Sung Un
College students tend to lack access to health information. Because social networking sites (SNSs) are popularly adopted by college students, SNSs are considered to be good media channels for college students to obtain health-related information. This study examines the factors that influence college students' health information-seeking and -sharing activities on Facebook. An online survey was distributed to college students between the ages of 18 and 29 to determine intentions pertaining to health information activities according to the factors identified for the study. The factors included both contextual factors (such as health topic sensitivity and health information sources) as well as user factors (such as demographics). Our findings showed that college students are willing to read and post health-related information on Facebook when the health topic is not sensitive. In addition, there are clear differences in preferences between professional sources and personal sources as health information sources. It was found that most user factors, except gender, have no influence on health information activities. The impacts of SNS contexts, awareness of information sources, types of interlocutors, and privacy concerns are further discussed.
A model of strategic intelligence of industrial property information and in the field of clean energy; Un modelo de inteligencia estrategica de la informacion y propiedad industrial en el campo de las energias limpias
Fuente O' Conor, J. L. de la
In this article, the model Intelligence Cell, as an Internet based strategic intelligence element for the management of interim key information of a company, is presented. The model has been profusely tested for technology watch, economic intelligence, and competitive intelligence related purposes within a general framework of technology deployment in a clean and renewable focused innovation department. As a practical example, is proposed, step by step, how to launch a fully operative specialized cell for analyzing how to deal with electric mobility, battery technologies and electric car issues so that challenges, opportunities, and threats can be tracked and anticipated so that a business strategy might be established. (Author) 8 refs.
Open Access DOWNLOAD FULL TEXT ... Introduction: The internet is a useful tool which could provide quality drug information if well applied. Its utilization as a source of drug information by junior doctors in Nigeria is not well documented.
Lu, Huimin; Li, Yujie; Chen, Min; Kim, Hyoungseop; Serikawa, Seiichi
Artificial intelligence (AI) is an important technology that supports daily social life and economic activities. It contributes greatly to the sustainable growth of Japan's economy and solves various social problems. In recent years, AI has attracted attention as a key for growth in developed countries such as Europe and the United States and developing countries such as China and India. The attention has been focused mainly on developing new artificial intelligence information communication ...