1,334,770 research outputs found
An operational system for subject switching between controlled vocabularies
The NASA system of automatically converting sets of terms assigned by Department of Defense indexers to sets of NASA's authorized terms is described. This little-touted system, which has been operating successfully since 1983, matches concepts, rather than words. Subject Switching uses a translation table, known as the Lexical Dictionary, accessed by a program that determines which rules to follow in making the transition from DTIC's to NASA's authorized terms. The authors describe the four phases of development of Subject Switching, changes that have been made, evaluating the system, and benefits. Benefits to NASA include saving indexers' time, the addition of access points for documents indexed, the utilization of other government indexing, and a contribution towards the now-operational NASA, online, interactive, machine aided indexing
Recommended from our members
Disambiguating the Departed: Using the Genealogist’s Tools to Uniquely Identify the Long-Dead and Little-Known
The need to uniquely identify persons with the same name will be just as important in a linked data environment as it is in traditional library catalogs. Although older cataloging rules allowed multiple identities to share space in an authority record, the current rules are more stringent, requiring that all authorized access points for persons be disambiguated. While this task has been made much easier in recent years because of the amount of biographical material on the Web, deceased and obscure persons can pose a complex challenge. This is especially true for special collections materials, which are being given greater attention but which often deal with people who are long-dead and little-known. This article builds on previous research on the use of online resources to perform authority work by providing an in-depth analysis of the genealogist’s toolkit and examining how freely available online genealogical sources can be used to find the types of distinctive information needed to create unique access points for persons
Recommended from our members
The Workforce Innovation and Opportunity Act and the One-Stop Delivery System
[Excerpt] The Workforce Innovation and Opportunity Act (WIOA; P.L. 113-128), which succeeded the Workforce Investment Act of 1998 (P.L. 105-220) as the primary federal workforce development legislation, was enacted in July 2014 to bring about increased coordination among federal workforce development and related programs. Most of WIOA’s provisions went into effect July 1, 2015. WIOA authorizes appropriations for each of FY2015 through FY2020 to carry out the programs and activities authorized in the legislation.
Workforce development programs provide a combination of education and training services to prepare individuals for work and to help them improve their prospects in the labor market. They may include activities such as job search assistance, career counseling, occupational skill training, classroom training, or on-the-job training. The federal government provides workforce development activities through WIOA’s programs and other programs designed to increase the employment and earnings of workers.
WIOA includes five titles: Workforce Development Activities (Title I), Adult Education and Literacy (Title II), Amendments to the Wagner-Peyser Act (Title III), Amendments to the Rehabilitation Act of 1973 (Title IV), and General Provisions (Title V). Title I, whose programs are primarily administered through the Employment and Training Administration (ETA) of the U.S. Department of Labor (DOL), includes three state formula grant programs, multiple national programs, and Job Corps. Title II, whose programs are administered by the U.S. Department of Education (ED), includes a state formula grant program and National Leadership activities. Title III amends the Wagner-Peyser Act of 1933, which authorizes the Employment Service (ES). Title IV amends the Rehabilitation Act of 1973, which authorizes vocational rehabilitation services to individuals with disabilities. Title V includes provisions for the administration of WIOA.
The WIOA system provides central points of service via its system of around 3,000 One-Stop centers nationwide, through which state and local WIOA employment and training activities are provided and certain partner programs must be coordinated. This system is supposed to provide employment and training services that are responsive to the demands of local area employers. Administration of the One-Stop system occurs through Workforce Development Boards (WDBs), a majority of whose members must be representatives of business and which are authorized to determine the mix of service provision, eligible providers, and types of training programs, among other decisions. WIOA provides universal access (i.e., an adult age 18 or older does not need to meet any qualifying characteristics) to its career services, including a priority of service for low- income adults. WIOA also requires Unified State Plans (USPs) that outline the workforce strategies for the six core WIOA programs—adult, dislocated worker, and youth programs (Title I of WIOA), the Adult Education and Family Literacy Act (AEFLA; Title II of WIOA), the Employment Service program (amended by Title III of WIOA), and the Vocational Rehabilitation State Grant Program (amended by Title IV of WIOA). Finally, WIOA adopts the same six “primary indicators of performance” across most of the programs authorized in the law.
This report provides details of WIOA Title I state formula program structure, services, allotment formulas, and performance accountability. In addition, it provides a program overview for national grant programs. It also offers a brief overview of the Employment Service (ES), which is authorized by separate legislation but is an integral part of the One-Stop system created by WIOA
WLAN Location Sharing through a Privacy Observant Architecture
In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links. Furthermore, the infrastructure already exists in most public places and is cheap to extend. These advantages, together with the fact that WLAN covers a large area and is not restricted to line of sight, have led to developing many WLAN localization techniques and applications based on them. In this paper we present a novel calibration-free localization technique using the existing WLAN infrastructure that enables conference participants to determine their location without the need of a centralized system. The evaluation results illustrate the superiority of our technique compared to existing methods. In addition, we present a privacy observant architecture to share location information. We handle both the location of people and the resources in the infrastructure as services, which can be easily discovered and used. An important design issue for us was to avoid tracking people and giving the users control over who they share their location information with and under which conditions
On Lossless Coding With Coded Side Information
This paper considers the problem, first introduced by Ahlswede and Korner in 1975, of lossless source coding with coded side information. Specifically, let X and Y be two random variables such that X is desired losslessly at the decoder while Y serves as side information. The random variables are encoded independently, and both descriptions are used by the decoder to reconstruct X. Ahlswede and Korner describe the achievable rate region in terms of an auxiliary random variable. This paper gives a partial solution for an optimal auxiliary random variable, thereby describing part of the rate region explicitly in terms of the distribution of X and Y
Designing privacy for scalable electronic healthcare linkage
A unified electronic health record (EHR) has potentially immeasurable benefits to society, and the current healthcare industry drive to create a single EHR reflects this. However, adoption is slow due to two major factors: the disparate nature of data and storage facilities of current healthcare systems and the security ramifications of accessing and using that data and concerns about potential misuse of that data. To attempt to address these issues this paper presents the VANGUARD (Virtual ANonymisation Grid for Unified Access of Remote Data) system which supports adaptive security-oriented linkage of disparate clinical data-sets to support a variety of virtual EHRs avoiding the need for a single schematic standard and natural concerns of data owners and other stakeholders on data access and usage. VANGUARD has been designed explicit with security in mind and supports clear delineation of roles for data linkage and usage
- …
