46,438 research outputs found
SemEval 2017 Task 10: ScienceIE - Extracting Keyphrases and Relations from Scientific Publications
We describe the SemEval task of extracting keyphrases and relations between
them from scientific documents, which is crucial for understanding which
publications describe which processes, tasks and materials. Although this was a
new task, we had a total of 26 submissions across 3 evaluation scenarios. We
expect the task and the findings reported in this paper to be relevant for
researchers working on understanding scientific content, as well as the broader
knowledge base population and information extraction communities
Security in online learning assessment towards an effective trustworthiness approach to support e-learning teams
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.This paper proposes a trustworthiness model for the design of secure learning assessment in on-line collaborative learning groups. Although computer supported collaborative learning has been widely adopted in many educational institutions over the last decade, there exist still drawbacks which limit their potential in collaborative learning activities. Among these limitations, we investigate information security requirements in on-line assessment, (e-assessment), which can be developed in collaborative learning contexts. Despite information security enhancements have been developed in recent years, to the best of our knowledge, integrated and holistic security models have not been completely carried out yet. Even when security advanced methodologies and technologies are deployed in Learning Management Systems, too many types of vulnerabilities still remain opened and unsolved. Therefore, new models such as trustworthiness approaches can overcome these lacks and support e-assessment requirements for e-Learning. To this end, a trustworthiness model is designed in order to conduct the guidelines of a holistic security model for on-line collaborative learning through effective trustworthiness approaches. In addition, since users' trustworthiness analysis involves large amounts of ill-structured data, a parallel processing paradigm is proposed to build relevant information modeling trustworthiness levels for e-Learning.Peer ReviewedPostprint (author's final draft
Solar Decathlon Latin America and Caribbean: Comfort and the Balance between Passive and Active Design
This article contains an overall analysis of the results obtained by the four highest scoring
teams in the Solar Decathlon Latin America and Caribbean 2015 collegiate sustainable habitat
competition. Considering that the prototypes developed were based on energy self-su ciency when
operational, it was considered necessary to propose this analysis based on the degree of suitability of
each of these models based on their di erent performances from the perspective of comfort conditions.
It was observed that the design of the prototypes did not manage to properly adjust the relationship
between passive and active conditioning elements based on the location’s conditions. Accordingly,
this article concludes that a balance of the two aforementioned conditioning modes recorded better
results based on the measurements taken
Data Mining to Support Engineering Design Decision
The design and maintenance of an aero-engine generates a significant amount of documentation. When designing new engines, engineers must obtain knowledge gained from maintenance of existing engines to identify possible areas of concern. Firstly, this paper investigate the use of advanced business intelligence tenchniques to solve the problem of knowledge transfer from maintenance to design of aeroengines. Based on data availability and quality, various models were deployed. An association model was used to uncover hidden trends among parts involved in maintenance events. Classification techniques comprising of various algorithms was employed to determine severity of events. Causes of high severity events that lead to major financial loss was traced with the help of summarization techniques. Secondly this paper compares and evaluates the business intelligence approach to solve the problem of knowledge transfer with solutions available from the Semantic Web. The results obtained provide a compelling need to have data mining support on RDF/OWL-based warehoused data
Protocols for Scholarly Communication
CERN, the European Organization for Nuclear Research, has operated an
institutional preprint repository for more than 10 years. The repository
contains over 850,000 records of which more than 450,000 are full-text OA
preprints, mostly in the field of particle physics, and it is integrated with
the library's holdings of books, conference proceedings, journals and other
grey literature. In order to encourage effective propagation and open access to
scholarly material, CERN is implementing a range of innovative library services
into its document repository: automatic keywording, reference extraction,
collaborative management tools and bibliometric tools. Some of these services,
such as user reviewing and automatic metadata extraction, could make up an
interesting testbed for future publishing solutions and certainly provide an
exciting environment for e-science possibilities. The future protocol for
scientific communication should naturally guide authors towards OA publication
and CERN wants to help reach a full open access publishing environment for the
particle physics community and the related sciences in the next few years.Comment: 8 pages, to appear in Library and Information Systems in Astronomy
Recommended from our members
Exploiting tacit knowledge through knowledge management technologies
The purpose of this paper is to examine the contributions and suitability of the available knowledge management (KM) technologies, including the Web 2.0 for exploiting tacit knowledge. It proposes an integrated framework for extracting tacit knowledge in organisations, which includes Web 2.0 technologies, KM tools, organisational learning (OL) and Community of Practice (CoP). It reviews a comprehensive literature covering overview of KM theories, KM technologies and OL and identifies the current state of knowledge relating to tacit knowledge exploitation. The outcomes of the paper indicate that Internet and Web 2.0 technologies have stunning prospects for creating learning communities where tacit knowledge can be extracted from people. The author recommends that organisations should design procedures and embed them in their Web 2.0 collaborative platforms persuading employees to record their ideas and share them with other members. It is also recommended that no idea should be taken for granted in a learning community where tacit knowledge exploitation is pursued. It is envisaged that future research should adopt empirical approach involving Complex Adaptive Model for Tacit Knowledge Exploitation (CAMTaKE) and the Theory of Deferred Action in examining the effectiveness of KM technologies including Web 2.0 tools for tacit knowledge exploitation
- …