40,995 research outputs found

    An Analysis of Using Expert Systems and Intelligent Agents for the Virtual Library Project at the Naval Surface Warfare Center-Carderock Division

    Get PDF
    The Virtual Library Project1 at the Naval Surface Warfare Center/Carderock Division (NSWC/CD) is being developed to facilitate the incorporation and use of library documents via the Internet. These documents typically relate to the design and manufacture of ships for the U.S. Navy Fleet. As such, the libraries will store documents that contain not only text but also images, graphs and design configurations. Because of the dynamic nature of digital documents, particularly those related to design, rapid and effective cataloging of these documents becomes challenging. We conducted a research study to analyze the use of expert systems and intelligent agents to support the function of cataloging digital documents. This chapter provides an overview of past research in the use of expert systems and intelligent agents for cataloging digital documents and discusses our recommendations based on NSWC/CD’s requirements

    Citing/Referencing

    Get PDF
    As rightly pointed out earlier, research ethics advises authors to avoid plagiarism. Citing the used references in scientific works is the best way of preventing plagiarism. There are some guidelines on the internet that helps authors to observe ethical writing tips. We cite others' works in many different ways. Firstly, we should know that what is the difference between a reference and citation and why we cite

    Meeting of the MINDS: an information retrieval research agenda

    Get PDF
    Since its inception in the late 1950s, the field of Information Retrieval (IR) has developed tools that help people find, organize, and analyze information. The key early influences on the field are well-known. Among them are H. P. Luhn's pioneering work, the development of the vector space retrieval model by Salton and his students, Cleverdon's development of the Cranfield experimental methodology, Spärck Jones' development of idf, and a series of probabilistic retrieval models by Robertson and Croft. Until the development of the WorldWideWeb (Web), IR was of greatest interest to professional information analysts such as librarians, intelligence analysts, the legal community, and the pharmaceutical industry

    An evalution of the use subject based information gateways: case Study ADAM

    Get PDF
    Nowadays, end-users have quick and direct access to a massive amount of information available on the net. However, this information is unorganised expecting users to be able to identify and evaluate it in accordance with their information needs. Subject Based Information Gateways (SBIGs), organised collections of networked information, provide users with a catalogue of authoritative Internet resources, which can be searched or/and browsed. This paper provides an evaluation of one such gateway - the Art, Design, Architecture & Media Gateway (ADAM). It provides information on who these digital users are, how often they use the service, what their reasons for use are, which search methods and services provided they prefer, and what are the advantages and/or disadvantages of an online information service

    Combined Log System

    Get PDF
    Busy Internet archives generate large logs for each access method being used. These raw log files can be difficult to process and to search. This paper describes a system for reading these growing logs, a combined log file format into which they are re-written and a system that automates this building and integration for multiple access methods. Automated summarizing of the information is also provided giving statistics on accesses by user, site, path-name and date/time amongst others

    Natural language processing

    Get PDF
    Beginning with the basic issues of NLP, this chapter aims to chart the major research activities in this area since the last ARIST Chapter in 1996 (Haas, 1996), including: (i) natural language text processing systems - text summarization, information extraction, information retrieval, etc., including domain-specific applications; (ii) natural language interfaces; (iii) NLP in the context of www and digital libraries ; and (iv) evaluation of NLP systems

    Log in to Danger Zone: Data Privacy Under The SCA and Microsoft

    Get PDF
    corecore