13,113 research outputs found

    Accurate user directed summarization from existing tools

    Get PDF
    This paper describes a set of experimental results produced from the TIPSTER SUMMAC initiative on user directed summaries: document summaries generated in the context of an information need expressed as a query. The summarizer that was evaluated was based on a set of existing statistical techniques that had been applied successfully to the INQUERY retrieval system. The techniques proved to have a wider utility, however, as the summarizer was one of the better performing systems in the SUMMAC evaluation. The design of this summarizer is presented with a range of evaluations: both those provided by SUMMAC as well as a set of preliminary, more informal, evaluations that examined additional aspects of the summaries. Amongst other conclusions, the results reveal that users can judge the relevance of documents from their summary almost as accurately as if they had had access to the document’s full text

    THE ECONOMICS OF CLEANING WINTER WHEAT FOR EXPORT: AN EVALUATION OF PROPOSED FEDERAL "CLEAN GRAIN" STANDARDS

    Get PDF
    Buyer complaints about poor quality U.S. wheat have led to proposals to enforce minimum dockage standards for exports. An economic-engineering approach is used to evaluate costs and benefits of cleaning wheat in order to meet these standards for 13 possible cleaning configurations. These results are used in an optimization framework to estimate costs and benefits of cleaning all U.S. export wheat. The estimates indicate that cleaning U.S. export winter wheat to .35% dockage would cost an average of 1 cent/bu., requiring an initial capital investment of $28 million. Value of wheat lost in cleaning is a significant cost that previously has been overlooked.Agricultural and Food Policy,

    Autonomic care platform for optimizing query performance

    Get PDF
    Background: As the amount of information in electronic health care systems increases, data operations get more complicated and time-consuming. Intensive Care platforms require a timely processing of data retrievals to guarantee the continuous display of recent data of patients. Physicians and nurses rely on this data for their decision making. Manual optimization of query executions has become difficult to handle due to the increased amount of queries across multiple sources. Hence, a more automated management is necessary to increase the performance of database queries. The autonomic computing paradigm promises an approach in which the system adapts itself and acts as self-managing entity, thereby limiting human interventions and taking actions. Despite the usage of autonomic control loops in network and software systems, this approach has not been applied so far for health information systems. Methods: We extend the COSARA architecture, an infection surveillance and antibiotic management service platform for the Intensive Care Unit (ICU), with self-managed components to increase the performance of data retrievals. We used real-life ICU COSARA queries to analyse slow performance and measure the impact of optimizations. Each day more than 2 million COSARA queries are executed. Three control loops, which monitor the executions and take action, have been proposed: reactive, deliberative and reflective control loops. We focus on improvements of the execution time of microbiology queries directly related to the visual displays of patients' data on the bedside screens. Results: The results show that autonomic control loops are beneficial for the optimizations in the data executions in the ICU. The application of reactive control loop results in a reduction of 8.61% of the average execution time of microbiology results. The combined application of the reactive and deliberative control loop results in an average query time reduction of 10.92% and the combination of reactive, deliberative and reflective control loops provides a reduction of 13.04%. Conclusions: We found that by controlled reduction of queries' executions the performance for the end-user can be improved. The implementation of autonomic control loops in an existing health platform, COSARA, has a positive effect on the timely data visualization for the physician and nurse

    What do we need to add to a social network to get a society? answer: something like what we have to add to a spatial network to get a city

    Get PDF
    Recent years have seen great advances in social network analysis. Yet, with a few exceptions, the field of network analysis remains remote from social theory. As a result, much social network research, while technically accomplished and theoretically suggestive, is essentially descriptive. How then can social networks be linked to social theory ? Here we pose the question in its simplest form: what must we add to a social network to get a society ? We begin by showing that one reason for the disconnection between network theory and society theory is that because it exists in spacetime, the concept of social network raises the issue of space in a way that is problematical for social theory. Here we turn the problem on its head and make the problem of space in social network theory explicit by proposing a surprising analogy with the question: what do you have to add to an urban space network to get a city. We show first that by treating a city as a naĂŻve spatial network in the first instance and allowing it to acquire two formal properties we call reflexivity and nonlocality, both mediated through a mechanism we call description retrieval, we can build a picture of the dynamics processes by which collections of the buildings become living cities. We then show that by describing societies initially as social networks in space-time and adding similar properties, we can construct a plausible ontology of a simple human society

    The simplicity project: easing the burden of using complex and heterogeneous ICT devices and services

    Get PDF
    As of today, to exploit the variety of different "services", users need to configure each of their devices by using different procedures and need to explicitly select among heterogeneous access technologies and protocols. In addition to that, users are authenticated and charged by different means. The lack of implicit human computer interaction, context-awareness and standardisation places an enormous burden of complexity on the shoulders of the final users. The IST-Simplicity project aims at leveraging such problems by: i) automatically creating and customizing a user communication space; ii) adapting services to user terminal characteristics and to users preferences; iii) orchestrating network capabilities. The aim of this paper is to present the technical framework of the IST-Simplicity project. This paper is a thorough analysis and qualitative evaluation of the different technologies, standards and works presented in the literature related to the Simplicity system to be developed

    "The Economics of Outsourcing: How Should Policy Respond?"

    Get PDF
    According to Research Associate Thomas A. Palley, global outsourcing represents a new economic challenge that calls for a new set of institutions. In this brief, he expands upon the problems of offshore outsourcing as outlined in Public Policy Brief no. 86 and focuses on the microeconomic foundations. He argues that outsourcing is a central element of globalization that is best understood as a new form of competition. Palley urges policymakers to understand the economic basis of outsourcing in order to develop effective policies, and suggests that they focus on enhancing national competitiveness and establishing new rules that govern the nature of global competition.

    Web Vulnerability Study of Online Pharmacy Sites

    Get PDF
    Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems
    • 

    corecore