Search Constraints
Number of results to display per page
Results for:
Search Results
-
Presentation
This video was recorded at 11th International Semantic Web Conference (ISWC), Boston 2012. The New York Times committment to Linked Data began over 160 years ago. Starting in 1851, The New York Times has always catalogued its archival articles using a controlled vocabulary of people, places, organizations and descriptors. In 2009 The New York Times started publishing this vocabulary as linked data using semantic web standards. In 2011 The Times announced the launch of several RESTful Semantic APIs. And in late 2012 and early 2013, The Times will migrate its entire process for vocabulary management to a system designed around the principles of Linked Data. In my remarks, I will survey the history of Semantic publishing at The New York Times, outline our semantic strategy, detail the business-case for linked data at The Times and provide an in-depth explanation of our new vocabulary management system.
- Subjects:
- Management and Computing
- Keywords:
- Linked data New York times
- Resource Type:
- Presentation
-
Presentation
This video was recorded at 5th International Semantic Web Conference (ISWC), Athens 2006. We examine research issues that arise when most information items in an enterprise can be linked to each other via short paths, implicit or explicit. In such high-recall settings, the treatment of metadata management, indexing and ranking needs new attention. Additional issues arise as to the best way to handle updates to the connections, whether on or off the transaction path. Even traditional techniques, such as classification and clustering of documents, which stand to benefit from the extra information provided by the so-called network of meaning, need to be reexamined for how best to exploit the extra information. The talk ends with an examination of some promising avenues for using high recall as a driver for the next wave of business process automation
- Subjects:
- Management and Computing
- Keywords:
- Information resources management Management information systems
- Resource Type:
- Presentation
-
Presentation
This video was recorded at Workshop on Advanced IT Solutions and Competitiveness of SMEs, Lviv 2006. It is generally recognized that the competitiveness of SMEs in the present-day business environment ultimately relies upon effective implementation of the most up-to-date information technologies. However, the Ukrainian IT space is characterized with highly noticeable information gap between IT-saturated export-oriented software development companies and ordinary businesses or governmental agencies. The seminar has provided perfect platform for the interaction between local SMEs, communicating their IT needs, and IT service providers like Intellias, briefing on their enterprise-based IT offerings. The seminar has assembled insightful speakers from Ukrainian and international IT companies, as well as representatives from research institutions, consulting firms and IT experienced SMEs. The case studies from Western Ukrainian companies, possessing experience in implementation of IT solutions in industrial process, have illustrated emerging difficulties in aligning IT automated process with qualifications and professional level of the involved personnel. The practical aspects of introducing ERP systems for optimization of production process have been presented by Vitaly Pyasetsky (Lvivkholod public corporation) and Andriy Tsehelyk (Enzyme joint-stock company). The discussion has further focused on the international experience of the implementation of the information technologies as well as networking and partnership practices. Valuable contributions to the topic has been made by Maria-Luisa Sanseverino E4 Project Coordinator from Centro Ricerche Fiat and Patric Sitek from Bremen Institute of Industrial Technology and Applied Work Science. Particular emphasis has been placed on the E4 Project: Extended Enterprise Management in Enlarged Europe including collaboration initiatives and close involvement of the Eastern European enterprises within its framework. The discussion has been reinforced by the case study on Ivano Frankivsk business portal, assembling best practices from abroad business development agencies.
- Subjects:
- Management and Computing
- Keywords:
- Enterprise resource planning Small business Ukraine Management information systems
- Resource Type:
- Presentation
-
Presentation
This video was recorded at CeGD eGovernance Academy Seminar Series (SEeHealth): The Roadmap from Concept to Practice, Ljubljana 2010. The key of mutual integration of health care institutions lies in their interoperability, gathering and common utilization of data by different applications. Seemingly, imperceptible and smooth applications' integration enables an efficient mutual linkage of all departments within a single health care institution as well as horizontal and vertical linkage of more health care institutions, all with the aim of improvement of health and quality of patient's life. Health care system quality improvement needs a continuous rationalization of resources funds, which leads towards optimization of business processes and availability of all necessary information in the shortest possible period. All necessary information and data on patients must be available independently on location or time of such a necessity. The greatest obstacles for interoperability represent heterogeneous applications. Such heterogeneity can be presented by the fact that they were written in various program languages, that they are intended for utilization at different types of computers or the fact that they use various communication networks and data transfer methods. IT managers in hospitals must decide how to contribute to cross‐organizational integration and what strategy and means to choose for achieving interoperability. If a system is poor in its interoperability, any increasing functions or little changes could stop its working properly. Interoperability must be ensured at technical, semantic and process levels but also in a legislative level, where all recommendations for legal and lawful solutions are given, which remove the most frequent obstacles – human and bureaucratic factors. The Oncology Institute of Vojvodina as a referent center for oncology and a center for medical informatics signed its own Integrated hospital and business information system. The information system at the IOV consists of the following modules: 1. hospital‐clinical IS 2. laboratory IS 3. pharmaceutical IS 4. radiological IS 5. invoicing (accounting) IS 6. business IS 7. managerial IS All of these modules are mutually optimally integrated, and their interoperability at the level of communicational protocols (HL7, DICOM, internal interface), semantics (the same code‐records, rules) and legislative level (the same accounting calculations) enables the user to see all these complex modules as one system. Thus, we created necessary preconditions for our integration into information society, which is a 21st century strategy at the state level.
- Subjects:
- Health Sciences, Management, and Computing
- Keywords:
- Health services administration -- Data processing Management information systems Health services administration -- Computer networks
- Resource Type:
- Presentation
-
Courseware
Students of this course will develop a broad understanding of Lean/Six Sigma principles and practices, build capability to implement Lean/Six Sigma initiatives in manufacturing operations, and learn to operate with awareness of Lean/Six Sigma at the enterprise level. All course materials are organized around a common "single-point lesson" (SPL) format, with some of the SPLs provided by the instructor and guests and with some developed and delivered by student teams.
- Subjects:
- Management and Computing
- Keywords:
- Quality control Six sigma (Quality control stard)
- Resource Type:
- Courseware
-
e-book
The purpose of this book is to provide an up-to-date and systematical introduction to the principles and algorithms of machine learning. The definition of learning is broad enough to include most tasks that we commonly call “learning” tasks, as we use the word in daily life. It is also broad enough to encompass computers that improve from experience in quite straightforward ways. The book will be of interest to industrial engineers and scientists as well as academics who wish to pursue machine learning. The book is intended for both graduate and postgraduate students in fields such as computer science, cybernetics, system sciences, engineering, statistics, and social sciences, and as a reference for software professionals and practitioners. The wide scope of the book provides a good introduction to many approaches of machine learning, and it is also the source of useful bibliographical information.
- Course related:
- COMP4432 Machine Learning
- Subjects:
- Computing
- Keywords:
- Machine learning
- Resource Type:
- e-book
-
e-book
Evolutionary algorithms are successively applied to wide optimization problems in the engineering, marketing, operations research, and social science, such as include scheduling, genetics, material selection, structural design and so on. Apart from mathematical optimization problems, evolutionary algorithms have also been used as an experimental framework within biological evolution and natural selection in the field of artificial life.
- Subjects:
- Computing
- Keywords:
- Mathematical optimization Genetic algorithms Evolutionary programming (Computer science)
- Resource Type:
- e-book
-
e-book
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities.
- Subjects:
- Computing
- Keywords:
- Data protection Computer security Computer networks -- Security measures Data encryption (Computer science)
- Resource Type:
- e-book
-
e-book
Pattern recognition has gained significant attention due to the rapid explosion of internet- and mobile-based applications. Among the various pattern recognition applications, face recognition is always being the center of attraction. With so much of unlabeled face images being captured and made available on internet (particularly on social media), conventional supervised means of classifying face images become challenging. This clearly warrants for semi-supervised classification and subspace projection. Another important concern in face recognition system is the proper and stringent evaluation of its capability. This book is edited keeping all these factors in mind. This book is composed of five chapters covering introduction, overview, semi-supervised classification, subspace projection, and evaluation techniques.
- Subjects:
- Electronic and Information Engineering and Computing
- Keywords:
- Human face recognition (Computer science)
- Resource Type:
- e-book
-
Courseware
This course examines human-computer interaction in the context of graphical user interfaces. The course covers human capabilities, design principles, prototyping techniques, evaluation techniques, and the implementation of graphical user interfaces. Deliverables include short programming assignments and a semester-long group project. Students taking the graduate version also have readings from current literature and additional assignments.
- Subjects:
- Computing
- Keywords:
- Human-computer interaction User interfaces (Computer systems)
- Resource Type:
- Courseware