Multi-Perspective Information Projection: Structuring Hypermedia Information in Engineering Development Projects

Author(s):  
Srikanth Kannapan ◽  
Dean Taylor

Abstract Distributed enterprises are now collaborating closely with their suppliers and partners worldwide while continuously improving their response time to global markets. Such distributed enterprises demand greater levels of support for information sharing and collaborative workspaces among engineering development teams. While the use of Intranets for gathering and sharing information is expanding, the organization of the shared information is usually ad-hoc and is not designed to efficiently serve the diverse information needs of work-groups. Such ad-hoc organizations of information result information overload and hence information users have to resort to (syntactic) keyword search to access information. This paper proposes an Information Projection methodology that integrates the organization of the semantic content of shared information with the organization of syntactic content of documents in a way that is meaningful to specific work-groups so as to reduce information overload. The Information Projection methodology has been applied in three different engineering contexts to varied degrees of sophistication and has shown a significant degree of re-usability, although the information and document models that result are themselves very context specific. The information maps resulting from the context of a MEMS technology development project have also been implemented using basic Web technology (HTML, CGI scripts) and has provided several insights on the implications and limitations of such implementations.

Author(s):  
Robert Heckman ◽  
Dave Maswick ◽  
Jamie Rodgers ◽  
Kevin Ruthen ◽  
Gary Wee

In both corporate and academic organizations, collaborative work is frequently accomplished and managed in small work groups. These can take either the form of formal work groups or ad hoc task groups. The formal work group has relatively permanent membership, ongoing tasks, and routinized reporting relationships within the organization. Over time, skills and information of group members become more group-specific and norms more implicit. There is less communication on how to work together and more on the work itself (Finholt, Sproull, and Kiesler, 1990). Some types of work are, however, best performed in ad hoc or quickly formed task groups. According to Finholt, Sproull, and Kiesler (1990), such groups are convened for a particular purpose, consist of members who otherwise would not work together, and disband after completing their assigned task. These task groups permit an organization to respond rapidly to changes in the environment and to non-routine problems by calling on expertise regardless of where it resides in the organization. In higher education, a particular form of ad hoc task group is familiar to many instructors—the student project team. Such teams are commonly formed to allow students to tackle projects that are too big to handle individually, to allow students to teach and learn from one another, and to create opportunities for practicing the intricate dynamics of collaborative work. Given the benefits claimed for ad hoc task groups, it is presumed to be a good thing for students to gain hands-on experience in their function.


2019 ◽  
Vol 53 (1) ◽  
pp. 44-45
Author(s):  
Daniel Valcarce

Information retrieval addresses the information needs of users by delivering relevant pieces of information but requires users to convey their information needs explicitly. In contrast, recommender systems offer personalized suggestions of items automatically. Ultimately, both fields help users cope with information overload by providing them with relevant items of information. This thesis aims to explore the connections between information retrieval and recommender systems. Our objective is to devise recommendation models inspired in information retrieval techniques. We begin by borrowing ideas from the information retrieval evaluation literature to analyze evaluation metrics in recommender systems [2]. Second, we study the applicability of pseudo-relevance feedback models to different recommendation tasks [1]. We investigate the conventional top-N recommendation task [5, 4, 6, 7], but we also explore the recently formulated user-item group formation problem [3] and propose a novel task based on the liquidation of long tail items [8]. Third, we exploit ad hoc retrieval models to compute neighborhoods in a collaborative filtering scenario [9, 10, 12]. Fourth, we explore the opposite direction by adapting an effective recommendation framework to pseudo-relevance feedback [13, 11]. Finally, we discuss the results and present our conclusions. In summary, this doctoral thesis adapts a series of information retrieval models to recommender systems. Our investigation shows that many retrieval models can be accommodated to deal with different recommendation tasks. Moreover, we find that taking the opposite path is also possible. Exhaustive experimentation confirms that the proposed models are competitive. Finally, we also perform a theoretical analysis of some models to explain their effectiveness. Advisors : Álvaro Barreiro and Javier Parapar. Committee members : Gabriella Pasi, Pablo Castells and Fidel Cacheda. The dissertation is available at: https://www.dc.fi.udc.es/~dvalcarce/thesis.pdf.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Chenkai Tan ◽  
Shaoyi Bei ◽  
Zhengjun Jing ◽  
Neal Xiong

The blockchain-based management system has been regarded as a novel way to improve the efficiency and safety of Vehicular Ad Hoc Networks (VANETs). A blockchain-based scheme’s performance depends on blockchain nodes’ computing power composed from the road-side unit (RSU). However, the throughput of blockchain-based application in VANETs is limited by the network bandwidth. A single blockchain cannot record large-scale VANETs’ data. In this paper, we design an atomic cross-chain swap-based management system (ACSMS) to boost the scalability of blockchain-based application in VANETs. The blockchain-based public-key encryption with keyword search is further introduced to protect user privacy. The analysis shows that ACSMS achieves cross-chain swap without loss of CAV security privacy. The simulation results show that our method can realize multiple blockchain-based applications in VANETs.


Author(s):  
Katrine Stemland Skjelsvik ◽  
Vera Goebel ◽  
Thomas Plagemann

Event-based interaction is suitable for rescue and emergency applications because the filtering capabilities can help to prevent information overload, and such interaction may be offered by an Event Notification Service (ENS). We focus on ENS in sparse Mobile Ad-hoc Networks (MANETs), since an incident may occur e.g., in a deserted place lacking infrastructure, the density of nodes may be low, and there may be physical obstacles limiting the transmission range. The asynchronous communication provided by the ENS is suited for an environment where there may be long-lasting network partitions. In this chapter, we describe characteristics of rescue operations and use this as a basis for discussing ENS design choices such as subscription language, architecture and routing. Afterwards, we present our own ENS solution, the Distributed Event Notification Service (DENS), which is tailored for such an application domain.


Author(s):  
Tahani Alsaedi ◽  
Nada Sherief ◽  
Keith Phalp ◽  
Raian Ali

AbstractTeleworking refers to the utilization of information and communication technologies for work done outside the workplace. The Covid-19 crisis led to increased utilisation of social networking tools within enterprises, especially when working remotely. The aim of their use is often to improve situational awareness, coordination, and collaboration amongst employees. Online social transparency, typically done through social networks or enterprise social software, refers to the voluntary sharing of personal and contextual information such as those relating to their own and team status, intentions, motivation, capabilities, goal priorities besides updates on the physical and social context, with other colleagues. An ad-hoc practice of social transparency can introduce risks such as information overload, social loafing and peer pressure. Despite recognising its adverse effects, there is a lack of systematic methods that identify and assess the risks of online social transparency. In this paper, we present a method to identify and evaluate these within enterprises. We present the method’s workflow, stakeholders, the novel artefacts and techniques devised to use and the outcomes to produce. We evaluate our proposed method by applying it in a real organisational context and assess applicability, efficiency, and effectiveness in identifying risks and supporting managers in risk assessment. The results showed that the method gives a framework of thinking and analysis and helps recognize and identify risks in a specialized manner.


2018 ◽  
Vol 12 (04) ◽  
pp. 541-557 ◽  
Author(s):  
Mouzhi Ge ◽  
Fabio Persia

With the widespread availability of media technologies, such as real-time streaming, new Internet-of-Thing devices and smart phones, multimedia data are extensively increased and the big multimedia data rapidly spread over various social networks. This has created complexity and information overload for users to choose the suitable multimedia objects. Thus, different multimedia recommender systems have been emerging to help users find the useful multimedia objects that are possibly preferred by the user. However, the evaluation of these multimedia recommender systems is still in an ad-hoc stage. Given the distinct features of multimedia objects, the evaluation criteria adopted from the general recommender systems might not be effectively used to evaluate multimedia recommendations. In this paper, we therefore review and analyze the evaluation criteria that have been used in the previous multimedia recommender system papers. Based on the review, we propose a generalized evaluation framework to guide the researchers and practitioners to perform evaluations, especially user-centric evaluations, for multimedia recommender systems.


2016 ◽  
Vol 21 (6) ◽  
pp. 5-11
Author(s):  
E. Randolph Soo Hoo ◽  
Stephen L. Demeter

Abstract Referring agents may ask independent medical evaluators if the examinee can return to work in either a normal or a restricted capacity; similarly, employers may ask external parties to conduct this type of assessment before a hire or after an injury. Functional capacity evaluations (FCEs) are used to measure agility and strength, but they have limitations and use technical jargon or concepts that can be confusing. This article clarifies key terms and concepts related to FCEs. The basic approach to a job analysis is to collect information about the job using a variety of methods, analyze the data, and summarize the data to determine specific factors required for the job. No single, optimal job analysis or validation method is applicable to every work situation or company, but the Equal Employment Opportunity Commission offers technical standards for each type of validity study. FCEs are a systematic method of measuring an individual's ability to perform various activities, and results are matched to descriptions of specific work-related tasks. Results of physical abilities/agilities tests are reported as “matching” or “not matching” job demands or “pass” or “fail” meeting job criteria. Individuals who fail an employment physical agility test often challenge the results on the basis that the test was poorly conducted, that the test protocol was not reflective of the job, or that levels for successful completion were inappropriate.


Sign in / Sign up

Export Citation Format

Share Document