Search results
21 – 30 of over 85000Douglas Tudhope, Ceri Binding, Dorothee Blocks and Daniel Cunliffe
The purpose of this paper is to explore query expansion via conceptual distance in thesaurus indexed collections
Abstract
Purpose
The purpose of this paper is to explore query expansion via conceptual distance in thesaurus indexed collections
Design/methodology/approach
An extract of the National Museum of Science and Industry's collections database, indexed with the Getty Art and Architecture Thesaurus (AAT), was the dataset for the research. The system architecture and algorithms for semantic closeness and the matching function are outlined. Standalone and web interfaces are described and formative qualitative user studies are discussed. One user session is discussed in detail, together with a scenario based on a related public inquiry. Findings are set in context of the literature on thesaurus‐based query expansion. This paper discusses the potential of query expansion techniques using the semantic relationships in a faceted thesaurus.
Findings
Thesaurus‐assisted retrieval systems have potential for multi‐concept descriptors, permitting very precise queries and indexing. However, indexer and searcher may differ in terminology judgments and there may not be any exactly matching results. The integration of semantic closeness in the matching function permits ranked results for multi‐concept queries in thesaurus‐indexed applications. An in‐memory representation of the thesaurus semantic network allows a combination of automatic and interactive control of expansion and control of expansion on individual query terms.
Originality/value
The application of semantic expansion to browsing may be useful in interface options where thesaurus structure is hidden.
Details
Keywords
This study examines the variation in preventable hospitalization rates of Medicaid children in California to extend our understanding of racial and ethnic disparity in primary…
Abstract
This study examines the variation in preventable hospitalization rates of Medicaid children in California to extend our understanding of racial and ethnic disparity in primary care quality. The results show that primary care quality varies substantially by race and ethnicity even when financial access is ensured by Medicaid. Moreover, the domain of primary care that minority children experience disadvantage varies by race and ethnicity. Compared to white children, African-American children lack continuity and comprehensiveness of care that is necessary for the management of chronic conditions. Hispanic children, on the contrary, have inadequate first contact care. Asian children experience a better quality of care overall than white children. Independent of race, a primary language other than English has a protective effect on preventable hospitalization rates, indicating that language need not be a barrier to quality primary care for racial and ethnic minority groups. The possible reasons underlying the observed differences in health outcome by race/ethnicity and primary language are discussed.
Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng
Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…
Abstract
Purpose
Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.
Design/methodology/approach
This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.
Findings
As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.
Originality/value
This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.
Details
Keywords
Classification, indexing and abstracting can all be regarded as summarisations of the content of a document. A model of text comprehension by indexers (including classifiers and…
Abstract
Classification, indexing and abstracting can all be regarded as summarisations of the content of a document. A model of text comprehension by indexers (including classifiers and abstractors) is presented, based on task descriptions which indicate that the comprehension of text for indexing differs from normal fluent reading in respect of: operational time constraints, which lead to text being scanned rapidly for perceptual cues to aid gist comprehension; comprehension being task oriented rather than learning oriented, and being followed immediately by the production of an abstract, index, or classification; and the automaticity of processing of text by experienced indexers working within a restricted range of text types. The evidence for the interplay of perceptual and conceptual processing of text under conditions of rapid scanning is reviewed. The allocation of mental resources to text processing is discussed, and a cognitive process model of abstracting, indexing and classification is described.
Gregor Retti and Birgit Stehno
This paper describes the Laurin thesaurus, which is used for indexing and searching in the Laurin system, a software package for digital clipping archives. As a multilingual…
Abstract
This paper describes the Laurin thesaurus, which is used for indexing and searching in the Laurin system, a software package for digital clipping archives. As a multilingual thesaurus it complies with the corresponding standards, though presenting some approaches going beyond some of the standards' recommendations. The Laurin thesaurus integrates all kind of indexing terms, not only keywords, but proper names as well. The system of categories and relationships is described in detail.
Details
Keywords
Cezary Zieliński, Krzysztof Mianowski, Kazimierz Nazarczuk and Wojciech Szynkiewicz
The paper describes a prototype robot which due to its serial‐parallel structure exhibits, high stiffness and has a large work envelope. These features make this robot suitable…
Abstract
The paper describes a prototype robot which due to its serial‐parallel structure exhibits, high stiffness and has a large work envelope. These features make this robot suitable for relatively high precision machining operations on large workpieces. The conroller for this robot was based on MRROC++, which is a robot programming framework. Thus the controller could be tailored to the tasks at hand, including the capability of in‐program switching of kinematic model parameters. To obtain those parameters for different locations in the work‐space a calibration procedure using linear measurement guides has been devised.
Details
Keywords
The remit for this, the last session of the Conference, was to consider the papers on specific issues given by the other speakers, to comment thereon, and to try to take a look…
Abstract
The remit for this, the last session of the Conference, was to consider the papers on specific issues given by the other speakers, to comment thereon, and to try to take a look into the future on the basis of what has been said. The views presented here are those of a librarian/information officer concerned almost solely with practical, day‐to‐day work and not directly with research activity. They therefore represent an overview as seen by one who is the recipient of the output of research workers and who must consider the applicability of research findings to systems and procedures at the point of use.
Helen Murphy and Pauline Rafferty
The purpose of this paper is to explore relationships between social tagging and key poststructuralist principles; to devise and construct an analytical framework through which…
Abstract
Purpose
The purpose of this paper is to explore relationships between social tagging and key poststructuralist principles; to devise and construct an analytical framework through which key poststructuralist principles are converted into workable research questions and applied to analyse Librarything tags, and to assess the validity of performing such an analysis. The research hypothesis is that tagging represents an imperfect analogy for the poststructuralist project.
Design/methodology/approach
Tags from LibraryThing and from a library OPAC were compared and constrasted with Library of Congress Subject Headings (LCSH) and publishers’ descriptions. Research questions derived from poststructuralism, asked whether tags destabilise meaning, whether and how far the death of the author is expressed in tags, and whether tags deconstruct LCSH.
Findings
Tags can temporarily destabilise meaning by obfuscating the structure of a word. Meaning is destabilised, perhaps only momentarily, and then it is recreated; it might resemble the original meaning, or it may not, however any attempt to make tags useful or functional necessarily imposes some form of structure. The analysis indicates that in tagging, the author, if not dead, is ignored. Authoritative interpretations are not pervasively mimicked in the tags. In relation to LCSH, tagging decentres the dominant view, but neither exposes nor judges it. Nor does tagging achieve the final stage of the deconstructive process, showing the dominant view to be a constructed reality.
Originality/value
This is one of very few studies to have attempted a critical theoretical approach to social tagging. It offers a novel methodological approach to undertaking analysis based on poststructuralist theory.
Details
Keywords
Karen Williams Middleton and Pamela Nowell
Effective internal dynamics of new venture teams is seen as a key contributor to venture success. The purpose of this paper is to investigate the ways in which new venture teams…
Abstract
Purpose
Effective internal dynamics of new venture teams is seen as a key contributor to venture success. The purpose of this paper is to investigate the ways in which new venture teams consisting of nascent entrepreneurs initiate trust and control during venture emergence.
Design/methodology/approach
Dimensions of trust and control are developed into an analytical framework applied to documented team norms. Coding detects frequency of trust and control dimensions. Supplementary data triangulate findings and explore follow-on effects in team dynamics and venture emergence.
Findings
Frequency of coded dimensions generates a venture team profile. Teams prime their dynamics through use of trust and/or control language in documented norms. Priming is seen to influence entrepreneurial perseverance during venture emergence, stemming either directly from team dynamics, or indirectly from key shareholder relationships or environmental conditions.
Research limitations/implications
Data are bounded to a specific contextual setting representing incubation and education, where the nascent entrepreneurs are simultaneously students. The complexity of venture emergence means that multiple factors influencing new venture teams may influence trust and control in ways currently unaccounted for.
Practical implications
Exploration of trust and control during venture emergence emphasizes soft-skills critical to entrepreneurial perseverance and venture success. Team norms can be designed to prime toward trust or control, and can be indicative of teams’ sensitivity to external factors, enabling evidence for intervention.
Originality/value
The paper illustrates ways in which trust and control influence team dynamics during venture emergence.
Details