Search Results

You are looking at 1 - 10 of 11 items for :

  • direct search methods x
  • Information Management x
Clear All
Open access

Christina Lioma, Birger Larsen and Peter Ingwersen

in their very large scale web log study carried out in 2005 ( Jansen, Booth, & Spink, 2009 ). They analysed 1,523,793 queries executed on the Dogpile meta search engine and found the average number of search terms per query reaching 2.79 SD =1, 54 terms (p. 1365, Table 4 ). Almost 71 % of the search sessions consisted of only one query. The above log studies include few direct analyses of how users perceive term dependence in queries through phrase operators. It seems that overall users rarely query using fixed phrases: phrases have been used in queries at a

Open access

Danchen Zhang and Daqing He

/prediction failure for the rare but important diseases that might have little data for training. In comparison to the related work on this part, our methods work on predicting wide range of diseases. This is because doctors’ medical literature search can be on all sorts of diseases so that our automatic diagnosis prediction system cannot afford to work only on a small number of diseases. Furthermore, we concentrate on proposing a diagnosis prediction system with no need on large quantity of training data. Finally, in contrast to past studies that only accepted well

Open access

Tingting Jiang, Jiaqi Yang, Cong Yu and Yunxin Sang

Rio de Janeiro, Brazil Sung, E., & Mayer, R. E. (2013). Online multimedia learning with mobile devices and desktop computers: An experimental test of Clark’s methods-not-media hypothesis. Computers in Human Behavior, 29 (3), 639–647. 10.1016/j.chb.2012.10.022 Sung E. Mayer R. E. 2013 Online multimedia learning with mobile devices and desktop computers: An experimental test of Clark’s methods-not-media hypothesis Computers in Human Behavior 29 3 639 647 Wu, D., & Bi, R. (2016). Mobile and Desktop Search Behaviors: A Comparative Study. N ew

Open access

Weijia Xu, Amit Gupta, Pankaj Jaiswal, Crispin Taylor, Patti Lockhart and Jennifer Regala

communities from around the world. All the Planteome ontologies are publicly available and are maintained at the Planteome GitHub site (https://github.com/Planteome) for sharing and tracking revisions and new requests. 2.4 NLP as a Service Since the number of journal articles published each year has significantly increased in the past decades, information management services, such as those provided through libraries and content creators, are seeking new ways to improve the content accessibility. New text-mining methods are adopted to provide better search experiences

Open access

Yuan Zhang and Hsia-Ching Chang

half century, if was not misused for interpretation of semantic value. 3 Research Methodology 3.1 Research Design: A Case Study with Entropy Method The Twitter platforms connects its users ( personal or organizational accounts that write or/and read tweets ) across the world through their information sharing behavior (i.e., tweeting/retweeting activities) and information seeking behavior with the hashtag search feature of the platform. According to Shannon (1948) , although these messages on Twitter have meanings, these semantic aspects of communication are

Open access

Lu An, Xingyue Yi, Yuxin Han and Gang Li

entries ( Riquelme & González, 2016 ). Among the studies on the influence of microblog users, scholars have also integrated or combined multiple direct indicators by constructing certain index systems or adopting mathematical modeling methods, in addition to putting forward indirect indicators, such as a mathematical model based on the PageRank algorithm to define the integrated indicator of users’ influence ( Kim, Lee & Straub, 2018 ), the location of the users’ network structure, and the dynamic interaction of the user in the network structure ( Hong, He, Ge, Wang

Open access

Neil R. Smalheiser and Aaron M. Cohen

boundaries in full-text articles, so that searches can be restricted to (say) Introduction vs. Methods vs. Results. Certain additional features have been extracted and annotated for full-text articles by Europe PMC, including some named entities, methods, and software cited. In the long term, we are interested in extracting new features from full-text and using them to create new similarity metrics. For example, a biomedical article is likely to have only one (or a few) main point; knowing the main points is much more specific and informative than knowing its general topic

Open access

Liang Hong, Mengqi Luo, Ruixue Wang, Peixin Lu, Wei Lu and Long Lu

make progress in health care, there is a dramatic explosion in the quantity of research literatures ( Fig. 1B) . Figure 1B Literature explosion searched with “health care” in Pubmed 2 Major Types and Sources of Big Data in Health Care Health care has become an important issue in developed countries and middle-income countries ( Kyoungyoung Jee & Gang Hoon Kim, 2013 ). Big Data in health care can be classified into four main types based on the data sources, i.e., Big Data in medicine, also named as medical/clinical Big Data; Big Data in public health

Open access

Maria Esteva, Ramona L. Walls, Andrew B. Magill, Weijia Xu, Ruizhu Huang, James Carson and Jawon Song

digital object may involve verifying the integrity of the bits, its metadata, and its identifiers. Conceptually, an intelligent system could help determine and document an object’s authenticity through series of related assertions about a digital object in connection to its provenance, versions, and derivatives ( Lynch, 2000 ). However, while archival principles are making their way into the realm of digital data curation, they have not been developed into automated and scalable methods yet ( Ray, 2012 ). IDS is designed to bridge this gap. In it, authenticity is

Open access

Shaobo Wei and Kwok-Kee Wei

: H2: A firm’s IT operations are positively associated with its firm performance . IT knowledge of a firm will affect its beliefs and participation in the IT innovation projects ( Kearns et al. 2006 ). As such, IT knowledge of a firm helps better search for new ways to explore and exploit the IT infrastructure to create and capitalize on the business opportunities ( Lu et al. 2011 ). In particular, with a high understanding of the strategic potential of IT, the firm would develop appropriate strategies to facilitate the creation of a clear vision for IT, and