نتایج جستجو برای: three questionnaires including personal information
تعداد نتایج: 3137355 فیلتر نتایج به سال:
Information overflow is one of the greatest challenges for information focused professions today. This paper presents the Personal Information Agent, an agent based information filtering prototype. The prototype has been build to prove the concept of our agent and neuronal network based information filtering system which is presented in this paper. Further experiences made during implementation...
A personal information retrieval tool, offering a unified search interface to all data sources available to a user and operating with some degree of knowledge of the user’s preferences and context, seems desirable in light of the vast amount of information available in electronic form. Such a tool however raises challenging research questions in areas include source discovery and selection, res...
Evaluation of personal search over an individual’s personal information space on the desktop or elsewhere is problematic for reasons relating both to the personal and private nature of the data and the associated personal information needs of collection owners. Indeed challenges associated with evaluation in this space are recognised as one of the key factors hindering the development of resear...
Background and aim: The aim of this study was to identify the factors affecting on students' performance in information retrieval based on fuzzy logic method compared to traditional method. Materials and methods: This survey-descriptive study was performed using quantitative approach. The research population was 34 PhD students, and the researcher-made questionnaire was used. Data were analyzed...
Physical document verification is a necessary task in the process of reviewing applications for a variety of services, such as loans, insurance, and mortgages. This process consumes a large amount of time, money, and human resources, which leads to limited business throughput. Furthermore, physical document verification poses a critical risk to clients’ personal information, as they are require...
abstract according to increase in electricity consumption in one hand and power systemsreliability importance in another , fault location detection techniqueshave beenrecentlytaken to consideration. an algorithm based on collected data from both transmission line endsproposed in this thesis. in order to reducecapacitance effects of transmission line, distributed parametersof transmission line...
inadequate attention to the products having shelf life limitation leads to form a new branch of supply chain (sc) called cold chain (cc). cold chain management (ccm) is referred to handle activities related to perishable products. this research investigates the role of information technology (it) in improving the human resource efficiency, planning and logistic in the cc organizations. the numb...
the present study aimed at investigating the relationship between iranian efl teachers’ classroom management orientations and their teaching styles. additionally, the difference between male and female teachers’ teaching styles and classroom management orientations and their relationship with experience and age were explored. three hundred efl teachers filled in attitudes and beliefs on classro...
One of the most important aspects of security organization is to establish a framework to identify securitysignificant points where policies and procedures are declared. The (information) security infrastructure comprises entities, processes, and technology. All are participants in handling information, which is the item that needs to be protected. Privacy and security information technology is...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید