نتایج جستجو برای: three questionnaires including personal information

تعداد نتایج: 3137355  

2001
Dominik Kuropka Thomas Serries

Information overflow is one of the greatest challenges for information focused professions today. This paper presents the Personal Information Agent, an agent based information filtering prototype. The prototype has been build to prove the concept of our agent and neuronal network based information filtering system which is presented in this paper. Further experiences made during implementation...

2006
Paul Thomas

A personal information retrieval tool, offering a unified search interface to all data sources available to a user and operating with some degree of knowledge of the user’s preferences and context, seems desirable in light of the vast amount of information available in electronic form. Such a tool however raises challenging research questions in areas include source discovery and selection, res...

2012
Liadh Kelly Paul Bunbury Gareth J. F. Jones

Evaluation of personal search over an individual’s personal information space on the desktop or elsewhere is problematic for reasons relating both to the personal and private nature of the data and the associated personal information needs of collection owners. Indeed challenges associated with evaluation in this space are recognised as one of the key factors hindering the development of resear...

Background and aim: The aim of this study was to identify the factors affecting on students' performance in information retrieval based on fuzzy logic method compared to traditional method. Materials and methods: This survey-descriptive study was performed using quantitative approach. The research population was 34 PhD students, and the researcher-made questionnaire was used. Data were analyzed...

2017
Hoang Giang Do Wee Keong Ng

Physical document verification is a necessary task in the process of reviewing applications for a variety of services, such as loans, insurance, and mortgages. This process consumes a large amount of time, money, and human resources, which leads to limited business throughput. Furthermore, physical document verification poses a critical risk to clients’ personal information, as they are require...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعت آب و برق (شهید عباسپور) - دانشکده مهندسی برق و کامپیوتر 1392

abstract according to increase in electricity consumption in one hand and power systemsreliability importance in another , fault location detection techniqueshave beenrecentlytaken to consideration. an algorithm based on collected data from both transmission line endsproposed in this thesis. in order to reducecapacitance effects of transmission line, distributed parametersof transmission line...

Journal: :مدیریت فناوری اطلاعات 0
حسن فارسیجانی استادیار، دانشکده مدیریت و حسابداری، دانشگاه شهید بهشتی، ایران رضا فرضی پور صائن دانشیار، دانشکده مدیریت و حسابداری، دانشگاه آزاد اسلامی واحد کرج ، ایران سید محمد رضا ترابی پور کارشناس ارشد مدیریت صنعتی، دانشگاه آزاد اسلامی واحد علوم و تحقیقات تهران ، ایران

inadequate attention to the products having shelf life limitation leads to form a new branch of supply chain (sc) called cold chain (cc). cold chain management (ccm) is referred to handle activities related to perishable products. this research investigates the role of information technology (it) in improving the human resource efficiency, planning and logistic in the cc organizations. the numb...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده علوم انسانی و پایه 1390

the present study aimed at investigating the relationship between iranian efl teachers’ classroom management orientations and their teaching styles. additionally, the difference between male and female teachers’ teaching styles and classroom management orientations and their relationship with experience and age were explored. three hundred efl teachers filled in attitudes and beliefs on classro...

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2013

Journal: :CoRR 2009
Sabah S. Al-Fedaghi Bernhard Thalheim

One of the most important aspects of security organization is to establish a framework to identify securitysignificant points where policies and procedures are declared. The (information) security infrastructure comprises entities, processes, and technology. All are participants in handling information, which is the item that needs to be protected. Privacy and security information technology is...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید