Academic literature on the topic 'Knowledge identification'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Knowledge identification.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Knowledge identification"

1

Farwig, H. Meier zu, and H. Unbehauen. "Knowledge-Based System Identification." IFAC Proceedings Volumes 25, no. 15 (July 1992): 21–29. http://dx.doi.org/10.1016/s1474-6670(17)50606-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Grantham, Ross. "Corporate Knowledge: Identification or Attribution?" Modern Law Review 59, no. 5 (September 1996): 732–37. http://dx.doi.org/10.1111/j.1468-2230.1996.tb02689.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lim, Hyojeong, and Yongtae Park. "Identification of technological knowledge intermediaries." Scientometrics 84, no. 3 (December 25, 2009): 543–61. http://dx.doi.org/10.1007/s11192-009-0133-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Arentz, Jason, Frederic Sautet, and Virgil Storr. "Prior-knowledge and opportunity identification." Small Business Economics 41, no. 2 (June 19, 2012): 461–78. http://dx.doi.org/10.1007/s11187-012-9437-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pathirage, Chaminda, Krisanthi Seneviratne, Dilanthi Amaratunga, and Richard Haigh. "Managing disaster knowledge: identification of knowledge factors and challenges." International Journal of Disaster Resilience in the Built Environment 3, no. 3 (September 28, 2012): 237–52. http://dx.doi.org/10.1108/17595901211263620.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alshawi, S., and W. Al‐Karaghouli. "Managing knowledge in business requirements identification." Logistics Information Management 16, no. 5 (October 2003): 341–49. http://dx.doi.org/10.1108/09576050310499336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Meehan, Bridget, and Ita Richardson. "Identification of Software Process Knowledge Management." Software Process: Improvement and Practice 7, no. 2 (June 2002): 47–55. http://dx.doi.org/10.1002/spip.154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Barcelo Valenzuela, Mario, Gerardo Sanchez Schmitz, Alonso Perez Soltero, Luis Felipe Romero Dessens, Fernando Martin Rubio, and Jose Palma. "Knowledge management opportunity space identification strategy." Knowledge and Process Management 17, no. 3 (July 2010): 111–17. http://dx.doi.org/10.1002/kpm.348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Becker, Karen, Frances Jørgensen, and Adelle Bish. "Knowledge Identification and Acquisition in SMEs." International Journal of Knowledge Management 11, no. 3 (July 2015): 1–16. http://dx.doi.org/10.4018/ijkm.2015070101.

Full text
Abstract:
Researchers and practitioners have been preoccupied with identifying ways for larger organizations to acquire and manage knowledge, however far less research attention has been directed towards these same pursuits in small and medium-sized enterprises (SMEs). This paper examines how SMEs engage in knowledge identification and acquisition; in particular how they identify knowledge needs and source this knowledge to enhance their business. The research studied six SMEs in Australia and Denmark. Contrary to prevailing assumptions, the findings suggest that SMEs engage in identification and sourcing of critical knowledge, albeit often with less than formal processes. These organizations relied on business plans to direct knowledge activities and ensure balance between long-range planning and flexibility. The results address a lack of empirical evidence about SME approaches to knowledge identification and acquisition, and demonstrate that although SMEs may approach such activities in an informal way, they are nonetheless deliberate and strategic in their knowledge activities.
APA, Harvard, Vancouver, ISO, and other styles
10

Cayrel, Pierre-Louis, Richard Lindner, Markus Rückert, and Rosemberg Silva. "Improved Zero-Knowledge Identification with Lattices." Tatra Mountains Mathematical Publications 53, no. 1 (December 1, 2012): 33–63. http://dx.doi.org/10.2478/v10127-012-0038-4.

Full text
Abstract:
ABSTRACT Zero-knowledge identification schemes solve the problem of authenticating one party to another via an insecure channel without disclosing any additional information that might be used by an impersonator. In this paper we propose a scheme whose security relies on the existence of a commitment scheme and on the hardness of worst-case lattice problems. We adapt a code- -based identification scheme devised by Cayrel, V´eron and El Yousfi, which constitutes an improvement of Stern’s construction. Our solution sports analogous improvements over the lattice adaption of Stern’s scheme which Kawachi et al. presented at ASIACRYPT ’08. Specifically, due to a smaller cheating probability close to 1/2 and a similar communication cost, any desired level of security will be achieved in fewer rounds. Compared to Lyubashevsky’s scheme presented at ASIACRYPT ’09, our proposal, like Kawachi’s, offers a much milder security assumption: namely, the hardness of SIS for trinary solutions. The same assumption was used for the SWIFFT hash function, which is secure for much smaller parameters than those proposed by Lyubashevsky.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Knowledge identification"

1

Kwon, Hongwoo. "Self-identification and self-knowledge." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/62418.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Linguistics and Philosophy, 2010.
"September 2010." Cataloged from PDF version of thesis.
Includes bibliographical references (p. 119-122).
The traditional view has it that self-locating beliefs are distinctive in that they have distinctive contents. Against this, I claim that the distinctive element of self-locating beliefs should be placed outside contents. If someone believes that he himself is hungry, he not only has a propositional belief of a certain particular person that he is hungry, but also identifies himself as that particular person. The latter is not a matter of propositional belief, but a matter of taking a first personal perspective on that person's actions, beliefs and experiences. A subject takes his actions and beliefs to be "up to" himself, and regards his experiences as giving information about where he is located in the world. All these phenomena are shown to be related to the peculiar ways in which we come to know certain facts about ourselves. So self-identification is conceptually connected to self-knowledge. The three chapters discuss some parts or aspects of this reasoning. Chapter 1, "Perry's Problem and Moore's Paradox," claims that Perry's problem of the essential indexical and Moore's paradox are essentially a single problem applied to two different aspects of our rational activities, actions and beliefs, respectively. Chapter 2, "On What the Two Gods Might Not Know," defends what may be called an ability hypothesis about self-locating knowledge, drawing on David Lewis's ability hypothesis about phenomenal knowledge. What the gods might lack is best viewed as the abilities of self-knowledge. Chapter 3, "What Is the First Person Perspective?" asks what it is to take a first person perspective and view oneself as the author of one's own actions. It is a matter of taking a deliberative stance toward one's own actions, which in turn can be best understood as the special ways in which we know them.
by Hongwoo Kwon.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
2

Eyecioglu, Ozmutlu Asli. "Paraphrase identification using knowledge-lean techniques." Thesis, University of Sussex, 2016. http://sro.sussex.ac.uk/id/eprint/65497/.

Full text
Abstract:
This research addresses the problem of identification of sentential paraphrases; that is, the ability of an estimator to predict well whether two sentential text fragments are paraphrases. The paraphrase identification task has practical importance in the Natural Language Processing (NLP) community because of the need to deal with the pervasive problem of linguistic variation. Accurate methods for identifying paraphrases should help to improve the performance of NLP systems that require language understanding. This includes key applications such as machine translation, information retrieval and question answering amongst others. Over the course of the last decade, a growing body of research has been conducted on paraphrase identification and it has become an individual working area of NLP. Our objective is to investigate whether techniques concentrating on automated understanding of text requiring less resource may achieve results comparable to methods employing more sophisticated NLP processing tools and other resources. These techniques, which we call “knowledge-lean”, range from simple, shallow overlap methods based on lexical items or n-grams through to more sophisticated methods that employ automatically generated distributional thesauri. The work begins by focusing on techniques that exploit lexical overlap and text-based statistical techniques that are much less in need of NLP tools. We investigate the question “To what extent can these methods be used for the purpose of a paraphrase identification task?” For the two gold standard data, we obtained competitive results on the Microsoft Research Paraphrase Corpus (MSRPC) and reached the state-of-the-art results on the Twitter Paraphrase Corpus, using only n-gram overlap features in conjunction with support vector machines (SVMs). These techniques do not require any language specific tools or external resources and appear to perform well without the need to normalise colloquial language such as that found on Twitter. It was natural to extend the scope of the research and to consider experimenting on another language, which is poor in resources. The scarcity of available paraphrase data led us to construct our own corpus; we have constructed a paraphrasecorpus in Turkish. This corpus is relatively small but provides a representative collection, including a variety of texts. While there is still debate as to whether a binary or fine-grained judgement satisfies a paraphrase corpus, we chose to provide data for a sentential textual similarity task by agreeing on fine-grained scoring, knowing that this could be converted to binary scoring, but not the other way around. The correlation between the results from different corpora is promising. Therefore, it can be surmised that languages poor in resources can benefit from knowledge-lean techniques. Discovering the strengths of knowledge-lean techniques extended with a new perspective to techniques that use distributional statistical features of text by representing each word as a vector (word2vec). While recent research focuses on larger fragments of text with word2vec, such as phrases, sentences and even paragraphs, a new approach is presented by introducing vectors of character n-grams that carry the same attributes as word vectors. The proposed method has the ability to capture syntactic relations as well as semantic relations without semantic knowledge. This is proven to be competitive on Twitter compared to more sophisticated methods.
APA, Harvard, Vancouver, ISO, and other styles
3

Panait, Andreea Mihaela. "Security aspects of zero knowledge identification schemes." Thesis, McGill University, 2008. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=112340.

Full text
Abstract:
In this thesis we follow two directions: Zero Knowledge Protocols and the Discrete Logarithm Problem. In each direction we present the necessary background and we give a new approach for some parts of the existing protocols.
The new parts are dedicated to the soundness property of the Schnorr Identification Scheme and to the security of the sum+-Protocol. Since both directions are very well-known and studied in the field of cryptography, they are presented with many details so that the new results are easy to follow.
In writing this thesis we have tried to present the material in a specific order and in a manner easy to read even by beginners in cryptography.
APA, Harvard, Vancouver, ISO, and other styles
4

Esmaili, Ali. "Control relevant model identification with prior knowledge /." *McMaster only, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tedmori, Sara. "Exploiting email : extracting knowledge to support knowledge sharing." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/3580.

Full text
Abstract:
Effective management of knowledge assets is key to surviving in today's competitive business environment. This is particularly true for large organisations, where employees have difficulties identifying where or with whom the knowledge lies. Expertise is one of the most important knowledge assets and largely resides in the heads of employees. Many attempts have been made to help locate employees with the right expertise; however, the existing systems (often referred to as expertise finding systems) carry several flaws. In organisations, there are several potential sources where expertise evidence might be found. These sources have been used by the existing approaches to profile employees' expertise. Unfortunately, there has been limited research showing whether these sources contain useful evidence of expertise. Moreover, the majority of existing approaches have not been designed to integrate with the organisations' work practices; nor have they investigated the socio-ethical challenges associated with the adoption of such systems. Therefore, there is a need for expert finding systems that utilise useful sources of expertise and integrate into existing work practices. Through industry involvement, this research has explored and validated email content as a source for expertise profiling. This thesis provides an overview of the traditional and current approaches to expertise finding. The development and implementation of the EKE (Email Knowledge Extraction) system which tries to overcome the aforementioned challenges is presented. EKE has been evaluated by end-users from both industry and academia. The evaluation results suggest that EKE is a useful system that encourages participation, and that in many cases may assist in the management of knowledge within organisations.
APA, Harvard, Vancouver, ISO, and other styles
6

Palacio, Adriana Maria. "On identification, zero-knowledge, and plaintext-aware-encryption." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2006. http://wwwlib.umi.com/cr/ucsd/fullcit?p3213078.

Full text
Abstract:
Thesis (Ph. D.)--University of California, San Diego, 2006.
Title from first page of PDF file (viewed June 27, 2006). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 132-139).
APA, Harvard, Vancouver, ISO, and other styles
7

Behrooz, A. "Meta description of experimental identification of medical knowledge." Thesis, Brunel University, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.373085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Heino, Perttu. "Fluid property reasoning in knowledge-based hazard identification /." Espoo [Finland] : Technical Research Centre of Finland, 1999. http://www.vtt.fi/inf/pdf/publications/1999/P393.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Heino, Perttu M. "Fluid property reasoning in knowledge-based hazard identification." Thesis, Loughborough University, 1998. https://dspace.lboro.ac.uk/2134/32041.

Full text
Abstract:
The study of serious accidents, which have occurred in the chemical process industry in recent times, highlights the need to understand fluid property related phenomena and the interactions between chemicals under abnormal process conditions or with abnormal fluid compositions. Consideration of these issues should be common practice in professional safety analysis work, and computer programs designed to support this work have to be able to deal with them.
APA, Harvard, Vancouver, ISO, and other styles
10

Sands, Shannon, and Joel Nielsen. "Consumer Knowledge of Acetaminophen Safety, Dosing, and Identification." The University of Arizona, 2012. http://hdl.handle.net/10150/623666.

Full text
Abstract:
Class of 2012 Abstract
Specific Aims: The objective of this study is to evaluate consumers’ knowledge about over the counter (OTC) products containing acetaminophen (APAP). Methods: Doctor of pharmacy student researchers set up a booth at consenting community pharmacies and invited consumers to participate in a 10-15 minute knowledge assessment. The booth contained a table displaying several OTC medication bottles/packages. Adult participants: a) answered baseline questions verbally about their APAP knowledge and associated risks; b) identified OTC products at the booth that contain APAP; and c) calculated and demonstrated dosing of APAP. The researchers asked follow-up questions and assessed the accuracy of the dosing. Participants received APAP educational brochures upon completion. Main Results: Eighty percent of subjects reported not knowing what the abbreviation “APAP” means, and almost half of those who said that they knew what it means were incorrect. Very few participants were able to correctly identify the products containing APAP even with the product packaging information, with the percentage of incorrect responses as to whether a product contains APAP or not varying from 4.9% to 31.6%. More than 40% of the pediatric doses were incorrectly dosed for both of the pediatric formulations, even with the majority of subjects being parents. Conclusions: Consumers are not able to identify which over-the-counter products contain APAP even with the product packaging before them, and they do not know what the abbreviation “APAP” means. Better packaging and product ingredient information should be developed, and the abbreviation “APAP” should be avoided. Pediatric APAP products should be re-evaluated regarding safety and dosing.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Knowledge identification"

1

Thompson, R. M. C. Waituna Lagoon: Summary of existing knowledge and identification of knowledge gaps. Wellington, N.Z: Dept. of Conservation, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Heino, Perttu. Fluid property reasoning in knowledge-based hazard identification. Espoo [Finland]: Technical Research Centre of Finland, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

The fraud identification handbook: Fraud avoidance through knowledge. Highlands Ranch, Colo: PP Preventive Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Foliicolous lichens: A contribution to the knowledge of the lichen flora of Costa Rica, Central America. Berlin: J. Cramer, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Belinskai︠a︡, A. B. Identifikat︠s︡ii︠a︡ konfliktov v sovremennoĭ Rossii kak filosofskai︠a︡ problema: Monografii︠a︡. Moskva: Izd-vo Moskovskogo gumanitarnogo universiteta, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Belinskai︠a︡, A. B. Identifikat︠s︡ii︠a︡ konfliktov v sovremennoĭ Rossii kak filosofskai︠a︡ problema: Monografii︠a︡. Moskva: Izd-vo Moskovskogo gumanitarnogo universiteta, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

F, Stein Howard, ed. Intersubjectivity, projective identification, and otherness. Pittsburgh, Pa: Duquesne University Press, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dery, B. B. Indigenous knowledge of medicinal trees and setting priorities for their domestication in Shinyanga Region, Tanzania. Nairobi, Kenya: International Centre for Research in Agroforestry, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Berkbigler, Brandy L. Traditional ecological knowledge camp in Fort Yukon. [Anchorage, Alaska: U.S. Fish and Wildlife Service, Office of Subsistence Management, Fisheries Resource Monitoring Program, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Berkbigler, Brandy L. Traditional ecological knowledge camp in Fort Yukon. [Anchorage, Alaska: U.S. Fish and Wildlife Service, Office of Subsistence Management, Fisheries Resource Monitoring Program, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Knowledge identification"

1

Pujara, Jay, Hui Miao, Lise Getoor, and William Cohen. "Knowledge Graph Identification." In Advanced Information Systems Engineering, 542–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41335-3_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brisset-Foucault, Florence. "Bureaucratic interpersonal knowledge." In Identification and Citizenship in Africa, 254–73. 1 Edition. | New York : Routledge, 2021. | Series: Routledge contemporary Africa: Routledge, 2021. http://dx.doi.org/10.4324/9781003053293-18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Malatesti, Luca, and Filip Čeč. "Identification and Self-Knowledge." In Third-Person Self-Knowledge, Self-Interpretation, and Narrative, 177–89. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98646-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bezruchko, Boris P., and Dmitry A. Smirnov. "Identification of Directional Couplings." In Extracting Knowledge From Time Series, 319–48. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12601-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

El-Soudani, Magdi S., Heba S. El-Refaey, and Hebat-Allah M. Mourad. "Zero Knowledge Broadcasting Identification Scheme." In IFIP Advances in Information and Communication Technology, 227–37. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35586-3_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bertolini, Diego, Luiz S. Oliveira, Yandre M. G. Costa, and Lucas G. Helal. "Knowledge Transfer for Writer Identification." In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 102–10. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75193-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Swart, Juani, Cliff Bowman, and Kerrie Howard. "Knowledge Assets: Identification and Integration." In The Palgrave Handbook of Knowledge Management, 273–303. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71434-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Barra, Eduardo, and Jorge Morato. "Knowledge Identification from Requirements Specification." In Communications in Computer and Information Science, 264–70. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27653-3_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ahlswede, Rudolf. "Models with Prior Knowledge of the Receiver." In Identification and Other Probabilistic Models, 157–65. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65072-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ahlswede, Rudolf. "Models with Prior Knowledge at the Sender." In Identification and Other Probabilistic Models, 167–69. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65072-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Knowledge identification"

1

Gou, Jin, Yangyang Wu, and Wei Luo. "An Ontology Based Knowledge Clustering Method in Knowledge Space." In 2007 International Workshop on Anti-Counterfeiting, Security and Identification. IEEE, 2007. http://dx.doi.org/10.1109/iwasid.2007.373666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Haoyu, Fenglong Ma, Yaqing Wang, and Jing Gao. "Knowledge-Guided Paraphrase Identification." In Findings of the Association for Computational Linguistics: EMNLP 2021. Stroudsburg, PA, USA: Association for Computational Linguistics, 2021. http://dx.doi.org/10.18653/v1/2021.findings-emnlp.72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pechsiri, Chaveevan, and Sumran Painual. "Herbal Medicinal-Property Knowledge Extraction from Text for Knowledge Base Construction." In Artificial Intelligence and Applications / Modelling, Identification, and Control. Calgary,AB,Canada: ACTAPRESS, 2011. http://dx.doi.org/10.2316/p.2011.717-023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Chin-Yew. "Knowledge-based automatic topic identification." In the 33rd annual meeting. Morristown, NJ, USA: Association for Computational Linguistics, 1995. http://dx.doi.org/10.3115/981658.981705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yoo, Keedong. "An Interdisciplinary Approach to Automatically Capture Knowledge in Dialogues on the Spot." In Modelling, Identification and Control. Calgary,AB,Canada: ACTAPRESS, 2012. http://dx.doi.org/10.2316/p.2012.770-019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yoo, Keedong. "SVM-based knowledge topic identification toward the autonomous knowledge acquisition." In 2011 IEEE 9th International Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 2011. http://dx.doi.org/10.1109/sami.2011.5738865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Li, Baoyu Fan, Zhenhua Guo, Yaqian Zhao, Runze Zhang, Rengang Li, Weifeng Gong, and Endong Wang. "Knowledge-Supervised Learning: Knowledge Consensus Constraints for Person Re-Identification." In MM '21: ACM Multimedia Conference. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3474085.3475340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"CIS: CHANGE IDENTIFICATION SYSTEM." In International Conference on Knowledge Engineering and Ontology Development. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0003069003470350.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gherasim, Toader, Giuseppe Berio, Mounira Harzallah, and Pascale Kuntz. "Quality problem identification in automatically constructedontologies." In K-CAP 2013: Knowledge Capture Conference. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2479832.2479836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dai, Feifei, Chong Feng, Zhiqiang Wang, Yuxia Pei, and Heyan Huang. "Intent Identification for Knowledge Base Question Answering." In 2017 Conference on Technologies and Applications of Artificial Intelligence (TAAI). IEEE, 2017. http://dx.doi.org/10.1109/taai.2017.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Knowledge identification"

1

Chew, Peter A. Identification of threats using linguistics-based knowledge extraction. Office of Scientific and Technical Information (OSTI), September 2008. http://dx.doi.org/10.2172/940522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wolters, Heather M., Trevor Conrad, Christopher Riches, Robert Brusso, Kenny Nicely, Ray Morath, and Heidi Keller-Glaze. Identification of Knowledge, Skills, and Abilities for Army Design. Fort Belvoir, VA: Defense Technical Information Center, April 2014. http://dx.doi.org/10.21236/ada601309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ballas, James A. Implicit Knowledge in the Identification of Environmental Sounds: Causal Uncertainty and Stereotype. Fort Belvoir, VA: Defense Technical Information Center, October 1987. http://dx.doi.org/10.21236/ada214940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kaetzel, L. J., J. R. Clifton, and D. P. Bentz. Integrating knowledge for the identification of cracks in concrete using an expert system shell and extensions. Gaithersburg, MD: National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.ir.89-4206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Frandsen, Brigham, and Lars Lefgren. Partial Identification of the Distribution of Treatment Effects with an Application to the Knowledge Is Power Program (KIPP). Cambridge, MA: National Bureau of Economic Research, May 2018. http://dx.doi.org/10.3386/w24616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mena Jara, Sonia Daniela, Ingeborg Meijer, Gaston Heimeriks, and Tim Willemse. Driving the innovation process by connecting regional knowledge bases to local needs. Fteval - Austrian Platform for Research and Technology Policy Evaluation, April 2022. http://dx.doi.org/10.22163/fteval.2022.543.

Full text
Abstract:
Novel approaches are needed to support the creation of more open, inclusive, and self-sustaining R&I ecosystems in healthcare. This study analysed 3 European regions (Murcia ES), (Örebro SE), and (Republic of Cyprus CY), incorporating complementary approaches from Responsible Research and Innovation (RRI) and Research and Innovation Smart Specialisation Strategy (RIS3). The exercise entailed the identification of healthcare and innovation stakeholders and the characterisation of the policy landscape in each territory. Moreover, the strengths of the regional knowledge base was analysed by measuring the Revealed Comparative Advantage (RCA) indicator based on relatedness measurement, and by using micro-level fields analyses of scientific publications. This methodology allowed us to identify the fields and topics (strengths) that provide opportunities for innovation processes. Additional identification of social needs in the three territories showed profound differences regarding the alignment of the selected needs with respect to the regions’ capabilities. The results suggest that a timely direct interaction with territorial stakeholders can help in selecting the most promising innovation priorities that are based on local needs and knowledge. The process of interaction requires early engagement to support territorial ownership and is further reinforced by RRI policies in place.
APA, Harvard, Vancouver, ISO, and other styles
7

Leonard, Patricia. An Identification of Important Management, Administrative, and Planning Skills and Knowledge Essential to Middle-managers Present Positions in a Variety of Urban and Rural Social Welfare Settings in Oregon. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.1824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Davis, Robert E., Edna Tanne, James P. Prince, and Meir Klein. Yellow Disease of Grapevines: Impact, Pathogen Molecular Detection and Identification, Epidemiology, and Potential for Control. United States Department of Agriculture, September 1994. http://dx.doi.org/10.32747/1994.7568792.bard.

Full text
Abstract:
Grapevine yellows diseases characterized by similar symptoms have been reported in several countries including Israel, the United States, France, Italy, Spain, Germany and Australia. These diseases are among the most serious known in grapevine, but precise knowledge of the pathogens' identities and modes of their spread is needed to devise effective control stratgegies. The overall goals of this project were to develop improved molecular diagnostic procedures for detection and identification of the presumed mycoplasmalike organism (MLO) pathogens, now termed phytoplasmas, and to apply these procedures to investigate impact and spread and potential for controlling grapevine yellows diseases. In the course of this research project, increased incidence of grapevine yellows was found in Israel and the United States; the major grapevine yellows phytoplasma in Israel was identified and tis 16S rRNA gene characterized; leafhopper vectors of this grapevine yellows phytoplasma in Israel were identified; a second phytoplasma was discovered in diseased grapevines in Israel; the grapevine yellows disease in the U.S. was found to be distinct from that in Israel; grapevine yellows in Virginia, USA, was found to be caused by two different phytoplasmas; both phytoplasmas in Virginia grapevines were molecularly characterized and classified; commercial grapevines in Europe were discovered to host a phytoplasma associated with aster yellow disease in the USA, but this phytoplasma has not been found in grapevine in the USA; the Australian grapevine yellows phytoplasma was found to be distinct from the grapevine phytoplasmas in Israel, the United States and Europe and was described and named "Candidatus phytoplasma australiense", and weed host plants acting as potential reservoirs of the grapevine phytoplasmas were discovered. These and other findings from the project should aid in the design and development of strategies for managing the grapevine yellows disease problem.
APA, Harvard, Vancouver, ISO, and other styles
9

Shpigel, Nahum Y., Ynte Schukken, and Ilan Rosenshine. Identification of genes involved in virulence of Escherichia coli mastitis by signature tagged mutagenesis. United States Department of Agriculture, January 2014. http://dx.doi.org/10.32747/2014.7699853.bard.

Full text
Abstract:
Mastitis, an inflammatory response of the mammary tissue to invading pathogenic bacteria, is the largest health problem in the dairy industry and is responsible for multibillion dollar economic losses. E. coli are a leading cause of acute mastitis in dairy animals worldwide and certainly in Israel and North America. The species E. coli comprises a highly heterogeneous group of pathogens, some of which are commensal residents of the gut, infecting the mammary gland after contamination of the teat skin from the environment. As compared to other gut microflora, mammary pathogenic E. coli (MPEC) may have undergone evolutionary adaptations that improve their fitness for colonization of the unique and varied environmental niches found within the mammary gland. These niches include competing microbes already present or accompanying the new colonizer, soluble and cellular antimicrobials in milk, and the innate immune response elicited by mammary cells and recruited immune cells. However, to date, no specific virulence factors have been identified in E. coli isolates associated with mastitis. The original overall research objective of this application was to develop a genome-wide, transposon-tagged mutant collection of MPEC strain P4 and to use this technology to identify E. coli genes that are specifically involved in mammary virulence and pathogenicity. In the course of the project we decided to take an alternative genome-wide approach and to use whole genomes bioinformatics analysis. Using genome sequencing and analysis of six MPEC strains, our studies have shown that type VI secretion system (T6SS) gene clusters were present in all these strains. Furthermore, using unbiased screening of MPEC strains for reduced colonization, fitness and virulence in the murine mastitis model, we have identified in MPEC P4-NR a new pathogenicity island (PAI-1) encoding the core components of T6SS and its hallmark effectors Hcp, VgrG and Rhs. Next, we have shown that specific deletions of T6SS genes reduced colonization, fitness and virulence in lactating mouse mammary glands. Our long-term goal is to understand the molecular mechanisms of host-pathogen interactions in the mammary gland and to relate these mechanisms to disease processes and pathogenesis. We have been able to achieve our research objectives to identify E. coli genes that are specifically involved in mammary virulence and pathogenicity. The project elucidated a new basic concept in host pathogen interaction of MPEC, which for the best of our knowledge was never described or investigated before. This research will help us to shed new light on principles behind the infection strategy of MPEC. The new targets now enable prevalence and epidemiology studies of T6SS in field strains of MPEC which might unveil new geographic, management and ecological risk factors. These will contribute to development of new approaches to treat and prevent mastitis by MPEC and perhaps other mammary pathogens. The use of antibiotics in farm animals and specifically to treat mastitis is gradually precluded and thus new treatment and prevention strategies are needed. Effective mastitis vaccines are currently not available, structural components and effectors of T6SS might be new targets for the development of novel vaccines and therapeutics.
APA, Harvard, Vancouver, ISO, and other styles
10

Jones, Nicole S., and Gerald LaPorte. 2017 National Institute of Justice Forensic Science Research and Development Symposium. RTI Press, May 2017. http://dx.doi.org/10.3768/rtipress.2017.cp.0004.1705.

Full text
Abstract:
The 2017 National Institute of Justice (NIJ) Forensic Science Research and Development (R&D) Symposium is intended to promote collaboration and enhance knowledge transfer of NIJ-funded research. The NIJ Forensic Science R&D Program funds both basic or applied R&D projects that will (1) increase the body of knowledge to guide and inform forensic science policy and practice or (2) result in the production of useful materials, devices, systems, or methods that have the potential for forensic application. The intent of this program is to direct the findings of basic scientific research; research and development in broader scientific fields applicable to forensic science; and ongoing forensic science research toward the development of highly discriminating, accurate, reliable, cost-effective, and rapid methods for the identification, analysis, and interpretation of physical evidence for criminal justice purposes.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography