Institutions
|
About Us
|
Help
|
Gaeilge
0
1000
Home
Browse
Advanced Search
Search History
Marked List
Statistics
A
A
A
Author(s)
Institution
Publication types
Funder
Year
Limited By:
Subject = Computer Engineering;
308 items found
Sort by
Title
Author
Item type
Date
Institution
Peer review status
Language
Order
Ascending
Descending
25
50
100
per page
1
2
3
4
5
6
7
8
9
10
Bibtex
CSV
EndNote
RefWorks
RIS
XML
Displaying Results 1 - 25 of 308 on page 1 of 13
Marked
Mark
A Comparative Test of Brillouin Amplification and Erbium-doped Fiber Amplification for the Generation of Millimeter Waves with Low Phase Noise Properties
(2006)
Junker, Markus; Ammann, Max; Schwarzbacher, Andreas; Klinger, Jens; Lauterback, Kai-Utw...
A Comparative Test of Brillouin Amplification and Erbium-doped Fiber Amplification for the Generation of Millimeter Waves with Low Phase Noise Properties
(2006)
Junker, Markus; Ammann, Max; Schwarzbacher, Andreas; Klinger, Jens; Lauterback, Kai-Utwe; Schneider, Thomas
Abstract:
Measurements of phase noise of a 40-GHz carrier signal are presented. The carrier is generated by the amplification of harmonics due to stimulated Brillouin scattering. An analogy to a generation of millimeter waves by an erbium-doped fiber instead of the Brillouin amplifier is investigated and discussed. In our setup, both show a comparable behavior in respect to their noise characteristics.
https://arrow.dit.ie/engscheceart/19
Marked
Mark
A Comparison of Supervised Machine Learning Classification Techniques and Theory-Driven Approaches for the Prediction of Subjective Mental Workload
(2017)
Gmyzin, Dmitrii
A Comparison of Supervised Machine Learning Classification Techniques and Theory-Driven Approaches for the Prediction of Subjective Mental Workload
(2017)
Gmyzin, Dmitrii
Abstract:
In the modern world of technological progress, systems and interfaces are becoming more and more complex. As a consequence, it is a crucial to design the human-computer interaction in the most optimal way to improve the user experience. The construct of Mental Workload is a valid metric that can be used for such a goal. Among the different ways of measuring Mental Workload, self-reporting procedures are the most adopted for their ease of use and application. This research is focused on the application of Machine Learning as an alternative to theory-driven approaches for Mental Workload measurement. In particular, the study is aimed at comparing the classification accuracy of a set of induced models, from an existing dataset, to the mental workload indexes generated by well-known subjective mental workload assessment techniques - namely the Nasa Task Load Index and the Workload profile instruments.
https://arrow.dit.ie/scschcomdis/101
Marked
Mark
A Complex Social Network Analyses of Online Finanical Communties in Times of Geopolitcal Military and Terrorist Events
(2014)
Usher, James
A Complex Social Network Analyses of Online Finanical Communties in Times of Geopolitcal Military and Terrorist Events
(2014)
Usher, James
Abstract:
Given the advances in technology the field of social network analysis has very much hit the forefront in recent years. The information age harnesses the use of social network analysis for multiple industries and for solving complex problems. Social network analysis is an important tool in the world of the military and counter intelligence, whether it’s the capture of Osama Bin Laden or uncovering hidden Al Qaeda terrorist networks, the world around us is built on networks, be that hidden or otherwise. Online social networks give new information in the world of intelligence agencies similarly online financial communities such as Yahoo Finance gives intelligent information to knowledge hungry investors. This thesis is concerned with the exploration and exploitation of online financial community dynamics and networks using social network analysis (SNA) as a mechanism. Social network analysis measurement techniques will be applied to understand the reaction of online investors to milita...
https://arrow.dit.ie/scschcomdis/77
Marked
Mark
A CORBA-base Integration of Distributed Electronic Healthcare Records using the Synapses Approach
(1998)
Grimson, Jane; Grimson, William; Berry, Damon; Stephens, Gaye; Felton, Eoghan; Kalra, D...
A CORBA-base Integration of Distributed Electronic Healthcare Records using the Synapses Approach
(1998)
Grimson, Jane; Grimson, William; Berry, Damon; Stephens, Gaye; Felton, Eoghan; Kalra, Dipak; Toussaint, Pieter; Weir, Onno
Abstract:
The ability to exchange in a meaningful, secure, and simple fashion relevant healthcare data about patients is seen as vital in the context of efficient and cost-effective shared or team-based care. The electronic healthcare record (EHCR) lies at the heart of this information exchange, and it follows that there is an urgent need to address the ability to share EHCR's or parts of records between carers and across distributed health information systems. This paper presents the Synapses approach to sharing based on a standardized shared record, the Federated Healthcare Record, which is implemented in an open and flexible manner using the Common Object Request Broker Architecture (CORBA). The architecture of the Federated Healthcare Record is based on the architecture proposed by the Technical Committee 251 of the European Committee for Standardization.
https://arrow.dit.ie/diraaart/6
Marked
Mark
A Framework for the Analysis and User-Driven Evaluation of Trust on the Semantic Web
(2014)
Clarke, Peter
A Framework for the Analysis and User-Driven Evaluation of Trust on the Semantic Web
(2014)
Clarke, Peter
Abstract:
This project will examine the area of trust on the Semantic Web and develop a framework for publishing and verifying trusted Linked Data. Linked Data describes a method of publishing structured data, automatically readable by computers, which can linked to other heterogeneous data with the purpose of becoming more useful. Trust plays a significant role in the adoption of new technologies and even more so in a sphere with such vast amounts of publicly-created data. Trust is paramount to the effective sharing and communication of tacit knowledge (Hislop, 2013). Up to now, the area of trust in Linked Data has not been adequately addressed, despite the Semantic Web stack having included a trust layer from the very beginning (Artz and Gil, 2007). Some of the most accurate data on the Semantic Web lies practically unused, while some of the most used linked data has high numbers of errors (Zaveri et al., 2013). Many of the datasets and links that exist on the Semantic Web are out of date a...
https://arrow.dit.ie/scschcomdis/53
Marked
Mark
A framework for the introduction of organisational learning using Web 2.0 applications
(2007)
Reynolds, Joseph M.
A framework for the introduction of organisational learning using Web 2.0 applications
(2007)
Reynolds, Joseph M.
Abstract:
We are now becoming more and more dependent on web technologies in our personal lives for our communication, information and entertainment needs. But what about using these skills and technologies for our business lives, could they transform the business world in the same way they have transformed our personal world? The purpose of this research was to investigate whether the latest web applications could be successfully implemented into an organisation who wished to transform itself into a modern and flexible organisation. This research was primarily focused on introducing organisational learning into the business through the use of new technology and adapting the corporate culture to facilitate change. Outlined in this work were the main challenges involved; modifying the organization mainly through the use of Senge Five Disciplines and the successful introduction of the changes required whether they be technical or otherwise. New technologies such as blogs and wikis are rarely be...
https://arrow.dit.ie/scschcomdis/11
Marked
Mark
A Hardware One-Time Pad Prototype Generator for Localising Cloud Security
(2017)
Blackledge, Jonathan; Tobin, Paul; Tobin, lee; McKeever, Mick
A Hardware One-Time Pad Prototype Generator for Localising Cloud Security
(2017)
Blackledge, Jonathan; Tobin, Paul; Tobin, lee; McKeever, Mick
Abstract:
Abstract: In this paper, we examine a system for encrypting data before storing in the Cloud. Adopting this system gives excellent security to stored data and complete control for accessing data by the client at different locations. The motivation for developing this personal encryption came about because of poor Cloud security and doubts over the safety of public encryption algorithms which might contain backdoors. However, side-channel attacks and other unwanted third-party interventions in Cloud security, probably contribute more to the poor security record history. These factors led to the development of a prototype for personalising security locally which defeats cryptanalysis. The key distribution problem associated with random binary sequences called one-time-pads, does not exist for one-to-Cloud applications, unlike bidirectional communications where it was a big issue. The random binary sequences were generated from chaotic analogue oscillators with initial conditions from ...
https://arrow.dit.ie/engscheleart/258
Marked
Mark
A Java Framework for Computer Vision
(2015)
Sheridan, Stephen
A Java Framework for Computer Vision
(2015)
Sheridan, Stephen
Abstract:
This paper outlines a framework implemented entirely in Java that attempts to give students exposure to computer vision systems from a practical standpoint. Various tools and technologies are introduced that will allow a student to acquire an input image through a WebCam, extract useful information from that input image and finally, attempt to make sense of the input.
https://arrow.dit.ie/itbj/vol3/iss2/6
Marked
Mark
A knowledge management initiative in a juvenile detention school
(2008)
Sweeney, Noel
A knowledge management initiative in a juvenile detention school
(2008)
Sweeney, Noel
Abstract:
The preservation of knowledge has been a human endeavour since the dawn of time. Using whatever resources possible, humans have recorded knowledge for the purpose of bequeathing it to the next generations. With each technological advance, it would appear that the resources available for recording knowledge have improved. Not only this, but with each advance, the accessibility and availability to this knowledge has been enhanced; and in our present times, the impact of technology has made it easier than ever before. As with education, the consequence of making knowledge more available and accessible is the creation of more knowledgeable individuals - individuals who live in a modern society, which has been termed the knowledge society. The potential of these knowledgeable individuals or knowledge workers as key assets in the production of services and goods is well recognised. Knowledge management has emerged, hand in hand, with this new breed of worker. As a tool, organisations are ...
https://arrow.dit.ie/scschcomdis/5
Marked
Mark
A Knowledge-driven Distributed Architecture for Context-Aware Systems
(2015)
Lupiana, Dennis
A Knowledge-driven Distributed Architecture for Context-Aware Systems
(2015)
Lupiana, Dennis
Abstract:
As the number of devices increases, it becomes a challenge for the users to use them effectively. This is more challenging when the majority of these devices are mobile. The users and their devices enter and leave different environments where different settings and computing needs may be required. To effectively use these devices in such environments means to constantly be aware of their whereabouts, functionalities and desirable working conditions. This is impractical and hence it is imperative to increase seamless interactions between the users and devices,and to make these devices less intrusive. To address these problems, various responsive computing systems, called context- aware systems, have been developed. These systems rely on architectures to perceive their physical environments in order to appropriately and effortlessly respond. Currently, the majority of the existing architectures focus on acquiring data from sensors, interpreting and sharing it with these systems.
https://arrow.dit.ie/sciendoc/156
Marked
Mark
A Mobile ECG Monitoring System with Context Collection
(2009)
Li, Jin Peng; Berry, Damon; Hayes, Richard
A Mobile ECG Monitoring System with Context Collection
(2009)
Li, Jin Peng; Berry, Damon; Hayes, Richard
Abstract:
Preventative health management represents a shift from the traditional approach of reactive treatment-based healthcare towards a proactive wellness-management approach where patients are encouraged to stay healthy with expert support when they need it, at any location and any time. This work represents a step along the road towards proactive, preventative healthcare for cardiac patients. It seeks to develop a smart mobile ECG monitoring system that requests and records context information about what is happening around the subject when an arrhythmia event occurs. Context information about the subject’s activities of daily living will, it is hoped, provide an enriched data set for clinicians and so improve clinical decision making. As a first step towards a mobile cardiac wellness guideline system, the authors present a system which can receive bio-signals that are wirelessly streamed across a body area network from Bluetooth enabled electrocardiographs. The system can store signals ...
https://arrow.dit.ie/teapotcon/24
Marked
Mark
A Model for Anomalies Detection in Internet of Things (IoT) Using Inverse Weight Clustering and Decision Tree
(2017)
Alghuried, Ahod
A Model for Anomalies Detection in Internet of Things (IoT) Using Inverse Weight Clustering and Decision Tree
(2017)
Alghuried, Ahod
Abstract:
Internet of Things (IoT) is one of the fast growing technologies today. It is a technology by which billions of smart objects or devices known as “Things” can use several types of sensors to collect various types of data about themselves and/or the surrounding environment. They can then share this with authorized parties to serve several purposes such as controlling and monitoring industrial facilities or improving business service or functions. There are currently 3 billion devices connected to the Internet. The number will increase to 20 billion by 2020. While these devices make our life easier, safer and healthier, they are expanding the number of attack targets available to hackers. Therefore, protecting these devices from adversaries and unauthorized access and modification is very important. This research proposes a novel approach for anomalies detection in IoT systems based on a combination of two robust machine learning algorithms; inverse weight clustering (IWC) and C4.5 de...
https://arrow.dit.ie/scschcomdis/103
Marked
Mark
A New Educational Mobile Devices Platform for Social Inclusion in Tanzania
(2016)
Mtenzi, Fredrick
A New Educational Mobile Devices Platform for Social Inclusion in Tanzania
(2016)
Mtenzi, Fredrick
Abstract:
Abstract— It is evident that advances in technology has led to improvement in societal wellbeing. In this paper we demonstrate how mobile phones are used in providing reliable and quality education to students in disadvantaged areas of Tanzania. The main contribution is on leveraging on the success that Tanzania has had on using mobile banking to the un-banked population. These lessons are adapted to the education sector, where clever/smart integration of existing disruptive technologies such as mobile phones and social networks are be used to provide access to high quality educational contents. Further, the paper shows how educational content can be localized/adopted with a view of empowering teachers and the educational needs of students. The central piece of the proposed system is the ability to add, share and reduce the amount of redundancy. Finally, we report on the implementation of the system in a community project in rural Tanzania.
https://arrow.dit.ie/scschcomart/50
Marked
Mark
A Novel and Domain-Specific Document Clustering and Topic Aggregation Toolset for a News Organisation
(2015)
McMahon, Claire
A Novel and Domain-Specific Document Clustering and Topic Aggregation Toolset for a News Organisation
(2015)
McMahon, Claire
Abstract:
Large collections of documents are becoming increasingly common in the news gathering industry. A review of the literature shows there is a growing interest in datadriven journalism and specifically that the journalism profession needs better tools to understand and develop actionable knowledge from large document sets. On a daily basis, journalists are tasked with searching a diverse range of document sets including news gathering services, emails, freedom of information requests, court records, government reports, press releases and many other types of generally unstructured documents. Document clustering techniques can help address problems of understanding the ever expanding quantities of documents available to journalists by finding patterns within documents. These patterns can be used to develop useful and actionable knowledge which can contribute to journalism. News articles in particular are fertile ground for document clustering principles. Term weighting schemes assign imp...
https://arrow.dit.ie/scschcomdis/71
Marked
Mark
A Numerical Methodology to Fully Elucidate the Altered Wall Shear Stress in a Stented Coronary Artery
(2010)
Murphy, Jonathan; Boyle, Fergal
A Numerical Methodology to Fully Elucidate the Altered Wall Shear Stress in a Stented Coronary Artery
(2010)
Murphy, Jonathan; Boyle, Fergal
Abstract:
Arterial restenosis after coronary stenting is caused by excessive tissue growth which is stimulated by arterial injury and alterations to the hemodynamic wall shear stress (WSS). Recent numerical studies have predicted only minor differences in the altered WSS between different stent designs using a commonly employed threshold assessment technique. While it is possible that there are only minor differences, it is more likely that this assessment technique is incapable of fully elucidating the alterations to the WSS created by stent implantation. This paper proposes a methodology that involves a more complete investigation into the stentinduced alterations of WSS by incorporating the full suite of WSS-based variables: WSS, WSS gradient (WSSG), WSS angle gradient (WSSAG) and oscillatory shear index (OSI). The four variables are analyzed quantitatively and qualitatively to assess the effect of the stent implantation. The methodology is applied to three stents with contrasting designs:...
https://arrow.dit.ie/engschmecart/17
Marked
Mark
A process for appraising commerical usability evaluation methods.
(1999)
Fitzpatrick, Ronan; Dix, Alan
A process for appraising commerical usability evaluation methods.
(1999)
Fitzpatrick, Ronan; Dix, Alan
Abstract:
Recent international quality standards and European Community legislation have identified new software quality factors. These new factors include suitability, installability and adaptability. Other quality factors need to be reviewed in the light of these developments. This has impacted on established commercial usability evaluation methods to the extent that it is appropriate to ask if these evaluation methods comply with the new standards and legislation. In order to answer this question the commercial evaluation methods need to be appraised (meta-evaluation) using a suitable method appraisal process. This paper describes such an appraisal process which specifically addresses the many considerations raised by the standards and the law. The appraisal method consists of two parts which provide an overview of the commercial method and a methodical analysis of how it complies. By combining this analysis with a weighting and rating technique the appraised method can achieve a score whi...
https://arrow.dit.ie/scschcomcon/9
Marked
Mark
A quiet success story in the laboratory: survey of 30 implementations of the ASTM 1394 standard for analyser interfaces
(2010)
Markey, Brian; Berry, Damon
A quiet success story in the laboratory: survey of 30 implementations of the ASTM 1394 standard for analyser interfaces
(2010)
Markey, Brian; Berry, Damon
Abstract:
In 1991 the American Society of Testing and Materials (ASTM) introduced the first version of a standard called ASTM E1394-91 for communication between centralised clinical analysers and host systems. For nearly 20 years this low key standard has been used as the basis for analyser host communications. A minor revision of the standard (ASTM1394-97) was published in 1998. This work gives a brief summary of the development of lab messages that led to the introduction and continued use of the standard. The authors also present a review and preliminary analysis of 30 implementations of ASTM E1394. The authors investigated 30 relevant analyser interfaces in order to identify the successfuland unsuccessful features of the ASTM E1394-97 standard by assessing the compliance and non-compliance of the chosen implementations with respect to different features of the standard.
https://arrow.dit.ie/teapotcon/14
Marked
Mark
A Regression Study of Salary Determinants in Indian Job Markets for Entry Level Engineering Graduates
(2016)
Singh, Rajveer
A Regression Study of Salary Determinants in Indian Job Markets for Entry Level Engineering Graduates
(2016)
Singh, Rajveer
Abstract:
The economic liberalisation of Indian markets in early 90s boosted the economic growth of the nation in various sectors over the next two decades. One such sector that has seen a massive growth in this time is Information Technology (IT). The IT industry has played a very crucial role in transforming India from a slow moving economy to one of the largest exporters of IT services. This growth created a huge demand in the labour markets for skilled labour, which in turn made engineering one of the top choices of study after high school over the years. In addition, the earning potential and an opportunity to contribute to technology advancements after engineering, makes it a popular choice of study. These growth dynamics along with the diversified education and labour markets demands gives insight into the factors affecting the employment outcomes of engineering students. This research study focuses on studying the key salary determinants for entry-level engineering graduates in India ...
https://arrow.dit.ie/scschcomdis/90
Marked
Mark
A Review of Negation in Clinical Texts
(2008)
Kelleher, John; Mac Namee, Brian
A Review of Negation in Clinical Texts
(2008)
Kelleher, John; Mac Namee, Brian
Abstract:
Negation is commonly seen in clinical documents [Chapman et al., 2001a] ”In clinical reports the presence of a term does not necessarily indicate the presence of the clinical condition represented by that term. In fact, many of the most frequently described findings and diseases in discharge summaries, radiology reports, history and physical exams, and other transcribed reports are denied in the patient” [Chapman et al., 2001b, page. 301].
https://arrow.dit.ie/scschcomrep/5
Marked
Mark
A Review of Parallel Mappings for Feed Forward Neural Networks using the Backpropagation Learning Algorithm
(2015)
Sheridan, Stephen
A Review of Parallel Mappings for Feed Forward Neural Networks using the Backpropagation Learning Algorithm
(2015)
Sheridan, Stephen
Abstract:
The Back-Propagation (BP) Neural Network (NN) is probably the most well known of all neural networks. Many mappings of the BP NN have been implemented for both special purpose and general-purpose computers. This mapping process can fall into one of two categories: heuristic mapping and algorithmic mapping. Heuristic mapping concentrates on the architecture and behaviour of the network as it trains whereas algorithmic mapping concentrates on the parallelization of the learning algorithm. Mappings in the heuristic category tend to take a trial and error approach based on the understanding of the network and of the target machine. In comparison mappings in the algorithmic category tend to take a more theoretical approach to the parallelization process. A number of heuristic mapping schemes exist for BP networks so it is worthwhile to investigate their strengths and weaknesses.
https://arrow.dit.ie/itbj/vol2/iss2/3
Marked
Mark
A Review of Situation Identification Techniques in Pervasive Computing
(2012)
Ye, Juan; Dobson, Simon; McKeever, Susan
A Review of Situation Identification Techniques in Pervasive Computing
(2012)
Ye, Juan; Dobson, Simon; McKeever, Susan
Abstract:
Pervasive systems must offer an open, extensible, and evolving portfolio of services which integrate sensor data from a diverse range of sources. The core challenge is to provide appropriate and consistent adaptive behaviours for these services in the face of huge volumes of sensor data exhibiting varying degrees of precision, accuracy and dynamism. Situation identification is an enabling technology that resolves noisy sensor data and abstracts it into higher-level concepts that are interesting to applications. We provide a comprehensive analysis of the nature and characteristics of situations, discuss the complexities of situation identification, and review the techniques that are most popularly used in modelling and inferring situations from sensor data. We compare and contrast these techniques, and conclude by identifying some of the open research opportunities in the area.
https://arrow.dit.ie/scschcomart/47
Marked
Mark
A Similarity Matrix for Irish Traditional Dance Music
(2010)
Lavin, Padraic
A Similarity Matrix for Irish Traditional Dance Music
(2010)
Lavin, Padraic
Abstract:
It is estimated that there are between seven and ten thousand Irish traditional dance tunes in existence. As Irish musicians travelled the world they carried their repertoire in their memories and rarely recorded these pieces in writing. When the music was passed down from generation to generation by ear the names of these pieces of music and the melodies themselves were forgotten or changed over time. This has led to problems for musicians and archivists when identifying the names of traditional Irish tunes. Almost all of this music is now available in ABC notation from online collections. An ABC file is a text file containing a transcription of one or more melodies, the tune title, musical key, time signature and other relevant details. The principal aim of this project is to define a process by which Irish music can be compared using string distance algorithms. An online survey will then be conducted to assess if human participants agree with the computer comparisons. Improvement...
https://arrow.dit.ie/scschcomdis/30
Marked
Mark
A Study of SIP Based Instant Messaging Focusing on the Effects of Network Traffic Generated Due to Presence
(2008)
McKeon, Finnian
A Study of SIP Based Instant Messaging Focusing on the Effects of Network Traffic Generated Due to Presence
(2008)
McKeon, Finnian
Abstract:
The increasing usage of Instant Messaging(IM) applications worldwide continues to grow year on year. However, larger numbers of users creates problems with greater network traffic, interoperability and proprietary protocol dependence. Network traffic due to presence information being exchanged between users and servers needs to be considered, but is it possible to estimate or measure this traffic? There have been very few studies performed on the impact of presence traffic. The purpose of this research is to implement a SIP/SIMPLE network environment that will allow the evaluation of key metrics such as the latency and throughput of the network under a number of scenarios. It will be shown that the amount of network traffic generated due to presence subscriptions can grow large, and the effects of this on network performance will be analysed. From this analysis, it will be shown that SIP/SIMPLE presence traffic has a steady, predictable impact on the performance of the network. It w...
https://arrow.dit.ie/ittscicon/4
Marked
Mark
A Survey of Procedural Techniques for City Generation
(2017)
Kelly, George; McCabe, Hugh
A Survey of Procedural Techniques for City Generation
(2017)
Kelly, George; McCabe, Hugh
Abstract:
The computer game industry requires a skilled workforce and this combined with the complexity of modern games, means that production costs are extremely high. One of the most time consuming aspects is the creation of game geometry, the virtual world which the players inhabit. Procedural techniques have been used within computer graphics to create natural textures, simulate special effects and generate complex natural models including trees and waterfalls. It is these procedural techniques that we intend to harness to generate geometry and textures suitable for a game situated in an urban environment. Procedural techniques can provide many benefits for computer graphics applications when the correct algorithm is used. An overview of several commonly used procedural techniques including fractals, L-systems, Perlin noise, tiling systems and cellular basis is provided. The function of each technique and the resulting output they create are discussed to better understand their characteri...
https://arrow.dit.ie/itbj/vol7/iss2/5
Marked
Mark
A synthesised knowledge mapping framework to embed a KM strategy using topic maps and wikis: the Tao of Wiki
(2008)
McMahon, Colman A.J.
A synthesised knowledge mapping framework to embed a KM strategy using topic maps and wikis: the Tao of Wiki
(2008)
McMahon, Colman A.J.
Abstract:
Just getting started with knowledge management can be difficult enough for many organisations, however the real challenge is actually how to embed the new practices. The expression "Success is a journey, not a destination" is particularly apt for KM. This research presents findings from stakeholder analyses carried out in an Irish government agency. The agency has been on its KM journey for nearly four years and has attempted to implement a comprehensive and full-scale strategy. The findings indicate that KM practices have not yet become fully embedded in the organisation. This research uncovers some of the reasons why not. In an effort to remediate the situation, it was thought a visual computer map of the organisation's knowledge assets would help. This would satisfy several goals simultaneously, from "findability", to modernisation, to improved efficiency. It is known from studies in pedagogy and psychology that the human mind is particularly well adapted...
https://arrow.dit.ie/scschcomdis/3
Displaying Results 1 - 25 of 308 on page 1 of 13
1
2
3
4
5
6
7
8
9
10
Bibtex
CSV
EndNote
RefWorks
RIS
XML
Institution
Dublin City University (48)
Dublin Institute of Technology (260)
Item Type
Book (1)
Book chapter (2)
Conference item (63)
Journal article (43)
Master thesis (taught) (73)
Report (5)
Other (121)
Year
2020 (11)
2019 (3)
2018 (5)
2017 (47)
2016 (31)
2015 (41)
2014 (13)
2013 (9)
2012 (27)
2011 (10)
2010 (17)
2009 (21)
2008 (27)
2007 (7)
2006 (7)
2005 (8)
2004 (6)
2003 (3)
2002 (1)
2001 (1)
2000 (2)
1999 (2)
1998 (3)
1996 (1)
1995 (2)
1994 (2)
1991 (1)
built by Enovation Solutions