Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 3 |
Descriptor
Source
Information Processing and… | 7 |
British Journal of… | 1 |
Information Systems | 1 |
International Journal of… | 1 |
Journal of Technology and… | 1 |
Journal of the American… | 1 |
Author
Al-Kharashi, Ibrahim A. | 1 |
Anthony Pachay | 1 |
Chen, L. T. | 1 |
Chengbo Zhang | 1 |
Duval Carvajal | 1 |
Elboraey, F. | 1 |
Evens, Martha W. | 1 |
Geovanny Brito | 1 |
Hagadone-Bedir, Mariah | 1 |
Ivan Jaramillo | 1 |
Kraft, Donald H. | 1 |
More ▼ |
Publication Type
Reports - Research | 15 |
Journal Articles | 12 |
Opinion Papers | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Location
China | 1 |
Saudi Arabia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ivan Jaramillo; Geovanny Brito; Anthony Pachay; Duval Carvajal – Journal of Technology and Science Education, 2023
Data repositories currently constitute essential programs within institutions. In fact, universities are the primary institutions that promote the creation, management and storage for the safekeeping of a variety of documents, data and/or projects. This work is carried out within the framework of institutional need and the application of knowledge…
Descriptors: Archives, Information Storage, Universities, Algorithms
Hagadone-Bedir, Mariah; Voithofer, Rick; Kulp, Jessica T. – British Journal of Educational Technology, 2023
This conceptual study uses dynamic systems theory (DST) and phenomenology as lenses to examine data privacy implications surrounding wearable devices that incorporate stakeholder, contextual and technical factors. Wearable devices can impact people's behaviour and sense of self, and DST and phenomenology provide complementary approaches for…
Descriptors: Privacy, Information Security, Assistive Technology, Systems Approach
Yaohua Huang; Chengbo Zhang – International Journal of Web-Based Learning and Teaching Technologies, 2024
This study combines link grammar (LG) detector with N-grammar model to analyze and evaluate grammar in compositions. And then the composition level is judged through information entropy. Finally, the composition score is calculated based on the overall composition level and grammar weight. The experimental results show that the combined weight of…
Descriptors: Grammar, Student Evaluation, Artificial Intelligence, Writing (Composition)

Raita, Timo; Teuhola, Jukka – Information Processing and Management, 1989
Presents three text compression methods of increasing power and evaluates each based on the trade-off between compression gain and processing time. The advantages of using hash coding for speed and optimal arithmetic coding to successor information for compression gain are discussed. (26 references) (Author/CLB)
Descriptors: Algorithms, Comparative Analysis, Data Processing, Efficiency

Sharma, Ravi – Information Processing and Management, 1989
Introduces two distribution schemes that partition documents over multiple processors and the corresponding multiprocessor retrieval algorithms that match relevant documents to user queries. The suggested framework is based on a general purpose hypercube multicomputer architecture with a dedicated disk for each node. A timing analysis for the…
Descriptors: Algorithms, Cost Effectiveness, Efficiency, Information Retrieval

Zaki, M.; Elboraey, F. – Information Processing and Management, 1985
Investigates applicability of inverted file processing in magnetic bubble memories by presenting four magnetic bubble memory models as storage mediums: one based on a major-minor loop configuration; one utilizing a decoder design on a magnetic bubble memory chip; and two based on different structural configurations of the first two. (MBR)
Descriptors: Algorithms, Classification, Computer Storage Devices, Data Processing

Mazur, Zygmunt – Information Processing and Management, 1979
Examines through a series of mathematical models (theorems, descriptions, and examples), properties and operations on inverted files, which are used in an information retrieval system based on thesaurus with weighted descriptors. (CWM)
Descriptors: Algorithms, Indexes, Information Processing, Information Retrieval

Waller, W. G.; Kraft, Donald H. – Information Processing and Management, 1979
Analyzes the use of weights to denote a query representation and/or the indexing of a document as a generalization of a Boolean retrieval system. Criteria are given for the functions used to evaluate the relevance of the records to a specific query and a new evaluation approach is suggested. (CWM)
Descriptors: Algorithms, Evaluation Criteria, Information Processing, Information Retrieval

Radecki, Tadeusz – Information Processing and Management, 1979
Presents a new method of document retrieval based on the fundamental operations of fuzzy set theory. Basic notions are introduced. Then the syntax and semantics of the proposed language for document retrieval is given, and an algorithm allocating documents to particular queries is described and its properties are discussed. (Author/CWM)
Descriptors: Algorithms, Information Processing, Information Retrieval, Information Storage

Willett, Peter – Information Processing and Management, 1981
Describes a fast algorithm for comparing the lists of terms representing documents in automatic classification experiments. Complexity and running time for the algorithm are compared to other procedures, and a short algol-like routine is presented in the appendix. Eight references are included. (Author/BK)
Descriptors: Algorithms, Automatic Indexing, Classification, Documentation

Chen, L. T.; And Others – Information Systems, 1995
This paper addresses the problem of data management techniques for efficiently retrieving requested subsets of large data sets from mass storage devices. Describes the development of algorithms and software that facilitate the partitioning of a large data set into multiple "clusters" that reflect their expected access. (Author/JKP)
Descriptors: Algorithms, Computer Software Development, Data Processing, Database Management Systems
Stellhorn, William Howard – 1974
Response time in large, inverted file document retrieval systems is determined by time required to access files of document identifiers on disk and process a Boolean search request. A specialized computer system has been devised that can perform a complicated sample search involving 70 terms and over 60,000 document references 12 to 60 times…
Descriptors: Algorithms, Computer Storage Devices, Computers, Data Processing
Salton, Gerard – 1974
The twenty-second in a series, this report describes research in information organization and retrieval conducted by the Department of Computer Science at Cornell University. The report covers work carried out during the period summer 1972 through summer 1974 and is divided into four parts: indexing theory, automatic content analysis, feedback…
Descriptors: Algorithms, Computer Programs, Computer Science, Content Analysis
Zunde, Pranas – 1973
STITE (Scientific and Technical Information Transfer for Education) is basically a system to interface between science information and the science learner. As such STITE acts as a link between STIC (Science and Technology Infromation Centers) and LIS (Learning Information Systems). In this second progress report the internal knowledge of STITE is…
Descriptors: Algorithms, Computer Assisted Instruction, Indexing, Information Centers

Al-Kharashi, Ibrahim A.; Evens, Martha W. – Journal of the American Society for Information Science, 1994
Describes experiments in Arabic information retrieval using 29 queries against a base of 355 bibliographic records. Using roots and stems as index terms worked better than words, and the root performed as well as or better than the stem at low recall levels and definitely better at high recall levels. (Contains 30 references.) (KRN)
Descriptors: Algorithms, Arabic, Bibliographic Databases, Comparative Analysis