Long paper presented during the Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries (BIRNDL 2016)
Presentation made on December 7th 2016 during ICADL'16
Full text can be found at http://link.springer.com/chapter/10.1007/978-3-319-49304-6_12
Extended version can be found at https://arxiv.org/abs/1609.01415
A task-based scientific paper recommender system for literature review and ma...Aravind Sesagiri Raamkumar
My PhD oral defense presentation (as of Oct 3rd 2017)
The dissertation can be requested at this link https://www.researchgate.net/publication/323308750_A_task-based_scientific_paper_recommender_system_for_literature_review_and_manuscript_preparation
Navigation through citation network based on content similarity using cosine ...Salam Shah
The rate of scientific literature has been increased in the past few decades; new topics and information is added in the form of articles, papers, text documents, web logs, and patents. The growth of information at rapid rate caused a tremendous amount of additions in the current and past knowledge, during this process, new topics emerged, some topics split into many other sub-topics, on the other hand, many topics merge to formed single topic. The selection and search of a topic manually in such a huge amount of information have been found as an expensive and workforce-intensive task. For the emerging need of an automatic process to locate, organize, connect, and make associations among these sources the researchers have proposed different techniques that automatically extract components of the information presented in various formats and organize or structure them. The targeted data which is going to be processed for component extraction might be in the form of text, video or audio. The addition of different algorithms has structured information and grouped similar information into clusters and on the basis of their importance, weighted them. The organized, structured and weighted data is then compared with other structures to find similarity with the use of various algorithms. The semantic patterns can be found by employing visualization techniques that show similarity or relation between topics over time or related to a specific event. In this paper, we have proposed a model based on Cosine Similarity Algorithm for citation network which will answer the questions like, how to connect documents with the help of citation and content similarity and how to visualize and navigate through the document.
Presentation made on December 7th 2016 during ICADL'16
Full text can be found at http://link.springer.com/chapter/10.1007/978-3-319-49304-6_12
Extended version can be found at https://arxiv.org/abs/1609.01415
A task-based scientific paper recommender system for literature review and ma...Aravind Sesagiri Raamkumar
My PhD oral defense presentation (as of Oct 3rd 2017)
The dissertation can be requested at this link https://www.researchgate.net/publication/323308750_A_task-based_scientific_paper_recommender_system_for_literature_review_and_manuscript_preparation
Navigation through citation network based on content similarity using cosine ...Salam Shah
The rate of scientific literature has been increased in the past few decades; new topics and information is added in the form of articles, papers, text documents, web logs, and patents. The growth of information at rapid rate caused a tremendous amount of additions in the current and past knowledge, during this process, new topics emerged, some topics split into many other sub-topics, on the other hand, many topics merge to formed single topic. The selection and search of a topic manually in such a huge amount of information have been found as an expensive and workforce-intensive task. For the emerging need of an automatic process to locate, organize, connect, and make associations among these sources the researchers have proposed different techniques that automatically extract components of the information presented in various formats and organize or structure them. The targeted data which is going to be processed for component extraction might be in the form of text, video or audio. The addition of different algorithms has structured information and grouped similar information into clusters and on the basis of their importance, weighted them. The organized, structured and weighted data is then compared with other structures to find similarity with the use of various algorithms. The semantic patterns can be found by employing visualization techniques that show similarity or relation between topics over time or related to a specific event. In this paper, we have proposed a model based on Cosine Similarity Algorithm for citation network which will answer the questions like, how to connect documents with the help of citation and content similarity and how to visualize and navigate through the document.
Workshop objectives
This virtual workshop will provide information to the participants that will enhance the quality of their research publications by informing them of the peer- review process, the publication process, the structure of a research paper and by improving their scientific writing style.
Participants
This will be a participatory workshop. It is aimed at authors who wish to improve the quality of their research papers. Participants will have a manuscript in preparation or a research project ready to be written up. They will work on their draft manuscripts during the workshop to incorporate their learning from the workshop into practice. Participants will also bring 1 manuscript each from 2 of their top pick journals they want to submit to and the instructions to authors from the same.
The goal of information retrieval (IR) is to provide users with those documents that will satisfy their information need. The information need can be understood as forming a pyramid, where only its peak is made visible by users in the form of a conceptual query.
Towards Reading Session-based indicators in Educational Reading AnalyticsMadjid Sadallah
Slides at EC-TEL 2015. 10th EUROPEAN CONFERENCE ON TECHNOLOGY ENHANCED LEARNING. Design for Teaching and Learning in a networked World. - Toledo, Spain - 2015/09/17
For more course tutorials visit
www.newtonhelp.com
This Tutorial contains 2 Papers
Assignment 1: Crime Scene Investigation
Due Week 3 and worth 160 points
Preliminary investigations do not necessarily yield enough information to prosecute a criminal case. Despite a thorough preliminary investigation, many cases require a follow - up investigation. Use your textbook, the Internet, and / or Strayer Library to research articles on crime scene investigation.
Workshop objectives
This virtual workshop will provide information to the participants that will enhance the quality of their research publications by informing them of the peer- review process, the publication process, the structure of a research paper and by improving their scientific writing style.
Participants
This will be a participatory workshop. It is aimed at authors who wish to improve the quality of their research papers. Participants will have a manuscript in preparation or a research project ready to be written up. They will work on their draft manuscripts during the workshop to incorporate their learning from the workshop into practice. Participants will also bring 1 manuscript each from 2 of their top pick journals they want to submit to and the instructions to authors from the same.
The goal of information retrieval (IR) is to provide users with those documents that will satisfy their information need. The information need can be understood as forming a pyramid, where only its peak is made visible by users in the form of a conceptual query.
Towards Reading Session-based indicators in Educational Reading AnalyticsMadjid Sadallah
Slides at EC-TEL 2015. 10th EUROPEAN CONFERENCE ON TECHNOLOGY ENHANCED LEARNING. Design for Teaching and Learning in a networked World. - Toledo, Spain - 2015/09/17
For more course tutorials visit
www.newtonhelp.com
This Tutorial contains 2 Papers
Assignment 1: Crime Scene Investigation
Due Week 3 and worth 160 points
Preliminary investigations do not necessarily yield enough information to prosecute a criminal case. Despite a thorough preliminary investigation, many cases require a follow - up investigation. Use your textbook, the Internet, and / or Strayer Library to research articles on crime scene investigation.
SYLLABUSCOURSE NUMBER NGR 5110COURSE TITLE Nursing Research.docxmabelf3
SYLLABUSCOURSE NUMBER: NGR 5110
COURSE TITLE: Nursing Research
COURSE CREDITS: 3 credits
PREREQUISITES: See student handbook
1. Text and materials:
Ruth M. Tappen. (2015). Nursing Research. Advanced Nursing Research: From Theory to Practice. (2nd ed.). ISBN-13: 9781284048308. ISBN-10: 1284048306. Publisher: Jones & Bartlett Learning
Publication Manual American Psychological Association (APA) (6th ed.).
2009 ISBN: 978-1-4338-0561-5
2. Course description: This course examines the relationship of research and practice and the use of data as a basis for decision-making. Various approaches to the research process are explored. Ethical considerations in research are presented.
3. Learning Outcomes:
a. Upon successful completion of this class, the MSN student will be able to gain understanding of essential steps of the planning phase to conduct a research study: topic selection, literature review, relationship between theory and research, and the developmental stages of theory (AACN Essentials I, II, IV, V, VI, and VIII).
b. Upon successful completion of this course, the MSN student will be able to understand the necessary steps to conduct a nursing research: study design, type of study, research ethics, data collection, data analysis, implementation, and interpretation phase (AACN Essentials I, II, IV, V, VI, and VIII).
c. Upon successful completion of this course, the MSN student will be able to demonstrate the ability to use the complex steps of the reporting phase: presenting research findings, preparing research proposals, publishing results, and using evidence-based practice (AACN Essentials I, II, IV, V, VI, and VIII).
1. Objectives
a. The student will be able to identify research topics, review the literature, and interpret the developmental stages of theories (Descriptive/Explanatory/Predictive), and use a selected research article to test a theory as related to nursing practice.
b. The student will be able to apply knowledge of research methods to analyze, critique, and interpret research using the design and implementation phase of selected studies that are relevant to nursing practice
c. The student will be able to apply knowledge of research methods to analyze, critique, and interpret research using the design and implementation phase of selected studies that are relevant to nursing practice
d. The student will be able to distinguish type of studies (Qualitative/Quantitative/Experimental/Descriptive/Epidemiological/and Longitudinal) by interpreting scholarly articles.
e. The student will be able to demonstrate knowledge of the reporting phase of nursing research by preparing a research proposal using a poster or a virtual presentation.
f. The student will be able to conduct an individual research by writing a paper based on a research proposal reflecting evidence-based nursing practice.
4. Course Requirements
· Assignments: (Please also refer to assignment section in Blackboard)
Library Assignment # 1: AACN Essential Pape.
Presentation made during the Intelligent User-Adapted Interfaces: Design and Multi-Modal Evaluation Workshop (IUadaptME) workshop conducted as part of UMAP 2018
Strategies for using technology to organize a promotion and tenure portfolioRebecca Reck
At most universities, promotion and tenure decisions are made based on performance in three categories: teaching, research, and service. During the review for promotion, the candidate presents a portfolio with evidence of their work in binders which are intended to tell the professional story of the candidate while on the tenure-track. Wankat and Oreovicz suggest creating a schedule for technical research and publishing over your entire probationary period and keeping a record of activities to ensure nothing is missed in your portfolio. This presentation provides tips and resources for maintaining and archiving artifacts for tenure and promotion.
Using Knowledge Graph for ExplainableRecommendation of External Content inEle...Behnam Rahdari
Over the last 10 years, the world experienced a rapid increase in volume and diversity of digital learning resources. The abundance of digital resources could support a range of powerful educational scenarios, which were not available before. In this paper, we introduce a novel approach that combines fully automatic knowledge modeling, student modeling, and content recommendation approaches to recommend relevant Wikipedia articles for students working with online electronic textbooks. An assessment of our approach with real classroom data indicated several benefits of our approach over the baseline and revealed interesting patterns of students' behavior while using the system.
Similar to What papers should I cite from my reading list? User evaluation of a manuscript preparatory assistive task (20)
Measuring the Outreach Efforts of Public Health Authorities and the Public Re...Aravind Sesagiri Raamkumar
JMIR paper presented during the Annul ID Symposium conducted Saw Swee Hock School of Public Health (National University of Singapore)
Main paper accessible at https://www.jmir.org/2020/5/e19334/
Evolution and state-of-the art of Altmetric research: Insights from network a...Aravind Sesagiri Raamkumar
Evolution and state-of-the art of Altmetric research: Insights from network analysis and altmetric analysis
Authors: Hiran Lathabai, Thara Prabhakaran, Manoj Changat
Workshop Website: http://www.altmetrics.ntuchess.com/AROSIM2018/
Scientometric Analysis of Research Performance of African Countries in select...Aravind Sesagiri Raamkumar
Scientometric Analysis of Research Performance of African Countries in selected subjects within the field of Science and Technology
Author: Yusuff Utieyineshola
Workshop Website: http://www.altmetrics.ntuchess.com/AROSIM2018/
New Dialog, New Services with Altmetrics: Lingnan University Library ExperienceAravind Sesagiri Raamkumar
New Dialog, New Services with Altmetrics: Lingnan University Library Experience
Authors: Sze Lui, Sheila Cheung, Cindy Kot, Kammy Chan
Workshop Website: http://www.altmetrics.ntuchess.com/AROSIM2018/
Field-weighting readership: how does it compare to field-weighting citations?
Authors: Sarah Huggett, Eleonora Palmaro, Christopher James
Workshop Website: http://www.altmetrics.ntuchess.com/AROSIM2018/
How do Scholars Evaluate and Promote Research Outputs? An NTU Case Study
Authors: Han Zheng, Mojisola Erdt, Yin-Leng Theng
Workshop Website: http://www.altmetrics.ntuchess.com/AROSIM2018/
Monitoring the broad impact of the journal publication output on country leve...Aravind Sesagiri Raamkumar
Monitoring the broad impact of the journal publication output on country level: A case study for Austria
Authors: Juan Gorraiz, Benedikt Blahous, Martin Wieland
Workshop Website: http://www.altmetrics.ntuchess.com/AROSIM2018/
A Comparative Investigation on Citation Counts and Altmetrics between Papers ...Aravind Sesagiri Raamkumar
A Comparative Investigation on Citation Counts and Altmetrics between Papers Authored by Universities and Companies in the Research Field of Artificial Intelligence
Authors: Feiheng Luo, Han Zheng, Mojisola Erdt, Aravind Sesagiri Raamkumar, Yin-Leng Theng
Workshop Website: http://www.altmetrics.ntuchess.com/AROSIM2018/
Presentation deck prepared for the paper 'Object Recognition-based Mnemonics Mobile App for Senior Adults Communication' to be presented during ICCCNT'15 conference
The objective here is to present my personal teaching philosophy which will direct my teaching in the future and it outlines how I understand the dynamics of learning. Document prepared as a part of the teaching assistantship course
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
What papers should I cite from my reading list? User evaluation of a manuscript preparatory assistive task
1. What papers should I cite from my reading list?
User evaluation of a manuscript preparatory
assistive task
Aravind Sesagiri Raamkumar, Schubert Foo & Natalie Pang
Wee Kim Wee School of Communication and Information
Nanyang Technological University, Singapore
Presentation for BIRNDL’16
June 23th
2016
1
2. •Information Retrieval (IR) and Recommender Systems (RS) techniques
have been used to address:-
Literature Review (LR) search tasks
Explicit and implicit ad-hoc information needs
•Examples of such tasks include
Building a reading list of research papers
Finding similar papers
Recommending papers based on query logs
Recommending papers based on publication history
Serendipitous discovery of interesting papers and more….
What about recommending papers during manuscript preparation
(MP)?
BACKGROUND
2
3. • Recommending papers based on Citation Contexts in manuscripts
• Recommending new papers based on To-Be-Cited papers from the
draft manuscript’s bibliography
• Recommending papers based on the full text of the draft
manuscript
What more could be done?
Few ideas….
Explore the total list of papers compiled during literature review
Explore the article-type preference to vary recommendations
correspondingly?
ADDRESSED SCENARIOS IN MP
3
4. ENTER REC4LRW…
• Rec4LRW is a task-based assistive system that offers
recommendations for the below tasks:-
Task 1 – Building an initial reading list of research papers
Task 2 – Finding similar papers based on a seed set of papers
(multiple papers)
Task 3 – Shortlisting papers from the final reading list based
on article-type preference
• The system is based on a threefold intervention framework
1.Task reconceptualization
For better meeting the task requirements
1.Novel informational display features
For speeding up the relevance judgement decisions
1.Task interconnectivity
For establishing the natural relationships between tasks
4
5. REC4LRW USAGE SEQUENCE
Execute Task 1
with a research
topic
Select papers
from Task 1 to
the seed basket
Execute Task 2
with the seed
basket papers
Select papers
from Task 2 to
the final reading
list
Need
more
papers?
Execute Task 3
with the final
reading list
papers
Y
N
5
6. CORPUS
• ACM DL extract of papers published between 1951 and 2011 used
as corpus
• 103,739 articles and corresponding 2,320,345 references
• AnyStyle (https://anystyle.io) parser used to extract article title, venue
and year from references
• Data stored in a MySQL database with the tables related using a
partial snowflake schema
6
7. • OBJECTIVE: To identify the important papers from the final reading list
and vary recommendations count based on article-type preference
Input: P – set of papers in the final reading list
AT – article-type choice of the user
1: RC the average references count retrieved for AT
2: R list of retrieved citations & references of papers from P
3: G directed sparse graph created with papers from R
4: run edge betweenness algorithm on G to form cluster set C
5: S final list of shortlisted papers
6: if |C| > RC then
7: while |S | = RC
8: for each cluster in C do
9: sort papers in the cluster on citation count
10: s top ranked paper from the cluster
11: add s to S
12: end for
13: end while
14: else
15: N 0
16. while |S | = RC
17: N N +1
18: for each cluster in C do
19: sort papers in the cluster on citation count
20: s N ranked paper from the cluster
21: add s to S
22: end for
23: end while
24: end if
25: display papers from S to user
TASK OBJECTIVE AND STEPS
7
8. USER EVALUATION STUDY
OBJECTIVE: To ascertain the usefulness and effectiveness
of the task to researchers
Ascertain the agreement percentages of the evaluation
measures
Identify the top preferred and critical aspects of the task
through the subjective feedback of the participants
Feedback responses were coded by a single coder using an
inductive approach
Measure Question
Relevance The shortlisted papers are relevant to my article-type preference
Usefulness The shortlisted papers are useful for inclusion in my manuscript
Importance The shortlisted papers comprises of important papers from my reading list
Certainty The shortlisted list comprises of papers which I would definitely cite in my manuscript
Good_List This is a good recommendation list, at an overall level
Improvement_Needed There is a need to further improve this shortlisted papers list
Shortlisting_Feature
I would like to see the feature of shortlisting papers from reading list based on article-type
preference, in academic search systems and databases
8
9. STUDY INFORMATION
• The study was conducted between November 2015 and January 2016
• Pre-screening survey conducted to identify participants who have authored at
least one journal or conference paper
• 116 participants completed the whole study inclusive of the three tasks in the
system
• 57 participants were Ph.D./Masters students while 59 were research staff,
academic staff and librarians
• The average research experience for students was 2 years while for staff, it
was 5.6 years
• 51% of participants were from the computer science, electrical and
electronics disciplines, 35% from information and communication studies
discipline while 14% from other disciplines
9
10. STUDY PROCEDURE
Step 1: Participant selects one of the available 43 topics for executing task 1
Step 2: Re-run task 1 and select at least five papers for the seed basket
Step 3: Execute task 2 with the seed basket papers
Step 4: Re-run task 2 (and task 1) to select at least 30 papers for the final
reading list
Step 5: Execute task 3 with the final reading list papers and article-type
preference
•Four article-type choices: conference full paper, poster, case study and a
generic research paper
10
12. RESULTS
• Biggest differences found for the below measures:-
• Usefulness (82.00% for students, 64.15% for staff)
• Good_List (76.00% for students, 62.26% for staff)
• The measures with the highest agreement:-
• Importance (85.96% for students, 77.97% for staff)
• Shortlisting_Feature (84.21% for students, 74.58% for staff)
12
13. QUALITATIVE FEEDBACK
• The newly introduced informational display features were a big hit
• The purely experimental nature of the study affected the experience of
participants
• Task’s effectiveness needs to be validated with a longitudinal study with a
large collection of papers in the final reading list
Rank Preferred Aspects Categories Critical Aspects Categories
1 Shortlisting Feature & Rec. Quality (24%) Rote Selection of Papers (16%)
2 Information Cue Labels (15%) Limited Dataset Issue (5%)
3 View Papers in Clusters (11%) Quality can be Improved (5%)
4 Rich Metadata (7%) Not Sure of the Usefulness of the Task (4%)
5 Ranking of Papers (3%) UI can be Improved (3%)
13
14. LIMITATIONS
• Lack of an offline evaluation experiment
• Study procedure involved selection of comparatively fewer number of papers
in the final reading list
• Not much variations in the final shortlisted papers for the different article-type
preferences
• Information displayed in a purely textual manner
14
15. FUTURE WORK
• The scope for this task will be expanded to bring in more variations for the
different article-type choices
• Inclusion of new papers in the output which could have been missed during
the literature review
• Provide more user control in the system so that the user can select papers as
mandatory to be shortlisted
• Integrate this task with the citation context recommendation task
• Represent the information in the form of citation graphs
15
16. GET ACCESS TO REC4LRW…
Click the link http://goo.gl/XgynzY or scan the below QR code
16
Acknowledgements
National Research Foundation, Prime Minister’s Office, Singapore
under its International Research Centres in Singapore Funding Initiative
and administered by the Interactive Digital Media Programme Office