scholarly journals EXTENSIBLE INFORMATION BROKERS

2002 ◽  
Vol 11 (01) ◽  
pp. 95-115 ◽  
Author(s):  
JIANGUO LU ◽  
JOHN MYLOPOULOS

The number and size of information services available on the internet has been growing exponentially over the past few years. This growth has created an urgent need for information agents that act as brokers in the sense that they can autonomously search, gather, and integrate information on behalf of a user. To remain useful, such brokers will have to evolve throughout their lifetime to keep up with evolving and ever-changing information services. This paper proposes a framework named XIB (eXtensible Information Brokers) for building and evolving information brokers. The XIB takes as input a description of required information services and supports the interactive generation of an integrated query interface. It also generates wrappers for each information service dynamically. Once the query interface and wrappers are in place, the user can specify a query and get back a result which integrates data from all wrapped information sources. The XIB depends heavily on XML-related techniques. More specifically, we use DTDs to model the input and output of each service, and XML to represent both input and output values. Based on such representations, the paper investigates service integration in the form DTD integration, and studies query decomposition in the form of XML element decomposition. Within the proposed framework, it is easy to add or remove information services to a broker, thereby facilitating maintenance, evolution and customization of information brokers.

2022 ◽  
pp. 1-21
Author(s):  
Ngozi Perpetua Osuchukwu ◽  
Grace Temilolu Ikenna ◽  
Nelly Gospel Godwin ◽  
Adefunke Sarah Ebijuwa ◽  
Olatunji Sunday Olabisi

This chapter examined the input and output of WikiAfLibs training, the struggles, and lessons learned. The study used spidergram design of 5Ws and 1H (who, what, where, why, when, and how). Instruments used were online questionnaire and FGD. The participants were librarians in the #WikiAfLibs Cohort 1 drawn from Anglophone countries. It was discovered that live sessions, office hours, and learning resources were mostly favored among the activities (39% and 33%, respectively). Respondents used personal data subscriptions (75%) and received the training from their homes. Some have joined Wikipedia communities in their countries and have received funds. They struggled with cost of data subscription, fear of internet disruption, and not meeting the deadline of the assignments. They agreed that Wikipedia would give librarians more visibility, enrich services, and build partnerships. The findings imply that librarians' full embrace of Wikipedia will add value to information services. The study concluded that librarians should integrate Wikipedia in information service delivery.


2014 ◽  
Vol 687-691 ◽  
pp. 1966-1969 ◽  
Author(s):  
Qiu Dong Yu ◽  
Yun Chen Tian ◽  
Xu Feng Hua

With the advent of the third information revolution, the internet of things (IOT) and cloud computing, as the representative of the emerging field of information technology, began in force. As an important part of the information, agricultural information has opportunities and challenges. The current agricultural information service information integration is low, real-time information is not enough, personalized service issues is incomplete. This paper proposes an integrated agricultural information service model IOT building programs and cloud computing. The program implements networking technology and cloud computing technology docked in the field of agricultural information service, a better solution to the shortage of agricultural information service in the presence of current, reducing the threshold for the use of agricultural information services, improving the efficiency of agricultural information services.


2014 ◽  
Vol 945-949 ◽  
pp. 2971-2976
Author(s):  
Ning Wang ◽  
Fei Sun ◽  
Xiao Hong Shan

As an emerging industry of strategic importance, the development of information service industry has been compelling. By analyzing the development process of the information services industry in the past decade, we can learn that the information service is in warm now. Through establishing an ARMIA model, this study draw conclusion that the industry development index will rise steadily and slowly in 2014. The findings can help government, investors, consumer get a close understanding of the Information Service Industry and take it as a basis for decision making.


Resonance ◽  
2020 ◽  
Vol 1 (2) ◽  
pp. 191-210
Author(s):  
Joshua Hudelson

Over the past decade, ASMR (Autonomous Sensory Meridian Response) has emerged from whisper-quiet corners of the Internet to become a bullhorn of speculation on the human sensorium. Many consider its sonically induced “tingling” to be an entirely novel, and potentially revolutionary, form of human corporeality—one surprisingly effective in combating the maladies of a digitally networked life: insomnia, anxiety, panic attacks, and depression. Complicating these claims, this article argues that ASMR is also neoliberal repackaging of what Marx called the reproduction of labor power. Units of these restorative “tingles” are exchanged for micro-units of attention, which YouTube converts to actual currency based on per-1,000-view equations. True to the claims of Silvia Federici and Leopoldina Fortunati, this reproductive labor remains largely the domain of women. From sweet-voiced receptionists to fawning sales clerks (both of whom are regularly role-played by ASMRtists), sonic labor has long been a force in greasing the gears of capital. That it plays a role in production is a matter that ASMRtists are often at pains to obscure. The second half of this article performs a close reading of what might be considered the very first ASMR film: Chantal Akerman’s Jeanne Dielman, 23 quai du Commerce, 1080 Bruxelles. Through this film, the exploitative dimensions of ASMR can be contrasted with its potential for creating protected spaces of financial independence and nonnormative corporeal practices.


Author(s):  
Lindsey C Bohl

This paper examines a few of the numerous factors that may have led to increased youth turnout in 2008 Election. First, theories of voter behavior and turnout are related to courting the youth vote. Several variables that are perceived to affect youth turnout such as party polarization, perceived candidate difference, voter registration, effective campaigning and mobilization, and use of the Internet, are examined. Over the past 40 years, presidential elections have failed to engage the majority of young citizens (ages 18-29) to the point that they became inclined to participate. This trend began to reverse starting in 2000 Election and the youth turnout reached its peak in 2008. While both short and long-term factors played a significant role in recent elections, high turnout among youth voters in 2008 can be largely attributed to the Obama candidacy and campaign, which mobilized young citizens in unprecedented ways.


2019 ◽  
Author(s):  
Seigo Mitsutake ◽  
Ai Shibata ◽  
Kaori Ishii ◽  
Rina Miyawaki ◽  
Koichiro Oka

BACKGROUND To develop websites that enhance Internet users’ health knowledge, it is important to identify relevant factors associated with obtaining health knowledge via the Internet. Although an association between eHealth literacy (eHL) and knowledge of colorectal cancer (CRC) has been reported, little is known whether eHL is associated with obtaining knowledge of CRC via the Internet. OBJECTIVE This study aimed to compare the results obtained from Internet users with high or low eHL in searching and using a reputable cancer website to gain CRC knowledge. METHODS This study used respondents to Internet based pre-and post-surveys conducted in 2012. Potential respondents (n = 3,307) were identified from registered individuals aged 40–59 years (n = 461,160) in a Japanese Internet survey company. A total of 1,069 participants responded (response rate: 32.3%), and these pre-survey responders were then divided into high or low eHL groups using the Japanese eHealth Literacy Scale median score (23.5 points). From each group, 130 randomly selected individuals were invited to review the contents of a reputable CRC website, the Cancer Information Service managed by the National Cancer Center, and to respond to a post-survey via e-mail; responses were obtained from 107 individuals from each group. Twenty responses to knowledge statements regarding the definition, risk factors, screening prevention and symptoms of CRC were obtained at pre- and post-surveys, and differences in the correct responses between high and low eHL groups compared using the McNemar test. RESULTS The mean age of the participants was 49.1 (5.5) years. Four statements showed a significant increase in correct responses in both eHL groups pre- and post-survey: “S4. The risk of CRC is greater as a person gets older” (high eHL: P = 0.039, low eHL: P = 0.012), “S8. Cigarette smoking is a risk factor for CRC” (high eHL: P < 0.001, low eHL: P = 0.020), “S11. Obesity is a risk factor for CRC” (high eHL: P = 0.030, low eHL: P = 0.047), and “S12. Excess alcohol consumption is a risk factor for CRC” (high eHL: P = 0.002, low eHL: P = 0.003). Three statements showed a statistically significant increase in correct responses in the high eHL group only: “S1. CRC is cancer of the colon or rectum” (P = 0.003), “S5. The risk of CRC is the same between men and women” (P = 0.041), and “S9. Red meat intake is a risk factor for CRC” (P = 0.002), whereas only one response did in the low eHL group: “S17. Bloody stools are a symptom of CRC” (P = 0.004). CONCLUSIONS Low eHL Internet users appeared less capable of obtaining knowledge of CRC through searching and understanding information from a reputable cancer website than high eHL Internet users.


Author(s):  
Imam Riadi ◽  
Iwan Tti Riyadi Yanto ◽  
Eko Handoyo

Safe academic services are the most important part of universities. The security of academic services is very important to maintain information optimally and safely. Along with the development of technology, academic information services are often misused by some irresponsible parties that can cause threats. To prevent these things from happening, it is necessary to know the extent of governance of higher education academic information system security by evaluating. So the research was conducted to determine the maturity of the security of Higher Education academic information service security by using the COBIT 5 framework in the DSS05 domain. The DSS05 domain in COBIT 5 is a good framework for use in implementing and evaluating the security of academic information services. Meanwhile, to determine the achievement of the evaluation of the security level of academic information systems, the Indonesian e-government ranking (PEGI) method is required. The combination of the COBIT 5 framework in the DSS05 domain using the PEGI method in academic information security service is able to provide a level of achievement in the form of Customer Value. The results of the COBIT 5 framework analysis of the DSS05 domain using the PEGI method get a score of 3.50 so that the quality of academic information service security evaluation achievement is at a very good level. At this level, universities are increasingly open to technological development. Higher education has applied the concept of quantification in every process, and has always been monitored and controlled for its performance in the security of academic information systems.


2021 ◽  
Vol 155 ◽  
pp. 107174 ◽  
Author(s):  
Jianxin Wang ◽  
Ming K. Lim ◽  
Chao Wang ◽  
Ming-Lang Tseng

2021 ◽  
Vol 64 (1) ◽  
pp. 23-40
Author(s):  
Katrien Pype

AbstractIn the 2016 Abiola Lecture, Mbembe argued that “the plasticity of digital forms speaks powerfully to the plasticity of African precolonial cultures and to ancient ways of working with representation and mediation, of folding reality.” In her commentary, Pype tries to understand what “speaking powerfully to” can mean. She first situates the Abiola Lecture within a wide range of exciting and ongoing scholarship that attempts to understand social transformations on the continent since the ubiquitous uptake of the mobile phone, and its most recent incarnation, the smartphone. She then analyzes the aesthetics of artistic projects by Alexandre Kyungu, Yves Sambu, and Hilaire Kuyangiko Balu, where wooden doors, tattoos, beads, saliva, and nails correlate with the Internet, pixels, and keys of keyboards and remote controls. Finally, Pype asks to whom the congruence between the aesthetics of a “precolonial” Congo and the digital speaks. In a society where “the past” is quickly demonized, though expats and the commercial and political elite pay thousands of dollars for the discussed art works, Pype argues that this congruence might be one more manifestation of capitalism’s cannibalization of a stereotypical image of “Africa.”


1999 ◽  
Vol 40 (1) ◽  
pp. 97-104
Author(s):  
Susan Brady

Over the past decade academic and research libraries throughout the world have taken advantage of the enormous developments in communication technology to improve services to their users. Through the Internet and the World Wide Web researchers now have convenient electronic access to library catalogs, indexes, subject bibliographies, descriptions of manuscript and archival collections, and other resources. This brief overview illustrates how libraries are facilitating performing arts research in new ways.


Sign in / Sign up

Export Citation Format

Share Document