scholarly journals Designing and Implementing of An Online Library Managment System

2017 ◽  
Vol 5 (3) ◽  
pp. 278
Author(s):  
Maiwan B. Abdulrazaq ◽  
Omar M. Mustafa

One of the most important fields in education is library. The library is a fast-growing system. The traditional methods of maintaining it are no longer dynamic and efficient. For expeditious retrieval and dissemination of information and better service for the clientele, an application of modern techniques has become absolutely indispensable. A properly computerized library will help its users with quick and prompt services. Therefore, this Paper produces an efficient Online Library Management System (OLMS) for university campus. The main purpose of this Paper is to design and implement the (OLMS). The OLMS consists of two modules: External Pages Module and Internal Pages Module. The first module is with limited operation such as (viewing, searching and registration request). The second module for the personal account can do the operations like (storing, searching, viewing, borrowing, downloading and etc.). The system controllers are two types. The first one is the (Co_Admin) which can manage library operation. The second one is the administrator which can create and manage university libraries and also can create (Co_Admin) for each faculty library. The system can generate different types of reports and can also calculate the (fines) on the users, also any request or response will be done by E-Mail and short message service (SMS). The OLMS was designed and implemented by using (MySQL, HTML, CSS, PHP, JavaScript, JQuery, Ajax and Bootstrap) techniques. The system was tested in two phases: the first phase identifies the views and preferences of users with the specification of the system outputs, depending on the requirements of the proposed system. The second phase measures the abilities of the system through System Usability Scale (SUS) technique with the contribution of 26 potential users of the system and the recorded rate 76% as overall satisfaction of OLMS implementation. A reasonable degree of compatibility and harmony between the university and the system requirements of application has been found in the University of Zakho.

Author(s):  
Ankit Kumar Jain ◽  
Sumit Kumar Yadav ◽  
Neelam Choudhary

Smishing attack is generally performed by sending a fake short message service (SMS) that contains a link of the malicious webpage or application. Smishing messages are the subclass of spam SMS and these are more harmful compared to spam messages. There are various solutions available to detect the spam messages. However, no existing solution, filters the smishing message from the spam message. Therefore, this article presents a novel method to filter smishing message from spam message. The proposed approach is divided into two phases. The first phase filters the spam messages and ham messages. The second phase filters smishing messages from spam messages. The performance of the proposed method is evaluated on various machine learning classifiers using the dataset of ham and spam messages. The simulation results indicate that the proposed approach can detect spam messages with the accuracy of 94.9% and it can filter smishing messages with the accuracy of 96% on neural network classifier.


2020 ◽  
Vol 12 (1) ◽  
pp. 21-38 ◽  
Author(s):  
Ankit Kumar Jain ◽  
Sumit Kumar Yadav ◽  
Neelam Choudhary

Smishing attack is generally performed by sending a fake short message service (SMS) that contains a link of the malicious webpage or application. Smishing messages are the subclass of spam SMS and these are more harmful compared to spam messages. There are various solutions available to detect the spam messages. However, no existing solution, filters the smishing message from the spam message. Therefore, this article presents a novel method to filter smishing message from spam message. The proposed approach is divided into two phases. The first phase filters the spam messages and ham messages. The second phase filters smishing messages from spam messages. The performance of the proposed method is evaluated on various machine learning classifiers using the dataset of ham and spam messages. The simulation results indicate that the proposed approach can detect spam messages with the accuracy of 94.9% and it can filter smishing messages with the accuracy of 96% on neural network classifier.


2019 ◽  
Vol 3 (Supplement_1) ◽  
pp. S78-S79
Author(s):  
Melissa L Cannon ◽  
Renata Kerwood ◽  
Mandie Kondash ◽  
Samuel Rowley ◽  
Hannah Wehr

Abstract As evidenced by the growing Age-Friendly University (AFU) global network, institutions of higher education are increasingly seeking ways to enhance the experiences of older adults who use them for reasons such as lifelong learning, career development, and intergenerational engagement. This multi-phase study explored the barriers and facilitators for older adults accessing a public university in a small Oregon town. The first phase of the study involved survey data collection from 46 members of the local senior center adjacent to the university campus. For the second phase, researchers recruited a sample from the survey respondents and used snowball sampling to conduct 12 interviews with senior center members, past and current senior center directors, and key contacts among university staff. The third phase of data collection paired student researchers with older adult research participants (N=14) in participatory action research to capture the unique perspectives of the research participants visiting the university campus using photovoice and a follow-up focus group. Quantitative data were analyzed using SPSS while qualitative data were analyzed using team coding and intensive group discussion to develop categories and themes. Findings revealed various opportunities to increase age-friendliness according to the principles outlined by the AFU initiative, such as developing a lifelong learning center on campus, strengthening the university-senior center partnership, and removing accessibility barriers in order to make the university campus friendlier for people of all ages and abilities. These findings are being used in a proposal to join the AFU network and to shape the university’s AFU vision.


Author(s):  
Roger E. A. Farmer

The indeterminacy school in macroeconomics exploits the fact that macroeconomic models often display multiple equilibria to understand real-world phenomena. There are two distinct phases in the evolution of its history. The first phase began as a research agenda at the University of Pennsylvania in the United States and at CEPREMAP in Paris in the early 1980s. This phase used models of dynamic indeterminacy to explain how shocks to beliefs can temporarily influence economic outcomes. The second phase was developed at the University of California Los Angeles in the 2000s. This phase used models of incomplete factor markets to explain how shocks to beliefs can permanently influence economic outcomes. The first phase of the indeterminacy school has been used to explain volatility in financial markets. The second phase of the indeterminacy school has been used to explain periods of high persistent unemployment. The two phases of the indeterminacy school provide a microeconomic foundation for Keynes’ general theory that does not rely on the assumption that prices and wages are sticky.


2012 ◽  
Vol 6 (2) ◽  
pp. 1181-1204 ◽  
Author(s):  
E. W. Burgess ◽  
R. R. Forster ◽  
C. F. Larsen ◽  
M. Braun

Abstract. A 2008–2011 surge of Bering Glacier, Alaska is examined using observations of surface velocity and surface elevation change. Velocity measurements are obtained using synthetic aperture radar (SAR) offset tracking and elevation data are obtained from the University of Alaska Fairbanks LiDAR altimetry program. Bering Glacier began to surge in May 2008 and had two phases of accelerated flow. The first phase accelerated progressively for at least 10 months and reached peak observed velocities of ~7 m d−1. Results suggest that during the quiescent phase, prior to the surge, periods of accelerated flow increased driving stresses up to 70% in a ~10 km-long section of the Lower Bering. When the first phase of the surge initiated, synchronous acceleration occurred throughout much of the glacier length, indicating widespread pressurization of the bed, but the largest accelerations initiated at the location where driving stress built up during quiescence. From there, rapid flow velocities propagated upstream and downstream across much of the glacier length and transpired as small, transient and unorganized propagation fronts. The second phase occurred in 2011 and was of comparable scale to the surge in 1993–1995, with velocities exceeding 9 m d−1 or ~18 times quiescent velocities.


Author(s):  
Brent C Roe

The University Librarian at Laurentian University in Sudbury, Ontario, Canada, describes the experience and actions of the Laurentian University Library and Archives in the context of the Covid-19 pandemic over the spring and summer of 2020. The sudden shutdown of the university campus in March 2020 entailed financial strains that had direct consequences for library management, affecting operations, collection access and staffing. The shutdown itself was an extreme disruption to the provision of library and archival services. The pandemic and the campus shutdown were experienced as disorienting and stressful for library employees, although work continued as well as possible. Over the course of the summer, a kerbside pickup and scanning service was launched, a HathiTrust membership was sought, on-site archival work was restarted and plans were prepared for opening library space for study.


Sign in / Sign up

Export Citation Format

Share Document