scholarly journals The Information Retrieval Competencies of Students Faced with Remote and Blended Teaching

2021 ◽  
Vol 24 (3) ◽  
pp. 446-464
Author(s):  
Alla Aleksandrovna Vitukhnovskaya

The article describes the problems and features of information retrieval activity of students amid the extreme transition of universities to remote education. The results of a student survey are described, allowing to gain some initial insights into the information retrieval competencies of students in a new reality, when the only opportunity for them is remote access to electronic information systems and electronic educational resources. The competencies necessary for effective information retrieval in a remote and blended teaching have been listed and characterized.

Author(s):  
Richard E. Hartman ◽  
Roberta S. Hartman ◽  
Peter L. Ramos

We have long felt that some form of electronic information retrieval would be more desirable than conventional photographic methods in a high vacuum electron microscope for various reasons. The most obvious of these is the fact that with electronic data retrieval the major source of gas load is removed from the instrument. An equally important reason is that if any subsequent analysis of the data is to be made, a continuous record on magnetic tape gives a much larger quantity of data and gives it in a form far more satisfactory for subsequent processing.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1819
Author(s):  
Rasa Bruzgiene ◽  
Konstantinas Jurgilas

Information systems of critical infrastructure provide services on which the core functions of a state and its economy depend as well as welfare of society. Such systems are becoming an increasingly common target for crimes and attacks in cyberspace, as their vulnerabilities can be exploited for malicious activities seeking financial or political gain. One of the main reasons that threatens the security of these systems is the weak control of remote access, otherwise defined as management of a system’s user identity. Management of user identity depends on user authentication, authorization and the assignment of certain rights in the digital space. This paper provides the proposed two-factor (2FA) digital authentication method for remote access to an information system of a critical infrastructure. Results of testing the method’s usability and resilience to cyber threats have shown that the system, in which the method was implemented, is protected from dangerous HTTP requests and publicly available system’s endpoints are protected from threatening inputs that could cause malicious activities on the critical infrastructure. Additionally, the implementation of the authentication API application ensures the rapidity of the method for less than 500 ms for 100 users working in parallel with the system at the same time.


Basic approaches to creating hardware and software for radiation monitoring information systems have been developed in the article. A modern information system for radiation monitoring and control that requires a comprehensive approach and an iterative process of its creation has been developed. The proposed approach to integrating local measuring devices with cloud services, using M2M/IoT technology for remote measurements, advanced semiconductor sensors based on CdTe and CdZnTe radiation detectors, modern microcontroller and communication microchips is highly promising. Developed hardware and software solutions demonstrate increased accuracy due to hardware and software correction of measurement results. A variant of the architectural solution for building a platform for remote access to dosimetric and radiometric measurements is being developed. The solution lies in the direction of improving the parameters of detectors, as well as the characteristics of electronic modules of detecting systems and creating software for controlling the detection process, collecting and digital processing of information, and its adequate presentation to users online. The architecture and structural diagram of a dosimetric system, a sequence diagram, a diagram of a dosimetric system with a subsystem for data exchange over the Internet have been created. A new algorithm for measuring the exposure dose rate of ionizing radiation has been proposed. The block diagram of a microcontroller dosimeter has been developed. The algorithm for correcting the dependence of the sensitivity of the detector based on CdZnTe on the energy of the detected gamma quanta has already been proposed. The algorithm significantly reduces the uncertainty of measuring the radiation dose rate. The architecture and block diagram of the dosimetric system with the possibility of remote access and remote control of the main functions has been presented as well. The calculation of the exposure dose of gamma radiation and the power of the exposure dose with the energy dependence correction have been used. The system elements have proved to be useful for students’ distant laboratory work during the quarantine.


2011 ◽  
pp. 178-184
Author(s):  
David Parry

The World Wide Web (WWW) is a critical source of information for healthcare. Because of this, systems for allowing increased efficiency and effectiveness of information retrieval and discovery are critical. Increased intelligence in web pages will allow information sharing and discovery to become vastly more efficient .The semantic web is an umbrella term for a series of standards and technologies that will support this development.


Author(s):  
Angela Carrillo-Ramos ◽  
Jérôme Gensel ◽  
Marlène Villanova-Oliver ◽  
Hervé Martin

Author(s):  
William Hutchinson ◽  
Matthew Warren

Decisions are based on information. The decision maker naturally assumes that it reflects reality. Yet data, which is used to create information, is easily manipulated, and the context can be changed to influence knowledge derived from the situation. The use of deception is not new, but the advent of electronic information systems has made its potential more pervasive. This paper investigates the dilemma the information management function faces in ensuring the integrity of the data supplied, the information derived, and the knowledge created from their systems.


Author(s):  
Ludwig Slusky ◽  
Parviz Partow-Navid

This chapter introduces the development of a Unix Lab at the Department of Information Systems at California State University, Los Angeles. It also describes the lab’s impact on our curriculum and the future plans for the inclusion of remote access and wireless technology.


Sign in / Sign up

Export Citation Format

Share Document