Unified Citation Management and Visualization Using Open Standards

Author(s):  
Mark Ginsburg

Scientific research is hindered when there are artificial barriers preventing the efficient and straightforward sharing of bibliographic information. In today’s computing world, the barriers take the form of incompatible bibliographic formats and constraining operating-system and vendor dependencies. These incompatible platforms isolate the respective camps. In this chapter, we demonstrate and discuss a new approach to unify citation management: the Open Citation System (OCS). OCS uses open XML standards and Java-component technologies. By providing converter tools to migrate citations to a centralized hub in BiblioML format (an XML tag set based on the UniMARC standard), we then make use of XML topic maps to provide an extensible framework for visualization. We take as an example the ACM classification code and show how the OCS system displays citations in a convenient focus and context hyperbolic tree interface. We conclude by discussing future directions planned to extend the OCS system and how open citation management can supply an important piece in our inexorable march toward a worldwide digital library.

Author(s):  
Sultanov A. ◽  
Tajiboev E.

This article reveals the attention paid to music education in Uzbekistan, the new approach implemented in the education system, the development of pedagogical educational technologies and modern methods based on long-term independence.


2021 ◽  
Vol 54 (6) ◽  
pp. 1-36
Author(s):  
Shufan Fei ◽  
Zheng Yan ◽  
Wenxiu Ding ◽  
Haomeng Xie

Trusted Execution Environments (TEEs) have been widely used in many security-critical applications. The popularity of TEEs derives from its high security and trustworthiness supported by secure hardware. Intel Software Guard Extensions (SGX) is one of the most representative TEEs that creates an isolated environment on an untrusted operating system, thus providing run-time protection for the execution of security-critical code and data. However, Intel SGX is far from the acme of perfection. It has become a target of various attacks due to its security vulnerabilities. Researchers and practitioners have paid attention to the security vulnerabilities of SGX and investigated optimization solutions in real applications. Unfortunately, existing literature lacks a thorough review of security vulnerabilities of SGX and their countermeasures. In this article, we fill this gap. Specifically, we propose two sets of criteria for estimating security risks of existing attacks and evaluating defense effects brought by attack countermeasures. Furthermore, we propose a taxonomy of SGX security vulnerabilities and shed light on corresponding attack vectors. After that, we review published attacks and existing countermeasures, as well as evaluate them by employing our proposed criteria. At last, on the strength of our survey, we propose some open challenges and future directions in the research of SGX security.


Big Data ◽  
2016 ◽  
pp. 1582-1612 ◽  
Author(s):  
Alessandro Marcengo ◽  
Amon Rapp

Although in recent years the Quantified Self (QS) application domain is growing, there are still some palpable fundamental problems that relegate the QS movement in a phase of low maturity. The first is a technological problem, and specifically, a lack of maturity in technologies for the collection, processing, and data visualization. This is accompanied by a perhaps more fundamental problem of deficit, bias, and lack of integration of aspects concerning the human side of the QS idea. The step that the authors tried to make in this chapter is to highlight aspects that could lead to a more robust approach in QS area. This was done, primarily, through a new approach in data visualization and, secondly, through a necessary management of complexity, both in technological terms and, for what concerns the human side of the whole issue, in theoretical terms. The authors have gone a little further stressing how the future directions of research could lead to significant impacts on both individual and social level.


Author(s):  
S. Nassir Ghaemi

This chapter explores the need for a new approach in psychiatry other than the biopsychosocial (BPS) model, the Diagnostic and Statistical Manual of Mental Disorders (DSM), and neurobiology. Pierre Loebel and Julian Savulescu, in their introduction to this book, laid out an honourable purpose, seeking to make sense of psychiatric conditions holistically. They hoped the BPS model could serve this purpose. The model has done so in part, but also, after half a century of effort, it has failed to do so in the end. The goals are worthy and the seekers of those goals have integrity. But perhaps their intentions will be best served by something else, a successor to the past BPS model, built on a rejection of a false DSM diagnostic system as well as a purely neurobiological approach to research. In the end, what Loebel and his colleagues want to do is to preserve a place for humanism in psychiatry, and to link clinical practice to solid scientific research. These laudable principles can be achieved only by a radical departure from the DSM-based neurobiological conventional wisdom of the present and the past.


2004 ◽  
Vol 19 (1) ◽  
pp. 46-57 ◽  
Author(s):  
C.A. Schuh ◽  
T.G. Nieh

The development of instrumented nanoindentation equipment has occurred concurrently with the discovery of many new families of bulk metallic glass during the past decade. While indentation testing has long been used to assess the mechanical properties of metallic glasses, depth-sensing capabilities offer a new approach to study the fundamental physics behind glass deformation. This article is a succinct review of the research to date on the indentation of metallic glasses. In addition to standard hardness measurements, the onset of plasticity in metallic glasses is reviewed as well as the role of shear banding in indentation, structural changes beneath the indenter, and rate-dependent effects measured by nanoindentation. The article concludes with perspectives about the future directions for nanocontact studies on metallic glasses.


Author(s):  
Sonia Zouaoui ◽  
Lotfi Boussaid ◽  
Abdellatif Mtibaa

<p>This paper introduce a new approach for scheduling algorithms which aim to improve real time operating system CPU performance. This new approach of CPU Scheduling algorithm is based on the combination of round-robin (RR) and Priority based (PB) scheduling algorithms. This solution maintains the advantage of simple round robin scheduling algorithm, which is reducing starvation and integrates the advantage of priority scheduling. The proposed algorithm implements the concept of time quantum and assigning as well priority index to the processes. Existing round robin CPU scheduling algorithm cannot be dedicated to real time operating system due to their large waiting time, large response time, large turnaround time and less throughput. This new algorithm improves all the drawbacks of round robin CPU scheduling algorithm. In addition, this paper presents analysis comparing proposed algorithm with existing round robin scheduling algorithm focusing on average waiting time and average turnaround time.</p>


2015 ◽  
Vol 10 (1) ◽  
pp. 196-209
Author(s):  
Brian Matthews ◽  
Shirley Crompton ◽  
Catherine Jones ◽  
Simon Lambert

In this paper we consider the requirements for preserving the memory of science.  This is becoming more challenging as data volumes and rates continue to increase.  Further, to capture a full picture of the scientific memory we need to move beyond the bit preservation challenge to consider how to capture research in context, represent the meaning of the data, and how to interpret data in relation to other scientific artefacts distributed in multiple information spaces. We review the progress of scientific research into the digital preservation of science over the last decade, emphasising in particular the research and development programme of STFC. We conclude with a number of observations into the future directions of research and also the practical deployment of policy and infrastructure to effectively preserve the scientific memory.


Sign in / Sign up

Export Citation Format

Share Document