concept of information
Recently Published Documents


TOTAL DOCUMENTS

640
(FIVE YEARS 257)

H-INDEX

18
(FIVE YEARS 3)

2022 ◽  
Vol 1 (15) ◽  
pp. 229-232
Author(s):  
Nadezhda Grin

The article examines the concept of «information society» and personality as a value component of the information society. Education should be built in such a way that a person acquires not only basic knowledge to apply this knowledge in the process of work, but is able to «extract» new knowledge using modern training technologies


2022 ◽  
pp. 164-179
Author(s):  
Emily Guetzoian

This chapter discusses gamification strategies in the context of higher education student worker training. Specifically, it builds on the concepts of gamification in corporate training contexts and gamification in the academic classroom environment. It also considers various options to support gamified training content and methods to support student worker engagement and knowledge retention. It explains how these strategies relate to the concept of information literacy for an adult, higher education population. This chapter is ideal for higher education staff, faculty, or administrators who design training curricula for student workers.


2022 ◽  
pp. 42-70
Author(s):  
Jan Kalina ◽  
Nicole Tobišková

Modern advanced tools of artificial intelligence assist healthcare professionals in a variety of complex tasks related to medical care. Digitalization and automation accelerate the development and deployment of innovative artificial intelligence tools tailor-made for clinical applications; decision support systems represent an important example of such tools. This chapter is devoted to discussing the role of artificial intelligence in current and prospective medical care and ethical aspects of their deployment. As developed countries currently go through remarkable transforms of medical care involving informatization and centering around medical information and knowledge, this chapter also discusses future ideals of medical care characterized by the concept of information-based medicine. Ethical and patient safety implications of using artificial intelligence within information-based medicine are overviewed here. Specific attention is paid to mental healthcare and ethical aspects of using artificial intelligence in its context.


4open ◽  
2022 ◽  
Vol 5 ◽  
pp. 1
Author(s):  
David Ellerman

We live in the information age. Claude Shannon, as the father of the information age, gave us a theory of communications that quantified an “amount of information,” but, as he pointed out, “no concept of information itself was defined.” Logical entropy provides that definition. Logical entropy is the natural measure of the notion of information based on distinctions, differences, distinguishability, and diversity. It is the (normalized) quantitative measure of the distinctions of a partition on a set-just as the Boole–Laplace logical probability is the normalized quantitative measure of the elements of a subset of a set. And partitions and subsets are mathematically dual concepts – so the logic of partitions is dual in that sense to the usual Boolean logic of subsets, and hence the name “logical entropy.” The logical entropy of a partition has a simple interpretation as the probability that a distinction or dit (elements in different blocks) is obtained in two independent draws from the underlying set. The Shannon entropy is shown to also be based on this notion of information-as-distinctions; it is the average minimum number of binary partitions (bits) that need to be joined to make all the same distinctions of the given partition. Hence all the concepts of simple, joint, conditional, and mutual logical entropy can be transformed into the corresponding concepts of Shannon entropy by a uniform non-linear dit-bit transform. And finally logical entropy linearizes naturally to the corresponding quantum concept. The quantum logical entropy of an observable applied to a state is the probability that two different eigenvalues are obtained in two independent projective measurements of that observable on that state.


2022 ◽  
pp. 1522-1531
Author(s):  
Ayan Chatterjee ◽  
Nikhilesh Barik

Today, in the time of internet based communication, steganography is an important approach. In this approach, secret information is embedded in a cover medium with minimum distortion of it. Here, a video steganography scheme is developed in frequency domain category. Frequency domain is more effective than spatial domain due to variation data insertion domain. To change actual domain of entropy pixels of the video frames, uniform crossover of Genetic Algorithm (GA) is used. Then for data insertion in video frames, single layer perceptron of Artificial Neural Network is used. This particular concept of information security is attractive due to its high security during wireless communication. The effectiveness of the proposed technique is analyzed with the parameters PSNR (Peak Signal to Noise Ratio), IF and Payload (bpb).


Author(s):  
Gennadii Manko ◽  
Elena Titova

Recently, there has been a revival of interest in the use of the information approach in the theory of measurements. Unlike the traditional approach, information theory does not evaluate error or uncertainty, but entropy and the amount of information. This article analyzes a number of recent publications that develop ideas for the information approach. The limitations and disadvantages of both the entropy approach and the concept of uncertainty are indicated. As a compromise solution, it is proposed to use a criterion based on the Bongard’s uncertainty and useful information. The concept of information uncertainty is proposed, which is estimated by the amount of negative useful information, that is, misinformation introduced by the measuring instrument. Some methods for calculating information uncertainty are described. The problems of using the uncertainty approach are noted. This approach does not imply the use of such a generalized characteristic of measuring instruments as an accuracy class. The article proposes an analogue of the accuracy class in the form of relative informational uncertainty, expressed as a percentage. This will make it possible to evaluate the quality of the measuring instrument by a single parameter, the calculation of which requires a minimum of computational operations.


Author(s):  
М. М. Abdurazakov ◽  
Z. О. Batygov

The article deals with the problems of information security and its provision in relation to society and its educational environment, processes and relations, subjects and objects. The necessity of forming the corresponding subject-information competence of subjects, personal culture of information security is shown.It is noted that the information security of educational subjects is a specific part of the general security of education as its qualitative development in the developing information society in accordance with its properties and requirements. The concept of information security in the field of education is formulated in the context of a general concept and in the aspect of its specificity in education, its educational and educational processes, as well as in the aspect of personal, psychological, age and other properties of subjects of education. This presupposes the presence of a corresponding purposefulness of general education, which also acquires the quality of informational education, and its expression in the content of education and subject-oriented educational training. In particular, this applies to the general education subject “Informatics” as the main resource of information education, in the process of forming the relevant knowledge, competencies and personal qualities.The necessity of mandatory inclusion of the relevant topics in the content of information education in the context of information security and information protection has been substantiated: the state and problems of information security, personal security; goals and objectives of information security; legal and other aspects of information protection, means of protecting electronic data in the field of education.


Author(s):  
Alberto Albarrán-Ordás ◽  
Kai Zosseder

AbstractThe coexistence of a wide variety of subsurface uses in urban areas requires increasingly demanding geological prediction capacities for characterizing the geological heterogeneities at a small-scale. In particular, detrital systems are characterized by the presence of highly varying sediment mixtures which control the non-constant spatial distribution of properties, therefore presenting a crucial aspect for understanding the small-scale spatial variability of physical properties. The proposed methodology uses the lithological descriptions from drilled boreholes and implements sequential indicator simulation to simulate the cumulative frequencies of each lithological class in the whole sediment mixture. The resulting distributions are expressed by a set of voxel models, referred to as Di models. This solution is able to predict the relative amounts of each grain fraction on a cell-by-cell basis and therefore also derive a virtual grain size distribution. Its implementation allows the modeler to flexibly choose both the grain fractions to be modeled and the precision in the relative quantification. The concept of information entropy is adapted as a measure of the disorder state of the clasts mixture, resulting in the concept of “Model Lithological Uniformity,” proposed as a measure of the degree of detrital homogeneity. Moreover, the “Most Uniform Lithological Model” is presented as a distribution of the most prevailing lithologies. This method was tested in the city of Munich (Germany) using a dataset of over 20,000 boreholes, providing a significant step forward in capturing the spatial heterogeneity of detrital systems and addressing model scenarios for applications requiring variable relative amounts of grain fractions.


2021 ◽  
pp. 80-89
Author(s):  
V. TERNAVSKA

The article is dedicated to defining the nature of information sovereignty and its significance for the process of independent state-building through the prism of the information society paradigm. Various methodological aspects of the concept of “information sovereignty” are studied. The ratio of the categories “state sovereignty” and “information sovereignty” is analyzed. The conclusion is made that the information sovereignty is not an independent category of constitutional law, however, the concept of state sovereignty needs to be modernized by integrating the classical and new information authority of the state, which are characteristic of the globalized information world.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Svyatoslav Kotusev ◽  
Sherah Kurnia ◽  
Rod Dilnutt

PurposeInformation architecture (IA) is often understood as a comprehensive master plan for organizational data assets and is widely considered as an essential component of broader enterprise architecture (EA). However, the status and practical operationalization of IA still remain largely unclear. In order to clarify these questions, this paper investigates what instruments related to IA are actually employed in organizations.Design/methodology/approachThis study builds on the analysis of architecture practices in 27 diverse organizations. Based on the semi-structured interviews with architects and the examination of utilized architectural documents, we explore IA-related instruments with their usage scenarios that have been adopted in the studied organizations.FindingsThe authors identify 12 distinct instruments used in the industry and analyze in detail their features, properties and relationships. This paper analysis shows that these instruments are rather diverse and largely inconsistent across different organizations. The study findings also suggest that IA cannot be considered as a comprehensive plan for information, but rather as a variable set of loosely related instruments and practices that help organizations manage information.Originality/valueThe study offers a unique perspective on the concept of IA, as it is practiced in the industry today, as well as a critical scrutiny of the respective prescriptions abundant in the existing literature. Although this study does not attempt to theorize on the findings, it makes a significant empirical contribution by offering a solid evidence-based view of IA and its key instruments currently missing in the available literature.


Sign in / Sign up

Export Citation Format

Share Document