首页 > 最新文献

New Review of Information Networking最新文献

英文 中文
Examining Impacts of Spatial Correlation in Forward Error Correction Code 前向纠错码中空间相关性的影响研究
Q2 Social Sciences Pub Date : 2020-01-02 DOI: 10.1080/13614576.2020.1742767
Arun Agarwal, S. Mehta
ABSTRACT The utilization of Multiple Input Multiple Output – Orthogonal Frequency Division Multiplexing (MIMO-OFDM) has rapidly gained popularity because of its improved performance capabilities in terms of enhanced spatial diversity gain, reliability as well as the spatial multiplexing Gain. This paper discusses the effect of spatial correlation in Forward Error Correction of MIMO-OFDM system. Here, the four error correction codes, namely, Convolutional Code (CC), Low-Density Parity Check (LDPC-CC), and Reed-Solomon code (RSC-CC) is validated under three channel models, namely, Rayleigh, Rician and Additive White Gaussian Noise (AWGN). The analysis is performed using four modulation schemes such as Quadrature Phase Shift Keying (QPSK), Binary Phase Shift Keying (BPSK), Quadrature Amplitude Modulation (QAM)-16, and QAM-64. It is performed under three antenna configurations like 2 × 2, 2 × 4, and 4 × 4. Moreover, the Peak Signal to Noise Ratio (PSNR) is exploited to identify the image transmission, as well as the Bit Error Rate (BER), is exploited to identify the data transmission. In experimental results, the Turbo-CC displays better performance.
摘要:多输入多输出-正交频分复用(MIMO-OFDM)因其在增强空间分集增益、可靠性和空间复用增益方面的性能而迅速受到欢迎。本文讨论了空间相关性在MIMO-OFDM系统前向纠错中的作用。这里,在瑞利、Rician和加性高斯白噪声(AWGN)三个信道模型下验证了四种纠错码,即卷积码(CC)、低密度奇偶校验码(LDPC-CC)和里德-所罗门码(RSC-CC)。使用四种调制方案进行分析,如正交相移键控(QPSK)、二进制相移键控制(BPSK)、正交幅度调制(QAM)-16和QAM-64。它在三种天线配置下执行,如2×2、2×4和4×4。此外,利用峰值信噪比(PSNR)来识别图像传输,以及利用误码率(BER)来识别数据传输。实验结果表明,Turbo CC具有较好的性能。
{"title":"Examining Impacts of Spatial Correlation in Forward Error Correction Code","authors":"Arun Agarwal, S. Mehta","doi":"10.1080/13614576.2020.1742767","DOIUrl":"https://doi.org/10.1080/13614576.2020.1742767","url":null,"abstract":"ABSTRACT The utilization of Multiple Input Multiple Output – Orthogonal Frequency Division Multiplexing (MIMO-OFDM) has rapidly gained popularity because of its improved performance capabilities in terms of enhanced spatial diversity gain, reliability as well as the spatial multiplexing Gain. This paper discusses the effect of spatial correlation in Forward Error Correction of MIMO-OFDM system. Here, the four error correction codes, namely, Convolutional Code (CC), Low-Density Parity Check (LDPC-CC), and Reed-Solomon code (RSC-CC) is validated under three channel models, namely, Rayleigh, Rician and Additive White Gaussian Noise (AWGN). The analysis is performed using four modulation schemes such as Quadrature Phase Shift Keying (QPSK), Binary Phase Shift Keying (BPSK), Quadrature Amplitude Modulation (QAM)-16, and QAM-64. It is performed under three antenna configurations like 2 × 2, 2 × 4, and 4 × 4. Moreover, the Peak Signal to Noise Ratio (PSNR) is exploited to identify the image transmission, as well as the Bit Error Rate (BER), is exploited to identify the data transmission. In experimental results, the Turbo-CC displays better performance.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"25 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2020.1742767","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44617237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enterprise Resource Planning: Past, Present, and Future 企业资源规划:过去、现在和未来
Q2 Social Sciences Pub Date : 2020-01-02 DOI: 10.1080/13614576.2020.1742770
S. Katuu
ABSTRACT The purpose of this article is to provide a broad overview of the history and development of ERPs and outline recent developments with the advent of digital innovations like cloud computing. The research approach in this article was to review literature from both academic journals and industry reports. The article found that ERPs have changed dramatically from precursor systems like integrated control (IC) packages and material resource planning (MRP) systems. They continue to change with the advent of cloud computing, as well as digital innovations like artificial intelligence. While several articles have addressed the evolution of ERPs, this article’s unique contribution is that it covers the most recent developments, including discussions on cloud ERPs and postmodern ERPs.
摘要本文旨在全面概述ERP的历史和发展,并概述云计算等数字创新的最新发展。本文的研究方法是回顾学术期刊和行业报告中的文献。文章发现,ERP与集成控制(IC)包和材料资源计划(MRP)系统等前身系统相比发生了巨大变化。随着云计算以及人工智能等数字创新的出现,它们继续发生变化。虽然有几篇文章讨论了ERP的演变,但本文的独特贡献在于它涵盖了最新的发展,包括对云ERP和后现代ERP的讨论。
{"title":"Enterprise Resource Planning: Past, Present, and Future","authors":"S. Katuu","doi":"10.1080/13614576.2020.1742770","DOIUrl":"https://doi.org/10.1080/13614576.2020.1742770","url":null,"abstract":"ABSTRACT The purpose of this article is to provide a broad overview of the history and development of ERPs and outline recent developments with the advent of digital innovations like cloud computing. The research approach in this article was to review literature from both academic journals and industry reports. The article found that ERPs have changed dramatically from precursor systems like integrated control (IC) packages and material resource planning (MRP) systems. They continue to change with the advent of cloud computing, as well as digital innovations like artificial intelligence. While several articles have addressed the evolution of ERPs, this article’s unique contribution is that it covers the most recent developments, including discussions on cloud ERPs and postmodern ERPs.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"25 1","pages":"37 - 46"},"PeriodicalIF":0.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2020.1742770","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46946912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
An Integrated Optimization Enabled Sensor Deployment Model in Wireless Sensor Network 无线传感器网络中集成优化传感器部署模型
Q2 Social Sciences Pub Date : 2020-01-02 DOI: 10.1080/13614576.2020.1742768
P. Vishal, A. R. Babu
ABSTRACT Target coverage (TCOV) and network connectivity (NCON) are the most basic problems affecting robust data communication and environmental sensing in a wireless sensor network (WSN) application. This article proposes an intelligent Context Aware Sensor Network (CASN) for the process of sensor deployment in WSNs. Accordingly, the process is sub-divided into two phases. In the initial phase, optimal TCOV is performed; whereas, in the second phase, the proposed algorithm establishes NCON among the sensors. The objective model that meets both TCOV and NCON is evaluated as the minimization problem. This problem is solved by a new method that hybridizes the Artificial Bee Colony (ABC) algorithm and the Whale Optimization Algorithm (WOA) together, which is known as the Onlooker Probability-based WOA (OP-WOA) for the determination of optimal sensor locations. In addition, the adopted OP-WOA model is compared with the Genetic Algorithm (GA), the Particle Swarm Optimization (PSO), the ABC algorithm, Differential Evolution (DE), FireFly (FF), the WOA, and the Evolutionary Algorithm (EA)-based TCOV and NCON models. Finally, the results attained from the execution demonstrate the enhanced performance of the implemented OP-WOA technique.
在无线传感器网络(WSN)中,目标覆盖(TCOV)和网络连通性(NCON)是影响鲁棒数据通信和环境感知的最基本问题。针对传感器在无线传感器网络中的部署过程,提出了一种智能上下文感知传感器网络(CASN)。因此,该过程被细分为两个阶段。在初始阶段,执行最优TCOV;在第二阶段,该算法在传感器之间建立NCON。将同时满足TCOV和NCON的目标模型评价为最小化问题。将人工蜂群算法(ABC)与鲸鱼优化算法(WOA)相结合,提出了一种基于旁观者概率的WOA算法(OP-WOA)来确定传感器的最优位置。此外,将所采用的OP-WOA模型与遗传算法(GA)、粒子群优化(PSO)、ABC算法、差分进化(DE)、萤火虫(FF)、WOA模型以及基于进化算法(EA)的TCOV和NCON模型进行了比较。最后,执行结果证明了实现的OP-WOA技术的性能得到了提高。
{"title":"An Integrated Optimization Enabled Sensor Deployment Model in Wireless Sensor Network","authors":"P. Vishal, A. R. Babu","doi":"10.1080/13614576.2020.1742768","DOIUrl":"https://doi.org/10.1080/13614576.2020.1742768","url":null,"abstract":"ABSTRACT Target coverage (TCOV) and network connectivity (NCON) are the most basic problems affecting robust data communication and environmental sensing in a wireless sensor network (WSN) application. This article proposes an intelligent Context Aware Sensor Network (CASN) for the process of sensor deployment in WSNs. Accordingly, the process is sub-divided into two phases. In the initial phase, optimal TCOV is performed; whereas, in the second phase, the proposed algorithm establishes NCON among the sensors. The objective model that meets both TCOV and NCON is evaluated as the minimization problem. This problem is solved by a new method that hybridizes the Artificial Bee Colony (ABC) algorithm and the Whale Optimization Algorithm (WOA) together, which is known as the Onlooker Probability-based WOA (OP-WOA) for the determination of optimal sensor locations. In addition, the adopted OP-WOA model is compared with the Genetic Algorithm (GA), the Particle Swarm Optimization (PSO), the ABC algorithm, Differential Evolution (DE), FireFly (FF), the WOA, and the Evolutionary Algorithm (EA)-based TCOV and NCON models. Finally, the results attained from the execution demonstrate the enhanced performance of the implemented OP-WOA technique.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"25 1","pages":"47 - 70"},"PeriodicalIF":0.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2020.1742768","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43847991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Uplink Scheduler for WiMAX Communication System with Prevention from Security Attacks 一种有效的WiMAX通信系统上行调度及防安全攻击
Q2 Social Sciences Pub Date : 2019-07-03 DOI: 10.1080/13614576.2019.1608580
Nidhi Lal, Shishupal Kumar
ABSTRACT To provide broadband access services to customers, which resides residential and enterprise field, Worldwide Interoperability for Microwave Access (WiMAX) is one of the famous wireless technologies. WiMAX can provide high-speed data rate with large-scale coverage such that it contains a high transmission range as well as it supports high mobility with a large number of nodes. It requires scheduling algorithm in the MAC layer of its protocol stack because the number of users that want service is high in number. One of the most used scheduling algorithms is the Earliest Deadline First (EDF) but it contains certain performance limitations. As well as there is a need for security before allocation of bandwidth to the users because WiMAX is a wireless technology and may be vulnerable to lots of security attacks and if once the bandwidth is allocated to any malicious user, then the system of WiMAX communication will be under dangerous attacks. In this paper, we proposed a secure heuristic earliest deadline first uplink scheduler in the MAC layer of the WiMAX with some authorization procedures. The proposed scheme protects the allocation of bandwidth to any malicious node such that the system will be prevented from security attacks like Denial of Service (DoS), flooding attack, etc., as well as it will use heuristic approach for scheduling. Therefore, it can efficiently schedule user’s request and provide fairness to the WiMAX system and we called as Secure Heuristic EDF Uplink Scheduler (SH-EDF). The performance of SH-EDF uplink scheduler will be evaluated in the provisions of various performance metrics.
摘要全球微波接入互操作性(WiMAX)是一种著名的无线技术,旨在为居住在住宅和企业领域的客户提供宽带接入服务。WiMAX可以提供具有大规模覆盖的高速数据速率,使得其包含高传输范围并且支持具有大量节点的高移动性。它需要在其协议栈的MAC层中使用调度算法,因为需要服务的用户数量很大。最常用的调度算法之一是最早截止日期优先(EDF),但它包含某些性能限制。此外,在向用户分配带宽之前还需要安全性,因为WiMAX是一种无线技术,可能容易受到许多安全攻击,如果一旦将带宽分配给任何恶意用户,那么WiMAX通信系统将受到危险的攻击。在本文中,我们在WiMAX的MAC层中提出了一种安全的启发式最早截止日期优先上行链路调度器,该调度器具有一些授权过程。所提出的方案保护带宽分配给任何恶意节点,使系统免受拒绝服务(DoS)、洪泛攻击等安全攻击,并将使用启发式方法进行调度。因此,它可以有效地调度用户的请求,并为WiMAX系统提供公平性,我们称之为安全启发式EDF上行链路调度器(SH-EDF)。SH-EDF上行链路调度器的性能将在各种性能指标的规定中进行评估。
{"title":"An Efficient Uplink Scheduler for WiMAX Communication System with Prevention from Security Attacks","authors":"Nidhi Lal, Shishupal Kumar","doi":"10.1080/13614576.2019.1608580","DOIUrl":"https://doi.org/10.1080/13614576.2019.1608580","url":null,"abstract":"ABSTRACT To provide broadband access services to customers, which resides residential and enterprise field, Worldwide Interoperability for Microwave Access (WiMAX) is one of the famous wireless technologies. WiMAX can provide high-speed data rate with large-scale coverage such that it contains a high transmission range as well as it supports high mobility with a large number of nodes. It requires scheduling algorithm in the MAC layer of its protocol stack because the number of users that want service is high in number. One of the most used scheduling algorithms is the Earliest Deadline First (EDF) but it contains certain performance limitations. As well as there is a need for security before allocation of bandwidth to the users because WiMAX is a wireless technology and may be vulnerable to lots of security attacks and if once the bandwidth is allocated to any malicious user, then the system of WiMAX communication will be under dangerous attacks. In this paper, we proposed a secure heuristic earliest deadline first uplink scheduler in the MAC layer of the WiMAX with some authorization procedures. The proposed scheme protects the allocation of bandwidth to any malicious node such that the system will be prevented from security attacks like Denial of Service (DoS), flooding attack, etc., as well as it will use heuristic approach for scheduling. Therefore, it can efficiently schedule user’s request and provide fairness to the WiMAX system and we called as Secure Heuristic EDF Uplink Scheduler (SH-EDF). The performance of SH-EDF uplink scheduler will be evaluated in the provisions of various performance metrics.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"24 1","pages":"133 - 152"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2019.1608580","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42849840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Knowledge Discovery from Free Text: Extraction of Violent Events in the African Context 自由文本中的知识发现:非洲语境中暴力事件的提取
Q2 Social Sciences Pub Date : 2019-07-03 DOI: 10.1080/13614576.2019.1615529
Taye Abdulkadir Edris, R. Sungkur
ABSTRACT In today’s Internet age, millions of articles in an unstructured format are created every second. Most of this information is available in the web in the form of free text articles. These unstructured free texts are difficult to process and almost impossible to use in decision making, especially those based on analysis of long term data. This research project tried to address knowledge discovery from free text through the extraction of Violent Events along with their attributes. Media monitoring tools such as the Africa Media Monitor can gather thousands of news articles every minute. These articles can be clustered and categorized. However, due to the lack of structure and the heterogeneity of information sources, access to these huge collections of information has been limited to browsing, searching, and reading through articles. To cope with that enormous amount of available data, Information Extraction Systems are needed whose goal is to extract structured information from unstructured documents or free texts. This research tried to address event extraction in one domain. The developed prototype successfully managed the extraction of the 5W (Who, What, Whom, Where, When) but could not manage the 1H (How) due to programming challenges and time constraints.
摘要在当今的互联网时代,每秒都有数以百万计的非结构化文章被创建出来。这些信息大多以免费文本文章的形式在网上提供。这些非结构化的自由文本很难处理,几乎不可能用于决策,尤其是那些基于长期数据分析的文本。该研究项目试图通过提取暴力事件及其属性来解决自由文本中的知识发现问题。非洲媒体监测等媒体监测工具每分钟可以收集数千篇新闻文章。这些文章可以进行聚类和分类。然而,由于缺乏结构和信息来源的异质性,对这些庞大信息集的访问仅限于浏览、搜索和阅读文章。为了处理大量的可用数据,需要信息提取系统,其目标是从非结构化文档或自由文本中提取结构化信息。这项研究试图在一个领域中解决事件提取问题。开发的原型成功地管理了5W(Who,What,Who,Where,When)的提取,但由于编程挑战和时间限制,无法管理1H(How)。
{"title":"Knowledge Discovery from Free Text: Extraction of Violent Events in the African Context","authors":"Taye Abdulkadir Edris, R. Sungkur","doi":"10.1080/13614576.2019.1615529","DOIUrl":"https://doi.org/10.1080/13614576.2019.1615529","url":null,"abstract":"ABSTRACT In today’s Internet age, millions of articles in an unstructured format are created every second. Most of this information is available in the web in the form of free text articles. These unstructured free texts are difficult to process and almost impossible to use in decision making, especially those based on analysis of long term data. This research project tried to address knowledge discovery from free text through the extraction of Violent Events along with their attributes. Media monitoring tools such as the Africa Media Monitor can gather thousands of news articles every minute. These articles can be clustered and categorized. However, due to the lack of structure and the heterogeneity of information sources, access to these huge collections of information has been limited to browsing, searching, and reading through articles. To cope with that enormous amount of available data, Information Extraction Systems are needed whose goal is to extract structured information from unstructured documents or free texts. This research tried to address event extraction in one domain. The developed prototype successfully managed the extraction of the 5W (Who, What, Whom, Where, When) but could not manage the 1H (How) due to programming challenges and time constraints.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"24 1","pages":"153 - 177"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2019.1615529","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42009995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chain Informatisation and the Challenges for Governance 产业链信息化与治理挑战
Q2 Social Sciences Pub Date : 2019-07-03 DOI: 10.1080/13614576.2019.1608577
M. Langelaar, J. Schuurman Hess, R. Rommelse
ABSTRACT In 2016 for the first time a fully digital archive was ingested in the trusted repository of the Municipality of Rotterdam: the archives of the City Region Rotterdam Rijnmond. The city region included fifteen municipalities. In 2015 the City Region was dissolved and was absorbed by the Rotterdam-The Hague metropolitan area. The archives should be deposited at the Municipal Archives of Rotterdam, but had to be accessible to the former partners. This article will focus on the problems we met in taking in the digital born archives (metadata and the mapping of metadata, formats, exporting from the original application) and in ensuring availability. Furthermore the focus will be on the requirements this type of archives imply for the design of systems and the need for (European) standards. Building on the experience with the City Region, we are now looking at the governance of chain informatisation within the social sector. Main focus with this part of the paper will be the governance of informatisation, the requirements this poses to systems and workflows and the way the inspection and the auditing of archives and workflows can be provided within chain informatisation.
2016年,鹿特丹市政府首次将一个完全数字化的档案纳入值得信赖的存储库:鹿特丹Rijnmond城市地区档案馆。市区包括十五个直辖市。2015年,城市区域被解散,并被鹿特丹-海牙大都市区吸收。档案应存放在鹿特丹市档案馆,但必须对前合作伙伴开放。本文将重点讨论我们在接收数字生成的档案(元数据和元数据的映射、格式、从原始应用程序导出)和确保可用性方面遇到的问题。此外,重点将放在这种类型的档案对系统设计的要求和对(欧洲)标准的需求上。在城市区域的经验基础上,我们现在正在研究社会部门内的连锁信息化治理。这部分论文的主要重点是信息化的治理,这对系统和工作流程提出的要求,以及在链信息化中提供档案和工作流程的检查和审计的方式。
{"title":"Chain Informatisation and the Challenges for Governance","authors":"M. Langelaar, J. Schuurman Hess, R. Rommelse","doi":"10.1080/13614576.2019.1608577","DOIUrl":"https://doi.org/10.1080/13614576.2019.1608577","url":null,"abstract":"ABSTRACT In 2016 for the first time a fully digital archive was ingested in the trusted repository of the Municipality of Rotterdam: the archives of the City Region Rotterdam Rijnmond. The city region included fifteen municipalities. In 2015 the City Region was dissolved and was absorbed by the Rotterdam-The Hague metropolitan area. The archives should be deposited at the Municipal Archives of Rotterdam, but had to be accessible to the former partners. This article will focus on the problems we met in taking in the digital born archives (metadata and the mapping of metadata, formats, exporting from the original application) and in ensuring availability. Furthermore the focus will be on the requirements this type of archives imply for the design of systems and the need for (European) standards. Building on the experience with the City Region, we are now looking at the governance of chain informatisation within the social sector. Main focus with this part of the paper will be the governance of informatisation, the requirements this poses to systems and workflows and the way the inspection and the auditing of archives and workflows can be provided within chain informatisation.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"24 1","pages":"121 - 132"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2019.1608577","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44136870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“Worthiness” of Marketing Public Archives 公共档案营销的“价值”
Q2 Social Sciences Pub Date : 2019-07-03 DOI: 10.1080/13614576.2019.1608575
Sindiso Bhebhe, N. Khumalo, M. Masuku
ABSTRACT Stringent budgets have led to calls for all entities in the public sector, including national archival institutions, to justify their existence. This has seen scholars and archivists trying to market archives in order to attract more clientele. However, archives are not created for a target market, neither is their value determined by the frequency of their use. This paper therefore seeks to contest the notion of marketing archives and concludes that the marketing of archives is neither necessary nor worth pursuing as the products (the archives) do not diminish in value even if not consulted.
摘要严格的预算要求公共部门的所有实体,包括国家档案机构,证明其存在的合理性。这使得学者和档案管理员试图推销档案,以吸引更多的客户。然而,档案不是为目标市场创建的,其价值也不是由使用频率决定的。因此,本文试图对档案营销的概念提出质疑,并得出结论,档案营销既没有必要,也不值得追求,因为即使不咨询,产品(档案)也不会贬值。
{"title":"“Worthiness” of Marketing Public Archives","authors":"Sindiso Bhebhe, N. Khumalo, M. Masuku","doi":"10.1080/13614576.2019.1608575","DOIUrl":"https://doi.org/10.1080/13614576.2019.1608575","url":null,"abstract":"ABSTRACT Stringent budgets have led to calls for all entities in the public sector, including national archival institutions, to justify their existence. This has seen scholars and archivists trying to market archives in order to attract more clientele. However, archives are not created for a target market, neither is their value determined by the frequency of their use. This paper therefore seeks to contest the notion of marketing archives and concludes that the marketing of archives is neither necessary nor worth pursuing as the products (the archives) do not diminish in value even if not consulted.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"24 1","pages":"105 - 120"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2019.1608575","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45173014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated Records Management: Using Software Design Approach to Support Business Process Management and Compliance in the Networked Environment 集成记录管理:使用软件设计方法支持网络环境中的业务流程管理和法规遵从性
Q2 Social Sciences Pub Date : 2019-07-03 DOI: 10.1080/13614576.2019.1618197
Patrick Ajibade, S. Mutula
ABSTRACT Business records management plays a vital role in enabling organizations to maintain accountability, curb corruption, and prevent mismanagement, while promoting efficient running of daily activities and effective decision-making. It is important for business organization to efficiently manage both digital and manually created recorded business information. In the digital and networked environment, and within the global economy, records are created as consequences of business transaction. Even though many companies have been processing network-generated business information and digital business records, many companies have not been able to manage their business process using the capabilities of information technology infrastructure. This article presented a simplify models using service oriented (software) design to assist companies especially the small and medium enterprises (SMEs) to manage their business intelligence (business records) in a networked environment. Taking into account the modernisation of information technology to integrate and promote efficient business records management. The article concluded that the use of service-oriented design methodology, if adapted by the SMEs will improve business records management and sustainability, and improve compliance with the records management Acts, standards, policy, and regulations.
摘要商业记录管理在使组织能够保持问责制、遏制腐败和防止管理不善,同时促进日常活动的高效运行和有效决策方面发挥着至关重要的作用。对于业务组织来说,有效管理数字和手动创建的记录业务信息非常重要。在数字和网络环境中,在全球经济中,记录是作为商业交易的结果而创建的。尽管许多公司一直在处理网络生成的业务信息和数字业务记录,但许多公司无法使用信息技术基础设施的功能来管理其业务流程。本文提出了一个使用面向服务(软件)设计的简化模型,以帮助公司,特别是中小型企业(SME)在网络环境中管理其商业智能(商业记录)。考虑到信息技术的现代化,以整合和促进高效的业务记录管理。文章的结论是,如果中小企业采用面向服务的设计方法,将改善商业记录管理和可持续性,并提高对记录管理法案、标准、政策和法规的遵守程度。
{"title":"Integrated Records Management: Using Software Design Approach to Support Business Process Management and Compliance in the Networked Environment","authors":"Patrick Ajibade, S. Mutula","doi":"10.1080/13614576.2019.1618197","DOIUrl":"https://doi.org/10.1080/13614576.2019.1618197","url":null,"abstract":"ABSTRACT Business records management plays a vital role in enabling organizations to maintain accountability, curb corruption, and prevent mismanagement, while promoting efficient running of daily activities and effective decision-making. It is important for business organization to efficiently manage both digital and manually created recorded business information. In the digital and networked environment, and within the global economy, records are created as consequences of business transaction. Even though many companies have been processing network-generated business information and digital business records, many companies have not been able to manage their business process using the capabilities of information technology infrastructure. This article presented a simplify models using service oriented (software) design to assist companies especially the small and medium enterprises (SMEs) to manage their business intelligence (business records) in a networked environment. Taking into account the modernisation of information technology to integrate and promote efficient business records management. The article concluded that the use of service-oriented design methodology, if adapted by the SMEs will improve business records management and sustainability, and improve compliance with the records management Acts, standards, policy, and regulations.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"24 1","pages":"178 - 192"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2019.1618197","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42866524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Model Architecture for Cloud Computing-Based Library Management 基于云计算的图书馆管理模型体系结构
Q2 Social Sciences Pub Date : 2019-01-02 DOI: 10.1080/13614576.2019.1608581
Jitendra Nath Shaw, Tanmay De Sarkar
ABSTRACT The purpose of this article is to provide a cloud computing system-based architecture for library automation services. In this article, a consortium-based library automation system has been conceptualized and a model architecture has been proposed. The article describes the benefit of virtualization (Virtual Machine as a library) of cloud computing toward libraries and why/how a librarian can shift from an on-premise based library system to cloud-based system to overcome infrastructure requirement, staff requirements for administration, system maintenance, costs for backup, and so forth. The article outlines the traditional system of library automation. The proposed model provides cloud platform and application virtualization solutions for deploying and managing Service Oriented Architecture (SOA) for libraries. The model illustrates how a group of libraries, participating into a consortia, could collaborately obtain access to LMS software application through the virtual platform. This article is one of the first of its kind to propose such architecture for library automation.
本文的目的是为图书馆自动化服务提供一种基于云计算系统的架构。本文提出了一个基于联盟的图书馆自动化系统的概念,并提出了一个模型体系结构。本文描述了云计算虚拟化(虚拟机即图书馆)对图书馆的好处,以及图书管理员为什么/如何从基于本地的图书馆系统转向基于云的系统,以克服基础设施需求、管理人员需求、系统维护、备份成本等。本文概述了传统的图书馆自动化系统。该模型为图书馆部署和管理面向服务的体系结构(Service Oriented Architecture, SOA)提供了云平台和应用虚拟化解决方案。该模型说明了加入联盟的一组图书馆如何通过虚拟平台协作访问LMS软件应用程序。本文是同类文章中首次为图书馆自动化提出这样的体系结构。
{"title":"Model Architecture for Cloud Computing-Based Library Management","authors":"Jitendra Nath Shaw, Tanmay De Sarkar","doi":"10.1080/13614576.2019.1608581","DOIUrl":"https://doi.org/10.1080/13614576.2019.1608581","url":null,"abstract":"ABSTRACT The purpose of this article is to provide a cloud computing system-based architecture for library automation services. In this article, a consortium-based library automation system has been conceptualized and a model architecture has been proposed. The article describes the benefit of virtualization (Virtual Machine as a library) of cloud computing toward libraries and why/how a librarian can shift from an on-premise based library system to cloud-based system to overcome infrastructure requirement, staff requirements for administration, system maintenance, costs for backup, and so forth. The article outlines the traditional system of library automation. The proposed model provides cloud platform and application virtualization solutions for deploying and managing Service Oriented Architecture (SOA) for libraries. The model illustrates how a group of libraries, participating into a consortia, could collaborately obtain access to LMS software application through the virtual platform. This article is one of the first of its kind to propose such architecture for library automation.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"24 1","pages":"17 - 30"},"PeriodicalIF":0.0,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2019.1608581","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48434546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Higher Education, Technology, and Equity in Africa 非洲的高等教育、技术与公平
Q2 Social Sciences Pub Date : 2019-01-02 DOI: 10.1080/13614576.2019.1608576
A. Lusigi
ABSTRACT A healthy and skilled workforce is at the heart of Africa’s economic and social transformation agenda and countries with leading institutions of higher learning are among the most diversified economies in Africa. This paper examines the gaps in the performance of Africa’s higher learning institutions, identifies structural barriers to transformation and proposes better utilization of information technology to meet the emerging needs for equity and access. Based on best practices from the use of ICTs in South Africa and the rollout of digital libraries in 20 countries three key recommendations are provided to overcome gaps related to investment, digital literacy, and policy coherence.
摘要健康、技术娴熟的劳动力是非洲经济和社会转型议程的核心,拥有领先高等教育机构的国家是非洲最多元化的经济体之一。本文审查了非洲高等教育机构绩效方面的差距,确定了转型的结构性障碍,并建议更好地利用信息技术来满足新出现的公平和入学需求。根据南非使用信通技术和在20个国家推出数字图书馆的最佳做法,提出了三项关键建议,以克服投资、数字扫盲和政策一致性方面的差距。
{"title":"Higher Education, Technology, and Equity in Africa","authors":"A. Lusigi","doi":"10.1080/13614576.2019.1608576","DOIUrl":"https://doi.org/10.1080/13614576.2019.1608576","url":null,"abstract":"ABSTRACT A healthy and skilled workforce is at the heart of Africa’s economic and social transformation agenda and countries with leading institutions of higher learning are among the most diversified economies in Africa. This paper examines the gaps in the performance of Africa’s higher learning institutions, identifies structural barriers to transformation and proposes better utilization of information technology to meet the emerging needs for equity and access. Based on best practices from the use of ICTs in South Africa and the rollout of digital libraries in 20 countries three key recommendations are provided to overcome gaps related to investment, digital literacy, and policy coherence.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"24 1","pages":"1 - 16"},"PeriodicalIF":0.0,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2019.1608576","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49076333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
New Review of Information Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1