首页 > 最新文献

Journal of the American Society for Information Science and Technology最新文献

英文 中文
Big Data and Data Science Education in Traditional Chinese Medicine Informatics: Challenges and Opportunities 中医药信息学大数据与数据科学教育:挑战与机遇
Pub Date : 2021-01-01 DOI: 10.11648/j.ajist.20210504.15
Zhixian Yi, H. Nie, C. Dong, Jianhua Jiang, Fu Su, Zhenghui Wang, Haibo Wang, Hekun Zeng
{"title":"Big Data and Data Science Education in Traditional Chinese Medicine Informatics: Challenges and Opportunities","authors":"Zhixian Yi, H. Nie, C. Dong, Jianhua Jiang, Fu Su, Zhenghui Wang, Haibo Wang, Hekun Zeng","doi":"10.11648/j.ajist.20210504.15","DOIUrl":"https://doi.org/10.11648/j.ajist.20210504.15","url":null,"abstract":"","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81589994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Users Attitude Towards the Use of Library Catalogue in Federal University of Kashere Library in Gombe State, Nigeria 尼日利亚贡贝州卡舍尔联邦大学图书馆用户对图书馆目录使用的态度
Pub Date : 2019-12-03 DOI: 10.11648/J.AJIST.20190304.12
Mohammed Abubakar Dukku, Andrew Temboge
The study investigated the awareness and use of library catalogue for accessing information resources by users of Federal University of Kashere (FUK) Library. Four research questions guided the study. Survey research design was used, registered users of the University Library between 2016-2019 numbering 920 formed the population of the study where a sample of 272 (30% sample) was used based on 95% confidence level and 5% confidence interval of Sample Size Calculator. The instrument used for data collection was questionnaire. Data generated was analyzed using simple percentage and descriptive statistics. The findings of the study revealed that majority of the respondents were aware of library catalogue existence; they were more informed about card catalogue usage than OPAC for retrieving information resources. In effect, the respondents use card catalogue regularly compared to the OPAC. Majority of the respondents used the library for research work rather than for leisure and recreational purposes. Poor computer skills hindering navigation when searching OPAC and inability to locate materials on the shelves, indicated in the catalogue as being available were the challenges affecting the use of catalogue as an information retrieval tools. The study recommended that the library management should organize a periodic user education, orientation and sensitization programmes for the undergraduate users to create awareness and enable them gain the needed skills to use the library catalogue maximally when searching for information resources. Guidelines on how to use catalogue and library in general should be prepared and issued to registered users. Regular shelf reading should be done so as to establish right contact between library users and library materials.
本研究调查了喀什尔联邦大学图书馆用户在获取信息资源时对图书馆目录的认识和使用情况。四个研究问题指导了这项研究。采用调查研究设计,2016-2019年间大学图书馆的注册用户人数为920人,构成了研究的总体,其中样本为272人(30%样本),基于样本大小计算器的95%置信水平和5%置信区间。数据收集工具为问卷调查。生成的数据使用简单的百分比和描述性统计进行分析。调查结果显示,大部分受访者知道图书馆目录的存在;他们比OPAC更了解卡片目录在检索信息资源方面的使用情况。实际上,与OPAC相比,受访者经常使用卡片目录。大多数受访者将图书馆用于研究工作,而不是休闲和娱乐目的。计算机技术差妨碍了在搜索OPAC时导航,也无法找到目录中显示的货架上可用的材料,这些都是影响使用目录作为信息检索工具的挑战。研究报告建议,图书馆管理部门应定期为大学生用户组织一次用户教育、指导和宣传方案,以提高他们的认识,使他们在寻找信息资源时获得最大限度地利用图书馆目录所需的技能。应编制关于如何使用目录和图书馆的一般指南,并向注册用户发布。定期进行书架阅读,以建立图书馆用户与图书馆资料之间的正确联系。
{"title":"Users Attitude Towards the Use of Library Catalogue in Federal University of Kashere Library in Gombe State, Nigeria","authors":"Mohammed Abubakar Dukku, Andrew Temboge","doi":"10.11648/J.AJIST.20190304.12","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190304.12","url":null,"abstract":"The study investigated the awareness and use of library catalogue for accessing information resources by users of Federal University of Kashere (FUK) Library. Four research questions guided the study. Survey research design was used, registered users of the University Library between 2016-2019 numbering 920 formed the population of the study where a sample of 272 (30% sample) was used based on 95% confidence level and 5% confidence interval of Sample Size Calculator. The instrument used for data collection was questionnaire. Data generated was analyzed using simple percentage and descriptive statistics. The findings of the study revealed that majority of the respondents were aware of library catalogue existence; they were more informed about card catalogue usage than OPAC for retrieving information resources. In effect, the respondents use card catalogue regularly compared to the OPAC. Majority of the respondents used the library for research work rather than for leisure and recreational purposes. Poor computer skills hindering navigation when searching OPAC and inability to locate materials on the shelves, indicated in the catalogue as being available were the challenges affecting the use of catalogue as an information retrieval tools. The study recommended that the library management should organize a periodic user education, orientation and sensitization programmes for the undergraduate users to create awareness and enable them gain the needed skills to use the library catalogue maximally when searching for information resources. Guidelines on how to use catalogue and library in general should be prepared and issued to registered users. Regular shelf reading should be done so as to establish right contact between library users and library materials.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78984717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Albert Einstein Library: From Princeton to Jerusalem 爱因斯坦图书馆:从普林斯顿到耶路撒冷
Pub Date : 2019-10-15 DOI: 10.11648/J.AJIST.20190304.11
M. Gelfand
This article, based on both historical and content analysis of Albert Einstein’s private library, presents a comprehensive picture of the Einstein Collection that was located at his home in Princeton, now housed at The Albert Einstein Archives at The Hebrew University of Jerusalem. His private library consisted of approximately 2,400 titles, including not only books but also a small collection of journals, musical scores and records. Staff members of the Archive succeeded in adding additional books, including works by Einstein himself and ones about him in various languages. These amounted to approximately 1,500 titles. Most of the books in Einstein’s library related to subjects other than physics. Many authors presented copies of their books to Einstein. Those books, usually with autographs or dedications by the authors, dealt with various fields of knowledge – philosophy, literature, religions, Jewish culture, etc. Content analysis of Einstein’s personal library reveals scientific, political, and social connections of the scientist. This article includes information about the main institutions involved in conveying the library to Jerusalem and in organizing it. These were the American Friends of The Hebrew University in New York, the Japan Broadcasting Corporation, and the Jewish National and University Library (today The National Library of Israel). The primary sources for the research on which this article is based are 1) material from The Albert Einstein Archives at The Hebrew University of Jerusalem, 2) Inventory Books of the National Library of Israel, 3) Kiryat Sefer, bibliographical quarterly of the Jewish National and University Library, 4) Einstein’s reprint collection at The Weizmann Institute of Science. The following conclusions were drawn: 1) From the Einstein private library items were given as gifts both during his lifetime and after his death; 2) a large proportion of the books that Einstein gave to the National Library of Israel were registered in the Inventory Books of the National Library of Israel before the transfer of his complete library to Jerusalem; 3) Einstein's personal library includes books that actually belonged to other members of his family. For example, there are books, like those that belonged to his secretary Helen Dukas and to his stepdaughter Margot Einstein, that contain either the signature of the former owner or autograph/dedication by the author of the book. The article’s references to the contemporary Israeli press about Einstein’s visit to Israel elucidate Einstein’s role in the founding of The Hebrew University of Jerusalem.
本文基于对阿尔伯特·爱因斯坦私人图书馆的历史和内容分析,呈现了一幅爱因斯坦收藏的全貌,这些收藏位于他普林斯顿的家中,现在被安置在耶路撒冷希伯来大学的阿尔伯特·爱因斯坦档案馆。他的私人图书馆大约有2400种藏书,不仅包括书籍,还包括少量的期刊、乐谱和唱片。档案馆的工作人员成功地增加了额外的书籍,包括爱因斯坦本人的作品和各种语言的关于他的作品。这些书约有1 500本。爱因斯坦图书馆里的大多数书都与物理学以外的学科有关。许多作家把他们的书送给爱因斯坦。这些书通常有作者的签名或献词,涉及各个知识领域——哲学、文学、宗教、犹太文化等。对爱因斯坦个人图书馆的内容分析揭示了这位科学家在科学、政治和社会方面的联系。这篇文章包括有关向耶路撒冷运送图书馆和组织图书馆的主要机构的信息。它们是纽约希伯来大学的美国之友、日本广播公司和犹太国家和大学图书馆(今天的以色列国家图书馆)。本文研究的主要资料来源是:1)耶路撒冷希伯来大学阿尔伯特·爱因斯坦档案馆的资料,2)以色列国家图书馆的库存图书,3)犹太国家和大学图书馆的书目季刊Kiryat Sefer, 4)魏茨曼科学研究所爱因斯坦的再版收藏。得出以下结论:1)爱因斯坦私人图书馆的藏品在他生前和死后都是作为礼物赠送的;2)爱因斯坦赠送给以色列国家图书馆的大部分图书,在他的全部藏书转移到耶路撒冷之前,都登记在以色列国家图书馆的图书目录中;爱因斯坦的私人图书馆里有一些实际上属于他其他家庭成员的书。例如,有些书,比如他的秘书海伦·杜卡斯(Helen Dukas)和继女玛格特·爱因斯坦(Margot Einstein)的书,要么有前主人的签名,要么有作者的签名/献词。这篇文章引用了当代以色列媒体关于爱因斯坦访问以色列的报道,阐明了爱因斯坦在耶路撒冷希伯来大学的创立中所起的作用。
{"title":"Albert Einstein Library: From Princeton to Jerusalem","authors":"M. Gelfand","doi":"10.11648/J.AJIST.20190304.11","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190304.11","url":null,"abstract":"This article, based on both historical and content analysis of Albert Einstein’s private library, presents a comprehensive picture of the Einstein Collection that was located at his home in Princeton, now housed at The Albert Einstein Archives at The Hebrew University of Jerusalem. His private library consisted of approximately 2,400 titles, including not only books but also a small collection of journals, musical scores and records. Staff members of the Archive succeeded in adding additional books, including works by Einstein himself and ones about him in various languages. These amounted to approximately 1,500 titles. Most of the books in Einstein’s library related to subjects other than physics. Many authors presented copies of their books to Einstein. Those books, usually with autographs or dedications by the authors, dealt with various fields of knowledge – philosophy, literature, religions, Jewish culture, etc. Content analysis of Einstein’s personal library reveals scientific, political, and social connections of the scientist. This article includes information about the main institutions involved in conveying the library to Jerusalem and in organizing it. These were the American Friends of The Hebrew University in New York, the Japan Broadcasting Corporation, and the Jewish National and University Library (today The National Library of Israel). The primary sources for the research on which this article is based are 1) material from The Albert Einstein Archives at The Hebrew University of Jerusalem, 2) Inventory Books of the National Library of Israel, 3) Kiryat Sefer, bibliographical quarterly of the Jewish National and University Library, 4) Einstein’s reprint collection at The Weizmann Institute of Science. The following conclusions were drawn: 1) From the Einstein private library items were given as gifts both during his lifetime and after his death; 2) a large proportion of the books that Einstein gave to the National Library of Israel were registered in the Inventory Books of the National Library of Israel before the transfer of his complete library to Jerusalem; 3) Einstein's personal library includes books that actually belonged to other members of his family. For example, there are books, like those that belonged to his secretary Helen Dukas and to his stepdaughter Margot Einstein, that contain either the signature of the former owner or autograph/dedication by the author of the book. The article’s references to the contemporary Israeli press about Einstein’s visit to Israel elucidate Einstein’s role in the founding of The Hebrew University of Jerusalem.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81009088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topic Analysis of Microblog About “Didi Taxi” Based on K-means Algorithm 基于K-means算法的“滴滴打车”微博话题分析
Pub Date : 2019-09-02 DOI: 10.11648/J.AJIST.20190303.13
Yonghe Lu, Xin Xiong
In the age of information and digitization, most users publish and obtain real-time information by microblog in social networks. Through effective means, we can accurately discover, organize, and utilize the valuable information hidden behind the massive short texts of social networks. Then we can explore hot topics in microblog, which is conducive to public opinion monitoring and marketing development. In today's society, Didi Taxi has become a necessary choice for many users to travel. This paper applied K-means clustering algorithm to topic analysis of Sina microblog short text on Didi Taxi. We crawled 17226 search results of microblog relevant to the topic of Didi Taxi from April 2019 to June 2019. After a series of data cleaning and data preprocessing steps, we used TF-IDF method to represent 15054 pieces of text data after processing. Through the evaluation of silhouette coefficient, we set the dimension of text 300 and the number of clusters 34 with K-means. Next, we extracted 8 topic clusters from 34 clusters, which include the advantages and disadvantages of Didi Taxi and its development status. Finally, we discussed the results by human check in semantic perspective. Through the topic analysis of microblog, we can understand the public’s attitude to Didi Taxi and provide the basis for the management of the government or company in the future.
在信息化和数字化的时代,大多数用户在社交网络上通过微博发布和获取实时信息。通过有效的手段,我们可以准确地发现、组织和利用隐藏在社交网络海量短文本背后的有价值的信息。然后我们可以在微博中挖掘热点话题,这有利于舆论监测和营销发展。在当今社会,滴滴打车已经成为很多用户出行的必备选择。本文将k均值聚类算法应用于滴滴打车新浪微博短文本的话题分析。我们抓取了2019年4月至2019年6月与滴滴打车主题相关的微博搜索结果17226条。经过一系列的数据清洗和数据预处理步骤,我们使用TF-IDF方法表示处理后的15054条文本数据。通过对剪影系数的评估,我们设定文本的维数为300,K-means的聚类数为34。接下来,我们从34个聚类中提取了8个主题聚类,包括滴滴打车的优劣势和发展现状。最后,从语义的角度讨论了人工检查的结果。通过对微博的话题分析,可以了解公众对滴滴打车的态度,为未来政府或公司的管理提供依据。
{"title":"Topic Analysis of Microblog About “Didi Taxi” Based on K-means Algorithm","authors":"Yonghe Lu, Xin Xiong","doi":"10.11648/J.AJIST.20190303.13","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190303.13","url":null,"abstract":"In the age of information and digitization, most users publish and obtain real-time information by microblog in social networks. Through effective means, we can accurately discover, organize, and utilize the valuable information hidden behind the massive short texts of social networks. Then we can explore hot topics in microblog, which is conducive to public opinion monitoring and marketing development. In today's society, Didi Taxi has become a necessary choice for many users to travel. This paper applied K-means clustering algorithm to topic analysis of Sina microblog short text on Didi Taxi. We crawled 17226 search results of microblog relevant to the topic of Didi Taxi from April 2019 to June 2019. After a series of data cleaning and data preprocessing steps, we used TF-IDF method to represent 15054 pieces of text data after processing. Through the evaluation of silhouette coefficient, we set the dimension of text 300 and the number of clusters 34 with K-means. Next, we extracted 8 topic clusters from 34 clusters, which include the advantages and disadvantages of Didi Taxi and its development status. Finally, we discussed the results by human check in semantic perspective. Through the topic analysis of microblog, we can understand the public’s attitude to Didi Taxi and provide the basis for the management of the government or company in the future.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75698856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MLPV: Text Representation of Scientific Papers Based on Structural Information and Doc2vec 基于结构信息和Doc2vec的科技论文文本表示
Pub Date : 2019-08-28 DOI: 10.11648/J.AJIST.20190303.12
Yonghe Lu, Yuanyuan Zhai, Jiayi Luo, Yongshan Chen
Text representation is the key for text processing. Scientific papers have significant structural features. The different internal components, mainly including titles, abstracts, keywords, main texts, etc., embody different degrees of importance. In addition, the external structural features of scientific papers, such as topics and authors, also have certain value for analysis of scientific papers. However, most of the traditional analysis methods of scientific papers are based on the analysis of keyword co-occurrence and citation links, which only consider partial information. There is a lack of research on the textual information and external structural information of scientific papers, which has led to the inability to deeply explore the inherent laws of scientific papers. Therefore, this paper proposes Multi-Layers Paragraph Vector (MLPV), a text representing method for scientific papers based on Doc2vec and structural information of scientific papers including both internal and external structures, and constructs five text representation models: PV-NO, PV-TOP, PV-TAKM, MLPV and MLPV-PSO. The results show that the effect of the MLPV model is much better than the PV-NO, PV-TOP and PV-TAKM models. The average accuracy of MLPV model is much more stable and higher, reaching 91.71%, which proves its validity. On the basis of the MLPV model, the accuracy of the optimized MLPV-PSO model is 3.33% higher than MLPV model which proves the effectiveness of the optimization algorithm.
文本表示是文本处理的关键。科学论文具有显著的结构特征。不同的内部成分,主要包括标题、摘要、关键词、主要文本等,体现了不同的重要程度。此外,科学论文的外部结构特征,如主题、作者等,对科学论文的分析也有一定的价值。然而,传统的科技论文分析方法大多是基于关键词共现和引文链接的分析,只考虑了部分信息。对科技论文的文本信息和外部结构信息的研究不足,导致无法深入探索科技论文的内在规律。为此,本文提出了一种基于Doc2vec和科技论文内外结构信息的文本表示方法——多层段落向量(Multi-Layers Paragraph Vector, MLPV),并构建了PV-NO、PV-TOP、PV-TAKM、MLPV和MLPV- pso五个文本表示模型。结果表明,MLPV模型的效果明显优于PV-NO、PV-TOP和PV-TAKM模型。MLPV模型的平均准确率达到91.71%,更加稳定,也更高,证明了该模型的有效性。在MLPV模型的基础上,优化后的MLPV- pso模型的准确率比MLPV模型高3.33%,证明了优化算法的有效性。
{"title":"MLPV: Text Representation of Scientific Papers Based on Structural Information and Doc2vec","authors":"Yonghe Lu, Yuanyuan Zhai, Jiayi Luo, Yongshan Chen","doi":"10.11648/J.AJIST.20190303.12","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190303.12","url":null,"abstract":"Text representation is the key for text processing. Scientific papers have significant structural features. The different internal components, mainly including titles, abstracts, keywords, main texts, etc., embody different degrees of importance. In addition, the external structural features of scientific papers, such as topics and authors, also have certain value for analysis of scientific papers. However, most of the traditional analysis methods of scientific papers are based on the analysis of keyword co-occurrence and citation links, which only consider partial information. There is a lack of research on the textual information and external structural information of scientific papers, which has led to the inability to deeply explore the inherent laws of scientific papers. Therefore, this paper proposes Multi-Layers Paragraph Vector (MLPV), a text representing method for scientific papers based on Doc2vec and structural information of scientific papers including both internal and external structures, and constructs five text representation models: PV-NO, PV-TOP, PV-TAKM, MLPV and MLPV-PSO. The results show that the effect of the MLPV model is much better than the PV-NO, PV-TOP and PV-TAKM models. The average accuracy of MLPV model is much more stable and higher, reaching 91.71%, which proves its validity. On the basis of the MLPV model, the accuracy of the optimized MLPV-PSO model is 3.33% higher than MLPV model which proves the effectiveness of the optimization algorithm.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"30 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72546381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of Standard Security Features for Selected NoSQL Systems 选定NoSQL系统的标准安全特性分析
Pub Date : 2019-07-02 DOI: 10.11648/J.AJIST.20190302.12
Wilhelm Zugaj, A. Beichler
NoSQL solutions have recently been gaining significant attention because they address some of the inefficiencies of traditional database management systems. NoSQL databases offer features such as performant distributed architecture, flexibility and horizontal scaling. Despite these advantages, there is a vast quantity of NoSQL systems available, which differ greatly from each other. The resulting lack of standardization of security features leads to a questionable maturity in terms of security. What is therefore much needed is a systematic lab research of the availability and maturity of the implementation of the most common standard database security features in NoSQL systems, resulting in a NoSQL security map. This paper summarizes the first part of our research project trying to outline such a map. It documents the definition of the standard security features to be investigated based on a literature review in the area of standard database security. After selection of OrientDB, Redis, Cassandra and MongoDB as initial representatives of commonly used NoSQL systems, a description of systematic investigation of standard database security features for each of these four systems is given. All findings are summarized in tables for quick and easy comparison. We conclude that systems investigated need better default configurations and should enable their security features per default. Finally, we provide an outlook to the next steps of researching a security map for NoSQL systems.
NoSQL解决方案最近获得了极大的关注,因为它们解决了传统数据库管理系统的一些低效率问题。NoSQL数据库提供了高性能的分布式架构、灵活性和水平扩展等特性。尽管有这些优点,但是有大量可用的NoSQL系统,它们彼此之间差别很大。安全特性缺乏标准化的结果导致安全性方面的成熟度存在问题。因此,迫切需要的是对NoSQL系统中最常见的标准数据库安全特性实现的可用性和成熟度进行系统的实验室研究,从而绘制出NoSQL安全图。本文总结了我们的研究项目的第一部分,试图勾勒出这样一个地图。它根据标准数据库安全领域的文献综述,记录了要研究的标准安全特性的定义。在选择了OrientDB、Redis、Cassandra和MongoDB作为常用NoSQL系统的初始代表后,对这四种系统的标准数据库安全特性进行了系统的研究。所有的发现都汇总在表格中,以便快速方便地进行比较。我们的结论是,所调查的系统需要更好的默认配置,并且应该在默认情况下启用它们的安全特性。最后,我们对研究NoSQL系统安全映射的下一步工作进行了展望。
{"title":"Analysis of Standard Security Features for Selected NoSQL Systems","authors":"Wilhelm Zugaj, A. Beichler","doi":"10.11648/J.AJIST.20190302.12","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190302.12","url":null,"abstract":"NoSQL solutions have recently been gaining significant attention because they address some of the inefficiencies of traditional database management systems. NoSQL databases offer features such as performant distributed architecture, flexibility and horizontal scaling. Despite these advantages, there is a vast quantity of NoSQL systems available, which differ greatly from each other. The resulting lack of standardization of security features leads to a questionable maturity in terms of security. What is therefore much needed is a systematic lab research of the availability and maturity of the implementation of the most common standard database security features in NoSQL systems, resulting in a NoSQL security map. This paper summarizes the first part of our research project trying to outline such a map. It documents the definition of the standard security features to be investigated based on a literature review in the area of standard database security. After selection of OrientDB, Redis, Cassandra and MongoDB as initial representatives of commonly used NoSQL systems, a description of systematic investigation of standard database security features for each of these four systems is given. All findings are summarized in tables for quick and easy comparison. We conclude that systems investigated need better default configurations and should enable their security features per default. Finally, we provide an outlook to the next steps of researching a security map for NoSQL systems.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"71 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90774327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis of iTeach 2017 Contest Works and Suggestions for Educational Technology Students Training iTeach 2017大赛作品分析及对教育技术类学生培养的建议
Pub Date : 2019-04-10 DOI: 10.11648/J.AJIST.20190301.14
X. Chaojun, Guo Shaoqing, Bai Hongquan, L. Yi
iTeach contest works is the display window of educational technology students’ ability of instruction design, computer programming, software UI, and so on. It can also give out lots of information about China educational technology curriculum implement status, and students training focuses. The analysis of iTeach contest works is not only an inspection of the training quality of educational technology students, it’s also a process of communication of training experience of educational technology students. The article takes 196 educational technology students’ works from 2017 annual contest as samples, and conducts quantitative statistics from six aspects, including qualifications of contestants, work types, target users, distribution types and authoring tools. The analysis of the works shows there are many fresh work topics, creatively used technologies, specific information technology application in the contest works. The statistics also reveal some points should be paid attention to during the course of educational technology student development. Lastly, based on contest experts' interview, the article puts forward some suggestions for educational technology student training, including the reflection of curriculum structure, the construction of authentic curriculum resources, the implementation of curriculum quality standards, the integration of practical teaching system and scientific research feeding back teaching.
每一件参赛作品都是教育技术类学生教学设计、计算机编程、软件UI等能力的展示窗口。它还可以提供许多有关中国教育技术课程实施现状和学生培养重点的信息。对每一届大赛作品的分析,既是对教育技术类学生培训质量的检验,也是对教育技术类学生培训经验的交流过程。本文以2017年度大赛196件教育技术类学生作品为样本,从参赛选手资质、作品类型、目标用户、发行类型、创作工具六个方面进行定量统计。对参赛作品的分析表明,参赛作品有许多新颖的选题,创造性地运用了技术,具体运用了信息技术。统计数据也揭示了在教育技术学生发展过程中应注意的一些问题。最后,在对竞赛专家访谈的基础上,提出了教育技术类学生培养的几点建议,包括反思课程结构、构建真实的课程资源、实施课程质量标准、整合实践教学体系和科研反馈教学。
{"title":"Analysis of iTeach 2017 Contest Works and Suggestions for Educational Technology Students Training","authors":"X. Chaojun, Guo Shaoqing, Bai Hongquan, L. Yi","doi":"10.11648/J.AJIST.20190301.14","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190301.14","url":null,"abstract":"iTeach contest works is the display window of educational technology students’ ability of instruction design, computer programming, software UI, and so on. It can also give out lots of information about China educational technology curriculum implement status, and students training focuses. The analysis of iTeach contest works is not only an inspection of the training quality of educational technology students, it’s also a process of communication of training experience of educational technology students. The article takes 196 educational technology students’ works from 2017 annual contest as samples, and conducts quantitative statistics from six aspects, including qualifications of contestants, work types, target users, distribution types and authoring tools. The analysis of the works shows there are many fresh work topics, creatively used technologies, specific information technology application in the contest works. The statistics also reveal some points should be paid attention to during the course of educational technology student development. Lastly, based on contest experts' interview, the article puts forward some suggestions for educational technology student training, including the reflection of curriculum structure, the construction of authentic curriculum resources, the implementation of curriculum quality standards, the integration of practical teaching system and scientific research feeding back teaching.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82907072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Associations Between the Principle of Provenance and Metadata: Practical Implementation and Cases 来源原则与元数据的关联:实际实现与案例
Pub Date : 2019-03-19 DOI: 10.11648/J.AJIST.20190301.13
Chang-Jie Tang, Xiaojuan Zhang
The principle of provenance is the fundamental theory of archives science, which also possesses important reference value in various areas of research and practice. This paper commences with investigating the core value of the principle of provenance, considering the principle to be the unity of theory and method and its core value lies in following historicalism and respecting essential attributes of the archives. Then the authors focus on the realm of government information management and explore the metadata implementation of the core value of the principle of provenance in the era of electronic records. In its essence, the principle of provenance requires full understanding and preservation of the source information of the record. In the age of electronic records this has ascended to the significance of obtaining "contextual information", which is often stabilized as metadata in electronic records, reflecting the process of the record’s creation, maintenance and long term preservation. Source information as the contextual information reflecting the record creation process, its typical form of expression in metadata is provenance metadata. Therefore the authors explore the implications of provenance metadata and its essential forms. The authors hold that source information is the indispensable characteristic information in records and archives, and also the essential form for the principle of provenance to exhibit the connotations of "provenance". This paper also explains that provenance metadata has further realized the core value of the principle of provenance, playing important roles in ensuring the authenticity, integrity, reliability and usability of electronic records as well as being the basis of their long term preservation and usage. In addition, the authors make concrete exposition on the composition and function of provenance metadata, considering it to be composed of entities and elements, specifically including such metadata as institution, business, environment, relationship and time. Different provenance metadata entities and elements record the source information of the electronic record from its creation until transfer to archives, performing various important functions in government electronic record management. The authors further their research through analyzing and comparing the characteristics of provenance metadata in government electronic record metadata standards at international, national and local jurisdictions levels. Some feasible suggestions for future research are made in the conclusion.
来源原则是档案学的基础理论,在各个领域的研究和实践中都具有重要的参考价值。本文从考证溯源原则的核心价值入手,认为溯源原则是理论与方法的统一,其核心价值在于遵循历史主义,尊重档案的本质属性。然后以政府信息管理领域为研究对象,探讨了电子档案时代源性原则核心价值的元数据实现。就其本质而言,出处原则要求充分了解和保存记录的来源信息。在电子记录时代,这已经上升到获取“上下文信息”的意义,而上下文信息往往在电子记录中以元数据的形式稳定下来,反映了记录的创建、维护和长期保存的过程。源信息作为反映记录创建过程的上下文信息,其在元数据中的典型表现形式是来源元数据。因此,作者探讨了物源元数据的含义及其基本形式。作者认为,源信息是案卷档案中不可缺少的特征信息,是源性原则体现“源性”内涵的基本形式。本文还说明了来源元数据进一步实现了来源原则的核心价值,在保证电子记录的真实性、完整性、可靠性和可用性方面发挥着重要作用,是电子记录长期保存和使用的基础。此外,作者还具体阐述了出处元数据的组成和功能,认为出处元数据是由实体和元素组成的,具体包括机构、业务、环境、关系和时间等元数据。不同的来源元数据实体和元素记录了电子档案从产生到进入档案的来源信息,在政府电子档案管理中发挥着各种重要作用。通过分析比较国际、国家和地方各级政府电子记录元数据标准中来源元数据的特点,进一步深入研究。最后,对今后的研究提出了一些可行的建议。
{"title":"Associations Between the Principle of Provenance and Metadata: Practical Implementation and Cases","authors":"Chang-Jie Tang, Xiaojuan Zhang","doi":"10.11648/J.AJIST.20190301.13","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190301.13","url":null,"abstract":"The principle of provenance is the fundamental theory of archives science, which also possesses important reference value in various areas of research and practice. This paper commences with investigating the core value of the principle of provenance, considering the principle to be the unity of theory and method and its core value lies in following historicalism and respecting essential attributes of the archives. Then the authors focus on the realm of government information management and explore the metadata implementation of the core value of the principle of provenance in the era of electronic records. In its essence, the principle of provenance requires full understanding and preservation of the source information of the record. In the age of electronic records this has ascended to the significance of obtaining \"contextual information\", which is often stabilized as metadata in electronic records, reflecting the process of the record’s creation, maintenance and long term preservation. Source information as the contextual information reflecting the record creation process, its typical form of expression in metadata is provenance metadata. Therefore the authors explore the implications of provenance metadata and its essential forms. The authors hold that source information is the indispensable characteristic information in records and archives, and also the essential form for the principle of provenance to exhibit the connotations of \"provenance\". This paper also explains that provenance metadata has further realized the core value of the principle of provenance, playing important roles in ensuring the authenticity, integrity, reliability and usability of electronic records as well as being the basis of their long term preservation and usage. In addition, the authors make concrete exposition on the composition and function of provenance metadata, considering it to be composed of entities and elements, specifically including such metadata as institution, business, environment, relationship and time. Different provenance metadata entities and elements record the source information of the electronic record from its creation until transfer to archives, performing various important functions in government electronic record management. The authors further their research through analyzing and comparing the characteristics of provenance metadata in government electronic record metadata standards at international, national and local jurisdictions levels. Some feasible suggestions for future research are made in the conclusion.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"80 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86211802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big Data and Their Impact on Libraries 大数据及其对图书馆的影响
Pub Date : 2019-02-22 DOI: 10.11648/J.AJIST.20190301.11
R. Ball
Academic libraries have a large amount of primary and secondary data with academic content. These contents can be linked and supplemented with freely available data on the Internet and generate benefit for their customers. This includes, for example, the date for indexing of library holdings as well as customer data and their media usage for the development of new helpful services. Thus, methods and knowledge of Big Data applications are required. With the help of Big Data technologies, these added values can be created. However, this presupposes that the limitations and possibilities of Big Data technology are being taken into account and that correlations are accepted as sufficiently accurate. Especially classical librarians have to cut back on their accuracy requirements. This paper gives an overview of the possibilities and chances of using large data amounts in libraries, presents hypotheses and explains practical examples.
高校图书馆拥有大量具有学术内容的一手资料和二手资料。这些内容可以与互联网上的免费数据相联系和补充,并为他们的客户带来好处。例如,这包括为图书馆馆藏编制索引的日期以及客户数据及其媒体使用情况,以便开发新的有用的服务。因此,需要大数据应用的方法和知识。在大数据技术的帮助下,这些附加值可以被创造出来。然而,这需要考虑到大数据技术的局限性和可能性,并且相关性被认为是足够准确的。特别是古典图书管理员不得不降低他们对准确性的要求。本文概述了在图书馆中使用大数据量的可能性和机会,提出了假设并解释了实际示例。
{"title":"Big Data and Their Impact on Libraries","authors":"R. Ball","doi":"10.11648/J.AJIST.20190301.11","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190301.11","url":null,"abstract":"Academic libraries have a large amount of primary and secondary data with academic content. These contents can be linked and supplemented with freely available data on the Internet and generate benefit for their customers. This includes, for example, the date for indexing of library holdings as well as customer data and their media usage for the development of new helpful services. Thus, methods and knowledge of Big Data applications are required. With the help of Big Data technologies, these added values can be created. However, this presupposes that the limitations and possibilities of Big Data technology are being taken into account and that correlations are accepted as sufficiently accurate. Especially classical librarians have to cut back on their accuracy requirements. This paper gives an overview of the possibilities and chances of using large data amounts in libraries, presents hypotheses and explains practical examples.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90934003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Marketing and Promotion of E-journal in Academic Libraries in Tanzania 坦桑尼亚高校图书馆电子期刊的营销与推广
Pub Date : 2019-01-01 DOI: 10.11648/j.ajist.20190301.12
Joseph Cassian Pessa
{"title":"Marketing and Promotion of E-journal in Academic Libraries in Tanzania","authors":"Joseph Cassian Pessa","doi":"10.11648/j.ajist.20190301.12","DOIUrl":"https://doi.org/10.11648/j.ajist.20190301.12","url":null,"abstract":"","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"94 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73654174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of the American Society for Information Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1