This paper resumes a research project developed in the concession area of AES Eletropaulo, the largest electrical energy distribution company in Brazil. First, the global standards of information exchange within power...This paper resumes a research project developed in the concession area of AES Eletropaulo, the largest electrical energy distribution company in Brazil. First, the global standards of information exchange within power transmission and distribution area were evaluated, allowing the definition of state of the art on the theme, followed by determining its applications considering technologies already applied by the company. The specifications needed for the generation of a data integration model are adapted to radial overhead network at company concession area. The project developed an intermediary connectivity layer, based on the CIM (common information model), which enables corporative systems to communicate in a standard way, through the use of integrating technologies. It, therefore, enabled modeling all main subjects of an electrical network in an open, extensible and non-proprietary way, in a model that contains classes and attributes of such subjects, as well as their relationships. Calculation and planning products adopted by the company were integrated to the technological layer implemented.展开更多
To further promote information construction in rural areas and popularize agricultural information service,we introduced the content of new agricultural hotline sci-tech information service system construction,summed ...To further promote information construction in rural areas and popularize agricultural information service,we introduced the content of new agricultural hotline sci-tech information service system construction,summed up application effect of the system,analyzed advantages and existing problems in the system development,and put forward countermeasures for its further development.展开更多
Following the advent of and continuous progress of technology,computer network and information management have gradually being incorporated into the daily operation and management of university libraries all around th...Following the advent of and continuous progress of technology,computer network and information management have gradually being incorporated into the daily operation and management of university libraries all around the world.The service system of university libraries has also transformed from the conventional reference consulting model into a knowledge-based service model.This transformation has improved the professionalism and individualism of university libraries.Therefore,establishing a competent one-stop information service model has significant and important values.In this work,we analyzed the basic functionalities and the feasibility of one-stop information service model for university libraries.We also discussed in details the construction methodology for different modes,for reference only.展开更多
On the basis of user satisfaction,authors made research hypotheses by learning from relevant e-service quality evaluation models.A questionnaire survey was then conducted on some content-based websites in terms of the...On the basis of user satisfaction,authors made research hypotheses by learning from relevant e-service quality evaluation models.A questionnaire survey was then conducted on some content-based websites in terms of their convenience,information quality,personalization and site aesthetics,which may affect the overall satisfaction of users.Statistical analysis was also made to build a user satisfaction-based quality evaluation system of network information service.展开更多
With the increasing of the elderly population and the growing hearth care cost, the role of service robots in aiding the disabled and the elderly is becoming important. Many researchers in the world have paid much att...With the increasing of the elderly population and the growing hearth care cost, the role of service robots in aiding the disabled and the elderly is becoming important. Many researchers in the world have paid much attention to heaRthcare robots and rehabilitation robots. To get natural and harmonious communication between the user and a service robot, the information perception/feedback ability, and interaction ability for service robots become more important in many key issues.展开更多
With the massive increase of digital resource based on the network,it becomes very important that how to help readers acquire the information needed according to the individualized requirement and interest in an accur...With the massive increase of digital resource based on the network,it becomes very important that how to help readers acquire the information needed according to the individualized requirement and interest in an accurate,convenient and prompt method. Therefore,it is very urgent to investigate individualized information service of library. In this paper,based on the development of the individualized information service for the reader in the college library,the individualized information service is clarified by using three perspectives,including establishment of individualized information demand model,integration of internal and external resource and protection of the reader privacy. Finally,the corresponding strategy and related measure are presented.展开更多
Information Commons(信息共享空间)是20世纪90年代末,国外高校图书馆为适应用户需求的变化和研究的需要而建立起来的一种基础设施和新的服务模式,本文先介绍了IC的概念及特点,然后从几个方面介绍了国外图书馆IC的基本情况,最后论述了...Information Commons(信息共享空间)是20世纪90年代末,国外高校图书馆为适应用户需求的变化和研究的需要而建立起来的一种基础设施和新的服务模式,本文先介绍了IC的概念及特点,然后从几个方面介绍了国外图书馆IC的基本情况,最后论述了我国高校图书馆构建IC的策略及注意事项。展开更多
Information Commons(IC,信息共享中心)是20世纪90年代国外高校图书馆为适应用户需求的变化而建立起来的一种新型的图书馆服务模式。本文阐明了IC兴起的背景及其发展和应用;分析了其构成要素和服务模式;从4个方面探讨了对我国图书馆的...Information Commons(IC,信息共享中心)是20世纪90年代国外高校图书馆为适应用户需求的变化而建立起来的一种新型的图书馆服务模式。本文阐明了IC兴起的背景及其发展和应用;分析了其构成要素和服务模式;从4个方面探讨了对我国图书馆的启示和借鉴作用。展开更多
The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing ...The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs;(b) majority of the courses examined, stress both strong technical and hands-on skills;(c) encourage vendor-neutral certifications as a course exit characteristic;and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated.展开更多
文摘This paper resumes a research project developed in the concession area of AES Eletropaulo, the largest electrical energy distribution company in Brazil. First, the global standards of information exchange within power transmission and distribution area were evaluated, allowing the definition of state of the art on the theme, followed by determining its applications considering technologies already applied by the company. The specifications needed for the generation of a data integration model are adapted to radial overhead network at company concession area. The project developed an intermediary connectivity layer, based on the CIM (common information model), which enables corporative systems to communicate in a standard way, through the use of integrating technologies. It, therefore, enabled modeling all main subjects of an electrical network in an open, extensible and non-proprietary way, in a model that contains classes and attributes of such subjects, as well as their relationships. Calculation and planning products adopted by the company were integrated to the technological layer implemented.
基金Beijing Sci-tech Plan Project (12396 Spark Sci-tech Hotline Construction and Sci-tech Training in Rural Areas) Spe-cial Project of Beijing Sci-tech Popularization (2010 " Loving Surfing the Net" - Farmer Information Quality Series Training)
文摘To further promote information construction in rural areas and popularize agricultural information service,we introduced the content of new agricultural hotline sci-tech information service system construction,summed up application effect of the system,analyzed advantages and existing problems in the system development,and put forward countermeasures for its further development.
文摘Following the advent of and continuous progress of technology,computer network and information management have gradually being incorporated into the daily operation and management of university libraries all around the world.The service system of university libraries has also transformed from the conventional reference consulting model into a knowledge-based service model.This transformation has improved the professionalism and individualism of university libraries.Therefore,establishing a competent one-stop information service model has significant and important values.In this work,we analyzed the basic functionalities and the feasibility of one-stop information service model for university libraries.We also discussed in details the construction methodology for different modes,for reference only.
基金supported by the Ministry of Education of China(Grant No.06JJD870006)
文摘On the basis of user satisfaction,authors made research hypotheses by learning from relevant e-service quality evaluation models.A questionnaire survey was then conducted on some content-based websites in terms of their convenience,information quality,personalization and site aesthetics,which may affect the overall satisfaction of users.Statistical analysis was also made to build a user satisfaction-based quality evaluation system of network information service.
文摘With the increasing of the elderly population and the growing hearth care cost, the role of service robots in aiding the disabled and the elderly is becoming important. Many researchers in the world have paid much attention to heaRthcare robots and rehabilitation robots. To get natural and harmonious communication between the user and a service robot, the information perception/feedback ability, and interaction ability for service robots become more important in many key issues.
文摘With the massive increase of digital resource based on the network,it becomes very important that how to help readers acquire the information needed according to the individualized requirement and interest in an accurate,convenient and prompt method. Therefore,it is very urgent to investigate individualized information service of library. In this paper,based on the development of the individualized information service for the reader in the college library,the individualized information service is clarified by using three perspectives,including establishment of individualized information demand model,integration of internal and external resource and protection of the reader privacy. Finally,the corresponding strategy and related measure are presented.
文摘The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs;(b) majority of the courses examined, stress both strong technical and hands-on skills;(c) encourage vendor-neutral certifications as a course exit characteristic;and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated.