期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
The Optimization Path of Research Support Services in University Libraries from the Perspective of Affordance Theory
1
作者 Fangting Ye 《Journal of Contemporary Educational Research》 2024年第6期64-70,共7页
University libraries,as an integral component of university research capabilities,are tasked with serving education by providing research support to faculty and students.This study adopts an affordance research perspe... University libraries,as an integral component of university research capabilities,are tasked with serving education by providing research support to faculty and students.This study adopts an affordance research perspective originating from ecological psychology to explore the optimization path of research support services in libraries in the new media era.Based on the characteristics of university library services,this research analyzes three aspects:production affordance,mobile affordance,and social affordance,and proposes practical recommendations to guide future research service practices of university libraries. 展开更多
关键词 Academic libraries Affordance theory Research support services Social media Media integration
下载PDF
Information Security Service Support-Helping End-Users Cope with Security
2
作者 Rahul Rastogi Rossouw yon Solms 《Computer Technology and Application》 2011年第2期137-147,共11页
Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated infor... Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls. These policies and controls depend directly upon the resultant behavior and actions of end-users. Hence, end-users play a critical role in the effective implementation and running of an information security program in any organization. However, end-users are often unable to navigate and comprehend the various policies, controls and associated issues. Support to end-users is therefore a vital element, but is often neglected by present information security management systems. In the service industry, support to customers is established as an important determinant of customer perceived service quality. This paper applies the same philosophy to provide support to end-users, who are the customers of the Information Security Service. 展开更多
关键词 Information security management information security service management (ISSM) service management informationsecurity service support (ISSS) service encounter.
下载PDF
An Agent-Based Web-Services Monitoring System
3
作者 Coimbatore S. Chandersekaranl William R. Simpson 《Computer Technology and Application》 2011年第9期675-685,共11页
An enterprise based on web services can benefit from computer-based monitoring for its normal course of business. No services, delayed services, inadequate services and poor or delayed information flow all hinder or p... An enterprise based on web services can benefit from computer-based monitoring for its normal course of business. No services, delayed services, inadequate services and poor or delayed information flow all hinder or prevent the normal course of business. The health of the service-oriented approach, the communication flow and the services themselves directly equate to the health and vitality of the enterprise. By health we mean, availability, performance, integrity, and reliability of web services. This paper proposes and details an agent based approach for web service monitoring in an enterprise environment. The objective of this approach is to provide enhanced security, improved help desk information and attribution across a diverse web services landscape that is logically a system but physically distributed. The definition of the agents, their logical locations, their functionality and relationships has not been described previously. This architecture provides many advantages over previous methodologies for event monitoring including assignment of overlapping responsibilities, reduction in help desk effort and placement of measurements throughout the upper layers of the web services system. This is also the first enumeration of significant events and information requirements at the service level. It also assigns responsibility to the components (agents, handlers or the service itself) for logging and alerting such events. This architecture is currently being implemented by a major defense entity. 展开更多
关键词 Help desk AGENT MONITORING ENTERPRISE support services information sharing
下载PDF
School Support Services Model for Students With Disabilities in General Education Classrooms: Using Data From the Special Needs Education Longitudinal Study in Taiwan
4
作者 Shu-Jou Sun Tse-Yang Huang 《Journal of Literature and Art Studies》 2016年第9期1063-1077,共15页
The purposes of this study were to establish a school support service model for students with disabilities in general classroom, and to explore the current status of school support services provided for students with ... The purposes of this study were to establish a school support service model for students with disabilities in general classroom, and to explore the current status of school support services provided for students with disabilities in preschools, primary, and junior high schools. Therefore, this study used data from the Special Needs Education Longitudinal Study in Taiwan, collected in the 2007-2008 academic year. There were 2,924 students with disabilities selected in the study who were placed in general classrooms; 855 were in preschool, 1,079 were in primary school and 990 were in junior high school. The questionnaires in the database were answered by their teachers. The results of this study are listed, as follows: In terms of the school support service model for students with disabilities in the three stages of education, adjustment in teaching accounts for 1-15% of the explanatory power regarding the overall model, while support services account for 63-85%, which peak in junior high schools. Secondly, itinerant teachers are found to be the most important human resource in preschools. For primary and junior high schools, parents and special education teachers are the more prevalent influences. The more common school support services are tuition refunds, itinerant services, adjustments in examinations, and scholarships. 展开更多
关键词 Special Needs Education Longitudinal Study students with disabilities school support services generalclassroom teachers
下载PDF
Applications and Supporting Technologies of 3G Services
5
作者 Yan Hua (Mobile Division of ZTE Corporation,Shanghai 201203,China) 《ZTE Communications》 2004年第1期15-17,共3页
The paper introduces two typical 3G services:the mobile multimedia short message service and the streaming media service. The former is considered as a strong driving force to promote the development of 3G services an... The paper introduces two typical 3G services:the mobile multimedia short message service and the streaming media service. The former is considered as a strong driving force to promote the development of 3G services and applications.The latter is regarded as a typical service on future 3G networks.As supporting technologies of 3G services,open service architecture and open mobile architecture are also discussed. 展开更多
关键词 Applications and supporting Technologies of 3G services MMS GPP WCDMA
下载PDF
Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud
6
作者 S.Priya R.S.Ponmagal 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1895-1907,共13页
Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,num... Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,numerous techniques exist that mitigate the service threats according to different metrics.The rule-based approaches are unsuitable for new threats,whereas trust-based systems estimate trust value based on behavior,flow,and other features.However,the methods suffer from mitigating intrusion attacks at a higher rate.This article presents a novel Multi Fractal Trust Evaluation Model(MFTEM)to overcome these deficiencies.The method involves analyzing service growth,network growth,and quality of service growth.The process estimates the user’s trust in various ways and the support of the user in achieving higher service performance by calculating Trusted Service Support(TSS).Also,the user’s trust in supporting network stream by computing Trusted Network Support(TNS).Similarly,the user’s trust in achieving higher throughput is analyzed by computing Trusted QoS Support(TQS).Using all these measures,the method adds the Trust User Score(TUS)value to decide on the clearance of user requests.The proposed MFTEM model improves intrusion detection accuracy with higher performance. 展开更多
关键词 Intrusion detection cloud systems trusted service support trusted network support trust user score trusted QoS support
下载PDF
A novel differentiated services supporting scheme for optical burst switched networks 被引量:2
7
作者 王建新 曾庆济 +1 位作者 张治中 池灏 《Chinese Optics Letters》 SCIE EI CAS CSCD 2003年第7期392-394,共3页
In this letter, we analyze the drawback of tail-dropping contention resolution in optical burst switched networks. Once contention occurs, we adopt modified head-dropping policy to resolve contention. This policy drop... In this letter, we analyze the drawback of tail-dropping contention resolution in optical burst switched networks. Once contention occurs, we adopt modified head-dropping policy to resolve contention. This policy drops the head of the contending burst only if the overlapping region of the two bursts is less than the whole contending burst size, otherwise drops the whole contending burst. In order to have a better support of differentiated service, a new burst assembly policy, namely, Priority-based proportional mixed burst assembly, is proposed. Simulation results show that the proposed scheme performs very well in terms of performance metrics such as the times of contention and packet loss probability. 展开更多
关键词 NODE IT for A novel differentiated services supporting scheme for optical burst switched networks been THAN OBS of that in
原文传递
Priority-Based Mixed Assembly Supporting Differentiated Service for Optical Burst Switched Networks 被引量:1
8
作者 Jianxin Wang, Qingji Zeng, Hao chi, Shenghua Wang, Shilin Xiao, Zhizhong Zhang CBONT of Shanghai Jiaotong University, China 200030 2 Beijing Lyang Technology Co. Ltd. China 100085 《光学学报》 EI CAS CSCD 北大核心 2003年第S1期707-708,共2页
In order to have a better support of differentiated service, we propose Priority-based mixed burst assembly, in which packets of different priorities are assembled in a burst with an assigned proportion, and the prior... In order to have a better support of differentiated service, we propose Priority-based mixed burst assembly, in which packets of different priorities are assembled in a burst with an assigned proportion, and the priorities are lined in an ascending order in a burst from head to tail. Simulation results show that the proposed scheme performs very well in terms of latency and packet loss probability. 展开更多
关键词 for WDM IP Priority-Based Mixed Assembly supporting Differentiated service for Optical Burst Switched Networks into NODE OBS than PBMA been of QoS that length
原文传递
Support Services Growing for Elderly in China
9
作者 XIAO MING ZHAO NING 《Women of China》 1994年第9期34-35,共2页
IN China's Mainland, there are more than 100 million people aged 60 or older, and their numbers are increasing by an average of three percent each year. Every day in China about 20,000 people celebrate their 60th ... IN China's Mainland, there are more than 100 million people aged 60 or older, and their numbers are increasing by an average of three percent each year. Every day in China about 20,000 people celebrate their 60th birthday. There are more elderly people living China than in the rest of the world, it is estimated that by the year 2000, China will become a country of the aged, inhabited by more than 130 million elderly. So the aging issue and how the country will support its old people is 展开更多
关键词 support services Growing for Elderly in China
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部