University libraries,as an integral component of university research capabilities,are tasked with serving education by providing research support to faculty and students.This study adopts an affordance research perspe...University libraries,as an integral component of university research capabilities,are tasked with serving education by providing research support to faculty and students.This study adopts an affordance research perspective originating from ecological psychology to explore the optimization path of research support services in libraries in the new media era.Based on the characteristics of university library services,this research analyzes three aspects:production affordance,mobile affordance,and social affordance,and proposes practical recommendations to guide future research service practices of university libraries.展开更多
Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated infor...Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls. These policies and controls depend directly upon the resultant behavior and actions of end-users. Hence, end-users play a critical role in the effective implementation and running of an information security program in any organization. However, end-users are often unable to navigate and comprehend the various policies, controls and associated issues. Support to end-users is therefore a vital element, but is often neglected by present information security management systems. In the service industry, support to customers is established as an important determinant of customer perceived service quality. This paper applies the same philosophy to provide support to end-users, who are the customers of the Information Security Service.展开更多
An enterprise based on web services can benefit from computer-based monitoring for its normal course of business. No services, delayed services, inadequate services and poor or delayed information flow all hinder or p...An enterprise based on web services can benefit from computer-based monitoring for its normal course of business. No services, delayed services, inadequate services and poor or delayed information flow all hinder or prevent the normal course of business. The health of the service-oriented approach, the communication flow and the services themselves directly equate to the health and vitality of the enterprise. By health we mean, availability, performance, integrity, and reliability of web services. This paper proposes and details an agent based approach for web service monitoring in an enterprise environment. The objective of this approach is to provide enhanced security, improved help desk information and attribution across a diverse web services landscape that is logically a system but physically distributed. The definition of the agents, their logical locations, their functionality and relationships has not been described previously. This architecture provides many advantages over previous methodologies for event monitoring including assignment of overlapping responsibilities, reduction in help desk effort and placement of measurements throughout the upper layers of the web services system. This is also the first enumeration of significant events and information requirements at the service level. It also assigns responsibility to the components (agents, handlers or the service itself) for logging and alerting such events. This architecture is currently being implemented by a major defense entity.展开更多
The purposes of this study were to establish a school support service model for students with disabilities in general classroom, and to explore the current status of school support services provided for students with ...The purposes of this study were to establish a school support service model for students with disabilities in general classroom, and to explore the current status of school support services provided for students with disabilities in preschools, primary, and junior high schools. Therefore, this study used data from the Special Needs Education Longitudinal Study in Taiwan, collected in the 2007-2008 academic year. There were 2,924 students with disabilities selected in the study who were placed in general classrooms; 855 were in preschool, 1,079 were in primary school and 990 were in junior high school. The questionnaires in the database were answered by their teachers. The results of this study are listed, as follows: In terms of the school support service model for students with disabilities in the three stages of education, adjustment in teaching accounts for 1-15% of the explanatory power regarding the overall model, while support services account for 63-85%, which peak in junior high schools. Secondly, itinerant teachers are found to be the most important human resource in preschools. For primary and junior high schools, parents and special education teachers are the more prevalent influences. The more common school support services are tuition refunds, itinerant services, adjustments in examinations, and scholarships.展开更多
The paper introduces two typical 3G services:the mobile multimedia short message service and the streaming media service. The former is considered as a strong driving force to promote the development of 3G services an...The paper introduces two typical 3G services:the mobile multimedia short message service and the streaming media service. The former is considered as a strong driving force to promote the development of 3G services and applications.The latter is regarded as a typical service on future 3G networks.As supporting technologies of 3G services,open service architecture and open mobile architecture are also discussed.展开更多
Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,num...Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,numerous techniques exist that mitigate the service threats according to different metrics.The rule-based approaches are unsuitable for new threats,whereas trust-based systems estimate trust value based on behavior,flow,and other features.However,the methods suffer from mitigating intrusion attacks at a higher rate.This article presents a novel Multi Fractal Trust Evaluation Model(MFTEM)to overcome these deficiencies.The method involves analyzing service growth,network growth,and quality of service growth.The process estimates the user’s trust in various ways and the support of the user in achieving higher service performance by calculating Trusted Service Support(TSS).Also,the user’s trust in supporting network stream by computing Trusted Network Support(TNS).Similarly,the user’s trust in achieving higher throughput is analyzed by computing Trusted QoS Support(TQS).Using all these measures,the method adds the Trust User Score(TUS)value to decide on the clearance of user requests.The proposed MFTEM model improves intrusion detection accuracy with higher performance.展开更多
In this letter, we analyze the drawback of tail-dropping contention resolution in optical burst switched networks. Once contention occurs, we adopt modified head-dropping policy to resolve contention. This policy drop...In this letter, we analyze the drawback of tail-dropping contention resolution in optical burst switched networks. Once contention occurs, we adopt modified head-dropping policy to resolve contention. This policy drops the head of the contending burst only if the overlapping region of the two bursts is less than the whole contending burst size, otherwise drops the whole contending burst. In order to have a better support of differentiated service, a new burst assembly policy, namely, Priority-based proportional mixed burst assembly, is proposed. Simulation results show that the proposed scheme performs very well in terms of performance metrics such as the times of contention and packet loss probability.展开更多
In order to have a better support of differentiated service, we propose Priority-based mixed burst assembly, in which packets of different priorities are assembled in a burst with an assigned proportion, and the prior...In order to have a better support of differentiated service, we propose Priority-based mixed burst assembly, in which packets of different priorities are assembled in a burst with an assigned proportion, and the priorities are lined in an ascending order in a burst from head to tail. Simulation results show that the proposed scheme performs very well in terms of latency and packet loss probability.展开更多
IN China's Mainland, there are more than 100 million people aged 60 or older, and their numbers are increasing by an average of three percent each year. Every day in China about 20,000 people celebrate their 60th ...IN China's Mainland, there are more than 100 million people aged 60 or older, and their numbers are increasing by an average of three percent each year. Every day in China about 20,000 people celebrate their 60th birthday. There are more elderly people living China than in the rest of the world, it is estimated that by the year 2000, China will become a country of the aged, inhabited by more than 130 million elderly. So the aging issue and how the country will support its old people is展开更多
文摘University libraries,as an integral component of university research capabilities,are tasked with serving education by providing research support to faculty and students.This study adopts an affordance research perspective originating from ecological psychology to explore the optimization path of research support services in libraries in the new media era.Based on the characteristics of university library services,this research analyzes three aspects:production affordance,mobile affordance,and social affordance,and proposes practical recommendations to guide future research service practices of university libraries.
文摘Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls. These policies and controls depend directly upon the resultant behavior and actions of end-users. Hence, end-users play a critical role in the effective implementation and running of an information security program in any organization. However, end-users are often unable to navigate and comprehend the various policies, controls and associated issues. Support to end-users is therefore a vital element, but is often neglected by present information security management systems. In the service industry, support to customers is established as an important determinant of customer perceived service quality. This paper applies the same philosophy to provide support to end-users, who are the customers of the Information Security Service.
文摘An enterprise based on web services can benefit from computer-based monitoring for its normal course of business. No services, delayed services, inadequate services and poor or delayed information flow all hinder or prevent the normal course of business. The health of the service-oriented approach, the communication flow and the services themselves directly equate to the health and vitality of the enterprise. By health we mean, availability, performance, integrity, and reliability of web services. This paper proposes and details an agent based approach for web service monitoring in an enterprise environment. The objective of this approach is to provide enhanced security, improved help desk information and attribution across a diverse web services landscape that is logically a system but physically distributed. The definition of the agents, their logical locations, their functionality and relationships has not been described previously. This architecture provides many advantages over previous methodologies for event monitoring including assignment of overlapping responsibilities, reduction in help desk effort and placement of measurements throughout the upper layers of the web services system. This is also the first enumeration of significant events and information requirements at the service level. It also assigns responsibility to the components (agents, handlers or the service itself) for logging and alerting such events. This architecture is currently being implemented by a major defense entity.
文摘The purposes of this study were to establish a school support service model for students with disabilities in general classroom, and to explore the current status of school support services provided for students with disabilities in preschools, primary, and junior high schools. Therefore, this study used data from the Special Needs Education Longitudinal Study in Taiwan, collected in the 2007-2008 academic year. There were 2,924 students with disabilities selected in the study who were placed in general classrooms; 855 were in preschool, 1,079 were in primary school and 990 were in junior high school. The questionnaires in the database were answered by their teachers. The results of this study are listed, as follows: In terms of the school support service model for students with disabilities in the three stages of education, adjustment in teaching accounts for 1-15% of the explanatory power regarding the overall model, while support services account for 63-85%, which peak in junior high schools. Secondly, itinerant teachers are found to be the most important human resource in preschools. For primary and junior high schools, parents and special education teachers are the more prevalent influences. The more common school support services are tuition refunds, itinerant services, adjustments in examinations, and scholarships.
文摘The paper introduces two typical 3G services:the mobile multimedia short message service and the streaming media service. The former is considered as a strong driving force to promote the development of 3G services and applications.The latter is regarded as a typical service on future 3G networks.As supporting technologies of 3G services,open service architecture and open mobile architecture are also discussed.
文摘Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,numerous techniques exist that mitigate the service threats according to different metrics.The rule-based approaches are unsuitable for new threats,whereas trust-based systems estimate trust value based on behavior,flow,and other features.However,the methods suffer from mitigating intrusion attacks at a higher rate.This article presents a novel Multi Fractal Trust Evaluation Model(MFTEM)to overcome these deficiencies.The method involves analyzing service growth,network growth,and quality of service growth.The process estimates the user’s trust in various ways and the support of the user in achieving higher service performance by calculating Trusted Service Support(TSS).Also,the user’s trust in supporting network stream by computing Trusted Network Support(TNS).Similarly,the user’s trust in achieving higher throughput is analyzed by computing Trusted QoS Support(TQS).Using all these measures,the method adds the Trust User Score(TUS)value to decide on the clearance of user requests.The proposed MFTEM model improves intrusion detection accuracy with higher performance.
基金This work was partially supported by the National Natural Science Foundation of China under Grant No. 69990540.
文摘In this letter, we analyze the drawback of tail-dropping contention resolution in optical burst switched networks. Once contention occurs, we adopt modified head-dropping policy to resolve contention. This policy drops the head of the contending burst only if the overlapping region of the two bursts is less than the whole contending burst size, otherwise drops the whole contending burst. In order to have a better support of differentiated service, a new burst assembly policy, namely, Priority-based proportional mixed burst assembly, is proposed. Simulation results show that the proposed scheme performs very well in terms of performance metrics such as the times of contention and packet loss probability.
基金This work is partially supported by the National Natural Science Foundation of China under contract 69990540.
文摘In order to have a better support of differentiated service, we propose Priority-based mixed burst assembly, in which packets of different priorities are assembled in a burst with an assigned proportion, and the priorities are lined in an ascending order in a burst from head to tail. Simulation results show that the proposed scheme performs very well in terms of latency and packet loss probability.
文摘IN China's Mainland, there are more than 100 million people aged 60 or older, and their numbers are increasing by an average of three percent each year. Every day in China about 20,000 people celebrate their 60th birthday. There are more elderly people living China than in the rest of the world, it is estimated that by the year 2000, China will become a country of the aged, inhabited by more than 130 million elderly. So the aging issue and how the country will support its old people is