Masaud-Wahaishi, Abdulmutalib; Ghenniwa, Hamada
Healthcare industry is facing a major reform at all levels—locally, regionally, nationally, and internationally. Healthcare services and systems become very complex and comprise of a vast number of components (software systems, doctors, patients, etc.) that are characterized by shared, distributed and heterogeneous information sources with varieties of clinical and other settings. The challenge now faced with decision making, and management of care is to operate effectively in order to meet t...
Full Text Available Information systems (IS development should not only accomplish functional models but also conceptual models to represent the organizational environment in which it will have to evolve and must be aligned with strategic objectives. Generally, a significant innovations in the enterprise, is to organize its IS around its business processes. Otherwise, business models must be enriched by the agent paradigm to reduce the complexity involved in solving a problem by the structuring of knowledge on a set of intelligent agents, the association between agents and activities and collaboration among agents. To do this, we propose an agent oriented approach based on the model-driven-architecture (MDA for the information system development. This approach uses in its different phases, the BPMN language for the business processes modeling, AML language for the agent modeling, and JADEX platform for the implementation. The IS development is realized by different automated mappings from source models to target models.
GUAN Xu; CHENG Ming; LIU Bao
An increasing number of computer systems are being viewed in terms of autonomous agents.Most people believe that agent-oriented approach is well suited to design and build complex systems. Yet. todate, little effort had been devoted to discuss the advantages of agent-oriented approach as a mainstreamsoftware engineering paradigm. Here both of this issues and the relation between object-oriented and agent-oriented will be argued. we describe an agent-oriented methodology and provide a quote for designing anauction system.
MingCheng; XuGuan; BaoLiu
An increasing number of computer systems are being viewed in terms of autonomous agents．Most people believe that agent-oriented approach is well suited to designing and building complex systems． Yet， to date， little effort had been devoted to discussing the advantages of agent-oriented approach as a mainstream software engineering paradiam．Here both of this issues and the relation between object-oriented and agentoriented will be argued．We describe an agent-oriented methodology and provide a quote for designing a auction system．
Agent-oriented programming (AOP) is a framework to develop agents, and it aims to link the gap betweentheory and practical in agent research. The core of an AOP framework is its language and semantics. In this paper,we propose the necessary properties which agents should have, and then give a summary and analysis about differentAOP languages based on these properties.
Jie Wang; Shi-Er Ju; Chun-Nian Liu
Currently, agent-based computing is an active research area, and great efforts have been made towards the agent-oriented programming both from a theoretical and practical view. However, most of them assume that there is no uncertainty in agents' mental state and their environment. In other words, under this assumption agent developers are just allowed to specify how his agent acts when the agent is 100% sure about what is true/false. In this paper, this unrealistic assumption is removed and a new agent-oriented probabilistic logic programming language is proposed, which can deal with uncertain information about the world. The programming language is based on a combination of features of probabilistic logic programming and imperative programming.
Babak Darvish Rouhani
Full Text Available Nowadays, utilizing EA by enterprises with medium and long term goals causes improvement in their productivity and competitiveness. With respect to varied changes in enterprise's business activities and attitudes, flexibility in information systems of EA is a crucial factor. Agent's capacities in implementation of complex systems goal convince huge enterprises to use agent oriented architecture in their EA programs. Combination of EA and agent oriented architecture introduces a new attitude in order to make a better conditions for huge enterprises with complex information systems. This paper firstly enumerates the current problems of Enterprise Architecture, and then agent-oriented Enterprise Architecture is introduced as a comprehensive solution for eliminating mentioned defects deals raised. The main results of agent-oriented Enterprise Architecture includes: more flexibility in organizational change, reengineering organizational processes and comprehensive coverage of all activities of huge and complex organizations with no other lateral requirements.
Babak Darvish Rouhani; Fatemeh Nikpay
Nowadays, utilizing EA by enterprises with medium and long term goals causes improvement in their productivity and competitiveness. With respect to varied changes in enterprise's business activities and attitudes, flexibility in information systems of EA is a crucial factor. Agent's capacities in implementation of complex systems goal convince huge enterprises to use agent oriented architecture in their EA programs. Combination of EA and agent oriented architecture introduces a new attitude i...
Full Text Available A new Agent-Oriented Programming (AOP language called A++ is introduced in this research for developing agent-based distributed systems. In this work, agent-oriented programming is defined as a programming method with characteristics of distribution, autonomy, concurrency, and mobility. Both agents and objects can be modeled in A++. In addition to data and methods that can be defined in objects including classes and instances, each agent is also associated with an independent computing process in agent-oriented programming.
陆汝钤; 石纯一; 张松懋; 毛希平; 徐晋晖; 杨萍; 范路
Common sense processing has been the key difficulty in Al community. Through analyzing various research methods on common sense, a large-scale agent-oriented commonsense knowledge base is described in this paper. We propose a new type of agent——CBS agent, specify common sense oriented semantic network descriptive language-Csnet, augment Prolog for common sense, analyze the ontology structure, and give the execution mechanism of the knowledge base.
Bogg, Paul; Beydoun, Ghassan; Low, Graham
Problem-solving methods (PSM) are abstract structures that describe specific reasoning processes employed to solve a set of similar problems. We envisage that off-the-shelf PSMs can assist in the development of agent-oriented solutions, not only as reusable and extensible components that software engineers employ for designing agent architecture solutions, but just as importantly as a set of runtime capabilities that agents themselves dynamically employ in order to solve problems. This chapter describes PSMs for agent-oriented software engineering (AOSE) that address interaction-dependent problem-solving such as negotiation or cooperation. An extension to an AOSE methodology MOBMAS is proposed whereby PSMs are integrated in the software development phases of MAS Organization Design, Internal Design, and Interaction Design. In this way, knowledge engineering drives the development of agent-oriented systems.
Petri net is a kind of effective graphic modeling tool. The agent technology is combined with petri net in order to enhance flexibility and extendibility, and the agent-oriented single token and colored transition petri net is proposed. Some characteristics such as liveness, fairness and safety are analyzed. Finally, an example in mould agile manufacturing is given to illustrate the use of it.
Sivakumar, N.; K. Vivekanandan
Several Agent Oriented Software Engineering (AOSE) methodologies were proposed to build open, heterogeneous and complex internet based systems. AOSE methodologies offer different conceptual frameworks, notations and techniques, thereby provide a platform to make the system abstract, generalize, dynamic and autonomous. Lifecycle coverage is one of the important criteria for evaluating an AOSE methodology. Most of the existing AOSE methodologies focuses only on analysis, design, implementation ...
Bresciani, Paolo; Giorgini, Paolo; Giunchiglia, Fausto; Mylopoulos, John; PERINI, Anna
Our goal in this paper is to introduce and motivate a methodology, called Tropos, 1 for building agent oriented software systems. Tropos is based on two key ideas. First, the notion of agent and all the related mentalistic notions (for instance: goals and plans) are used in all phases of software development, from the early analysis down to the actual implementation. Second, Tropos covers also the very early phases of requirements analysis, thus allowing for a deeper understanding of the envi...
Full Text Available Several Agent Oriented Software Engineering (AOSE methodologies were proposed to build open, heterogeneous and complex internet based systems. AOSE methodologies offer different conceptual frameworks, notations and techniques, thereby provide a platform to make the system abstract, generalize, dynamic and autonomous. Lifecycle coverage is one of the important criteria for evaluating an AOSE methodology. Most of the existing AOSE methodologies focuses only on analysis, design, implementation and disregarded testing, stating that the testing can be done by extending the existing objectoriented testing techniques. Though objects and agents have some similarities, they both differ widely. Role is an important attribute of an agent that has a huge scope and support for the analysis, design and implementation of Multi-Agent System (MAS. The main objective of the paper is to extend the scope and support of role towards testing, thereby the vacancy for software testing perception in the AOSE series will be filled up. This paper presents an overview of role based testing based on the V-Model in order to add the next new component as of AgentOriented Software testing in the agent oriented development life cycle.
Mitrović, Dejan; Ivanović, Mirjana; Budimac, Zoran
Scala and its multi-threaded model based on actors represent an excellent framework for developing purely reactive agents. This paper presents an early research on extending Scala with declarative programming constructs, which would result in a new agent-oriented programming language suitable for developing more advanced, BDI agent architectures. The main advantage the new language over many other existing solutions for programming BDI agents is a natural and straightforward integration of imperative and declarative programming constructs, fitted under a single development framework.
With this book, Onn Shehory and Arnon Sturm, together with further contributors, introduce the reader to various facets of agent-oriented software engineering (AOSE). They provide a selected collection of state-of-the-art findings, which combines research from information systems, artificial intelligence, distributed systems and software engineering and covers essential development aspects of agent-based systems. The book chapters are organized into five parts. The first part introduces the AOSE domain in general, including introduction to agents and the peculiarities of software engineerin
Lin, Chia-En [University of North Texas; Kavi, Krishna M. [University of North Texas; Sheldon, Frederick T [ORNL; Daley, Kristopher M [ORNL; Abercrombie, Robert K [ORNL
Systems using software agents (or multi-agent systems, MAS) are becoming more popular within the development mainstream because, as the name suggests, an agent aims to handle tasks autonomously with intelligence. To benefit from autonomous control and reduced running costs, system functions are performed automatically. Agent-oriented considerations are being steadily accepted into the various software design paradigms. Agents may work alone, but most commonly, they cooperate toward achieving some application goal(s). MAS's are components in systems that are viewed as many individuals living in a society working together. From a SE perspective, solving a problem should encompass problem realization, requirements analysis, architecture design and implementation. These steps should be implemented within a life-cycle process including testing, verification, and reengineering to proving the built system is sound. In this paper, we explore the various applications of agent-based systems categorized into different application domains. A baseline is developed herein to help us focus on the core of agent concepts throughout the comparative study and to investigate both the object-oriented and agent-oriented techniques that are available for constructing agent-based systems. In each respect, we address the conceptual background associated with these methodologies and how available tools can be applied within specific domains.
Agent-oriented techniques represent a new means of analyzing,designing and building complex software systems.They have the potential to significantly improve current practice in software engineering.In this paper some important techniques and methods for analyzing,designing,specification,implementation,and verification are analyzed.The comparison of characteristics between agent-oriented engineering and object-oriented engineering are given.And the issues and research methods of agent-oriented engineering are discussed.
Agent concepts have been used in a number of recent approaches of requirement engineering (RE),such as KAOS (Knowledge acquisition in automated specification), i* and GBRAM (Goal-based requirements analysis method). And the modeling languages used in those approaches only permit precise and unambiguous modeling of system properties and behavior. However, some system problems, particularly those drawn from the agentoriented problem domain, may be difficult to model in crisp or precise terms. There are several reasons for this. On one hand, the lack of information may produce the uncertainty of the class to which an object belongs. If we have enough information or if we are considering sufficient attributes,we should be able to make a precise categorization. On the other hand, uncertainty may also arise from some natural imprecision in requirement describing itself, such as soft goal describing and uncertain concepts describing. In the second case, the classification into precise classes may be impossible, not because we do not have enough information, but because the classes themselves are not naturally discrete. In this paper, we start with a discussion of the uncertainty in agent-oriented requirement engineering. Then we propose to handle the uncertainty using fuzzy sets. Finally we refine this proposal to integrate a fuzzy version of Z with the KAOS method. This integration is illustrated on the example of the mine pump. In the conclusion part,we compare the advantages of our approach with those of the classical KAOS approach.
Traditional software engineering approaches and metaphors fall short when applied to areas of growing relevance such as electronic commerce, enterprise resource planning, and mobile computing: such areas, in fact, generally call for open architectures that may evolve dynamically over time so as to accommodate new components and meet new requirements. This is probably one of the main reasons that the agent metaphor and the agent-oriented paradigm are gaining momentum in these ar...
Thunem, Harald P-J; Thunem, Atoosa P-J; Lind, Morten
This paper demonstrates how a generic agent-oriented framework can be used in advanced automation environments, for systems analysis in general and supervision, diagnosis and prognosis purposes in particular. The framework’s background and main application areas are briefly described. Next, the......-oriented supervision, diagnosis and prognosis purposes are equally explained. Finally, the paper sums up by also addressing plans for further enhancement and in that respect integration with other tailor-made tools for joint treatment of various modeling and analysis activities upon advanced automation environments....
Full Text Available Agent-oriented techniques characterize an exciting new way of analyzing, designing and building complex software systems in real time world. These techniques have the prospective to significantly improve current practice in software engineering and to extend the range of applications that can feasibly be tackled. The Agent Oriented Programming & Software Engineering is being focused to design distributed software systems. The agent technology has been dominated to enhance software reusability and maintainability.Now more than 100 Agent toolkits for commercial & research purpose are available. Most of the toolkits are designed using Java language. Although use of agent toolkits makes programming more efficient, butthe security of code is not achieved. The security of the program code cannot be ignored. In this paper we discuss the approach of using jar file to enhance the security. The JAR files can be electronically signed & verified. The digital certificates can be used by the programmers. By using the jar file agent programcode can be more secure. In this paper we will discuss an approach to achieve the security of the code of agent programs. Now we will discuss how jar file are created & security is to be implemented.
Hinchey, Michael G. (Inventor); Penn, Joaquin (Inventor); Sterritt, Roy (Inventor)
Systems, methods and apparatus are provided through which in some embodiments, an agent-oriented specification modeled with MaCMAS, is analyzed, flaws in the agent-oriented specification modeled with MaCMAS are corrected, and an implementation is derived from the corrected agent-oriented specification. Described herein are systems, method and apparatus that produce fully (mathematically) tractable development of agent-oriented specification(s) modeled with methodology fragment for analyzing complex multiagent systems (MaCMAS) and policies for autonomic systems from requirements through to code generation. The systems, method and apparatus described herein are illustrated through an example showing how user formulated policies can be translated into a formal mode which can then be converted to code. The requirements-based programming systems, method and apparatus described herein may provide faster, higher quality development and maintenance of autonomic systems based on user formulation of policies.
To better describe the behaviors of single agent and the complex interactions between agents in MAS, a kind of model called Agent-Oriented Petri Nets(AOPN) was proposed by unifying the technology of agent and Petri Nets.An AOPN formalized definition was given first.And then by modeling interactions between buyer agent and seller agent based on on-line shopping, agent-oriented Petri nets modeling method was smdied and analyzed by using the Petri net modeling tool.The method solved the complex problem of system structure effectively and built the foundation for further application.%为了更好地刻画单个Asent的行为和多Asent间复杂、并行的动态交互,将面向Agent的设计思想与Petri网建模方法相结合,形成了一种面向Agent的Petri网(AOPN)模型.首先给出了面向Agent的Petri网的形式化定义,然后利用Petri网的建模工具,以网上购物背景下买卖双方简单交互为例,对基于面向Agent的Petri网模型的系统建模方法进行了研究和分析,有效地解决了系统结构复杂性的问题.
Järvinen, Hannu; Garcia Gasulla, Dario
Building Automation Systems typically consists of di erent types of devices interacting and sharing information with each other. Similarly, Multi-Agent Systems has focused on flexible mechanisms to coordinate networks of (usually distributed) autonomous computational entities. The integration of these two fields provides powerful solutions to complex problems. Such integration has often been attempted by using Web technologies, such as Web services. However, the lack of a common standa...
This paper introduces an agent-oriented methodology and modeling tools based on MAGE. The methodology supports analysis, desing and implimentation of multi-agent systems. The modeling tools assist the developer in building multi-agent systems using the methodology through a set of visual model editors.
The purpose of this paper is to give a short motivation for and an introduction to a novel approach of how to view and develop flexible open distributed systems of the future. We propose that the emerging style of Agent Oriented Sofnyare Engineering (AOSE) has high potentials as a candidate for future models of system development. We indicate in this paper some recent and upcoming applications of AO-SE. Furthermore, we round off the paper by giving an overview of an ongoing project within an ...
Information privacy has received much public and research interest in recent years. Globally this has arisen from public anxiety following the September 11 attacks and within Australia a progressive tightening of privacy legislation in particular the privacy amendment (private sector) Act of 2000 which became operative in 2001. This paper presents the results of a study into attitudes towards information privacy. Based on an instrument developed and validated by Smith et al (1996a) this st...
由于因特网具有良好的开放性和参与性以及丰富多彩的视频、音频效果,使得在Web站点上做广告的业务近年来得到了迅速发展.本文就因特网上的广告,利用网上能够实时获取瞬间在线加工信息的特点,给出了一个面向agent的广告实时在线决策的方法AAD(Agents-oriented Advertisement Decisions).AAD基于面向agent程序设计的思想,根据网络用户浏览广告概率特性以及网络用户有关的潜在个人专门信息,以及相应的规则应用专家系统技术分别构造概率知识库和模糊知识库,作为系统的Agent,并且利用专家系统的推理技术,完成广告的选择和决策.
Research in Knowledge Management (KM) has evolved substantially in the past 30 years, coming from a centralized view of KM processes to a distributed view, grounded in organizational and cognitive sciences studies that point out the social, distributed, and subjective nature of knowledge. However, KM systems still face considerable resistance, mainly because they generally impose a specific process instead of fitting in the current practices of the organization. This thesis defends a human-ce...
Roč. 5, č. 2 (2006), s. 430-433. ISSN 1109-2777 R&D Projects: GA MŠk 1M0567 Institutional research plan: CEZ:AV0Z10300504 Keywords : multi - agent system s * adaptive agent s * computational intelligence Subject RIV: IN - Informatics, Computer Science
Ashamalla, Amir Nabil; Beydoun, Ghassan; Low, Graham
There is more chance of a completed sale if the end customers and relationship managers are suitably matched. This in turn can reduce the number of calls made by a call centre reducing operational costs such as working time and phone bills. This chapter is part of ongoing research aimed at helping a CMC to make better use of its personnel and equipment while maximizing the value of the service it offers to its client companies and end customers. This is accomplished by ensuring the optimal use of resources with appropriate real-time scheduling and load balancing and matching the end customers to appropriate relationship managers. In a globalized market, this may mean taking into account the cultural environment of the customer, as well as the appropriate profile and/or skill of the relationship manager to communicate effectively with the end customer. The chapter evaluates the suitability of a MAS to a call management system and illustrates the requirement analysis phase using i* models.
David; Z; Zhang
The dynamic variations in demand patterns and produ ct mix, driven by unpredictable changes in a global market, are placing manufactur ing systems under significant pressure. In order to remain competitive, manu facturing organisations must satisfy demands timely. This implies that companies must increase product varieties, reduce time-to-market, shorten product-life cycles and at the same time maintain good quality and reduce investment costs. Conventional methodologies for planning and control have ...
There are unstructured abstracts (no more than 256 words) and structured abstracts (no more than 480). The specific requirements for structured abstracts are as follows:An informative, structured abstracts of no more than 4-80 words should accompany each manuscript. Abstracts for original contributions should be structured into the following sections. AIM (no more than 20 words): Only the purpose should be included. Please write the aim as the form of "To investigate/ study/..."; MATERIALS AND METHODS (no more than 140 words); RESULTS (no more than 294 words): You should present P values where appropnate and must provide relevant data to illustrate how they were obtained, e.g. 6.92 ± 3.86 vs 3.61 ± 1.67, P< 0.001; CONCLUSION (no more than 26 words).
Groh, Georg; Donaubauer, Andreas; Koster, Benjamin
We discuss in a compact way how the implicit relations between spatiotemporal relatedness of information items, spatiotemporal relatedness of users, social relatedness of users and semantic relatedness of information items may be exploited for an information retrieval architecture that operates along the lines of human ways of searching. The decentralized and agent oriented architecture mirrors emerging trends such as upcoming mobile and decentralized social networking as a new paradigm in social computing and is targetted to satisfy broader and more subtly interlinked information demands beyond immediate information needs which can be readily satisfied with current IR services. We briefly discuss why using spatio-temporal references as primary information criterion implicitly conserves other relations and is thus suitable for such an architecture. We finally shortly point to results from a large evaluation study using Wikipedia articles.
Full Text Available Information privacy has received much public and research interest in recent years. Globally this has arisen from public anxiety following the September 11 attacks and within Australia a progressive tightening of privacy legislation in particular the privacy amendment (private sector Act of 2000 which became operative in 2001. This paper presents the results of a study into attitudes towards information privacy. Based on an instrument developed and validated by Smith et al (1996a this study sets out to measure individual concerns regarding organisational use of information along four dimensions: collection, errors, unauthorised secondary use, and improper access. The survey was completed by 67 undergraduate and postgraduate students enrolled in an e-commerce security subject at the University of Queensland. Comparisons are drawn between the results of this study and an identical one carried out at the University of North Alabama. Whilst it is too early to draw conclusions about the impact of these attitudes on the success of e-commerce in general, the results should be of interest to those within universities seeking to expand the use of networking technologies for handling sensitive information such as enrolment and fee processing (Vanscoy & Oakleaf 2003
Karabach A. E.
Full Text Available Semantic technologies provide existence of a certain abstraction layer over available information to technologies which allows realizing communication of data, semantics and processes executed in distributed environment. Development of these technologies will allow creating the unified representation of SWS in a wide range of applications, to find precisely necessary information, to simplify intra firm integration and integration of network applications in distributed environment. The article defines the semantic specification SWS, the tools for creating ontological Web services (SWS and Web services (WS at the conceptual level, defined requirements and assets of services composition. The architecture of SWS of applications, assets for deployment and execution of SWS by coordination of a flow of operations, network agents is described. It also considers the role of agents in creation and implementation service - the oriented applications, and also distinction between services and agents. Furthermore, the system architecture of integration of SWS with use of a multiagentny flow of operations is shown in article. It inspects the interaction between service and process agents with web services and distributed resources. In the article we have highlighted the advantages of the standard workflow management, portability and interoperability, strict formalization of the process description workflow and versatility. Based on the process of service composition using agent-based approach we have presented the future model of adaptive service composition based on the interaction of agents considered and architecture of multi-agent coordination. Step through the process of presenting service using agent-oriented approach was emphasized. On the basis of the process of service composition using agent-based approach we have presented the structure of the future model of adaptive service composition. Process of representation of service with use the agent-oriented
Manuel KOLP; Adrien COYETTE; Stéphane FAULKNER
Agent architectures are gaining popularity for building open, distributed, and evolving software required by e-commerce applications. Unfortunately, despite considerable work in software architecture during the last decade, few research efforts have aimed at truly defining patterns and languages for agent architectural design. This paper proposes a modern approach based on organizational structures and architectural description languages to define and specify agent architectures notably in the case of e-commerce system design.
Pena, Joaquin; Rouff, Christopher; Hinchey, Mike; Ruiz-Cortes, Antonio
peer-reviewed The need to collect new data and perform new science is causing the complexity of NASA missions to continually increase. This complexity needs to be controlled via new technological advancements and balanced with a reduction in mission and operation costs. Planned and hypothesized missions involve self-management,biological-inspiration based on swarms, and autonomous operation as a means of achieving these goals.We consider a tailored software engineering approach to developi...
Hägg, Staffan; Ygge, Fredrik; Gustavsson, Rune; Ottosson, Hans
As computing systems are being applied to ever more demanding and complex domains, the infeasibility of constructing a single, monolithic problem solver becomes more apparent. Furthermore, important applications such as different types of management control systems for power generation and distribution are inherently distributed. A promising novel research direction to overcome complexity barriers in the design and maintenance of complex distributed applications is based on the view of such s...
Hägg, Staffan; Ygge, Fredrik
Distributed computing, where the underlying network is complex, heterogeneous and un-reliable, is hard to realize with traditional approaches. Energy Distribution Automation (DA), where the power line is used for communication, and the processing is highly distributed, is our application domain for assessments of new technologies for this kind of system. In this paper we propose a Multi-Agent approach with a large expected number of heavily distributed, medium grain agents. The concept of Age...
Full Text Available In this research paper we presented a model of multi-agent system based learning environment for physically impaired students. The learning system is modeled on the basis of both centralized as well as distributed multi-agent planning. The entire learning system keeps track of the type of impairment the student has and mode of interaction of the environment is set depending on the type of impairment(s. The system consists of agents which are developed using JADE agent technology that helps the students with disabilities to continue studies from their own places.
Full Text Available Virtual enterprise is a temporary organization consists of some independent enterprises, aiming to share technology, cost and other resource. It is predicted to be the most important business organizational patterns in the 21st century. To up speed the development of virtual enterprise, this paper presented a policy-based multi-agent management system to simulate the manipulation of virtual enterprise. Firstly, a hierarchical policy specification is proposed to control the behavior of agent. Secondly, the detection algorithms and resolution strategies are described for the conflicts that may be brought about by hierarchical policy. Thirdly, a policy admin tool to simplify the operations of policies is presented. Each enterprise registered in this tool is assigned an agent; policies made by enterprises are executed by agents correspondingly. Subdivision of application level and representation scope of policy leads to that policy-based mechanism not only provides good system control on autonomy agents, but also ensures the flexibility of agents; and gives the solution for policy conflicts at the same time. Finally, the main characteristics of this system are discussed by an example.
Bjerrum, Peter; Olsen, Kasper Nefer
Inform@ed space Sensorial Perception And Computer Enchancement - bidrag til Nordisk Arkitekturforskningsforenings IT-konference, AAA april 2001.......Inform@ed space Sensorial Perception And Computer Enchancement - bidrag til Nordisk Arkitekturforskningsforenings IT-konference, AAA april 2001....
Larsson, Magnus; Segerstéen, Solveig; Svensson, Cathrin
The article presents an empirical study of informal leadership in an international high-tech company. The empirical work consisted of qualitative observation and shadowing of managers in the company, and a total of 14 interviews. The transcribed fieldnotes and audio recordings of observations...... leaders on the basis of their possession of reliable knowledge in technical as well as organizational domains. The informal leaders engaged in interpretation and brokering of information and knowledge, as well as in mediating strategic values and priorities on both formal and informal arenas. Informal...... and interviews were analyzed thematically, resulting in three central themes: informality, information based authority, and information brokering. The general informal character of interactions at work included a network based information dissemination. In these networks, persons were percieved as informal...
Brinberg, Herbert R.
Addresses the question of why previous articles and studies on the value of information have failed to provide meaningful techniques for measuring that value. The discussion covers four principle causes for confusion surrounding the valuation of information and draws conclusions about the value added model of information. (seven references) (CLB)
Information Crisis discusses the scope and types of information available online and teaches readers how to critically assess it and analyze potentially dangerous information, especially when teachers, editors, or other information gatekeepers are not available to assess the information for them. Chapters and topics include:. The Internet as an information tool. Critical analysis. Legal issues, traps, and tricks. Protecting personal safety and identity. Types of online information.
The exponential growth of information resources creates new challenges for end-users. The correct information may be polluted by misinformation, disinformation, propaganda or incorrect information via the Internet and other media. This paper defines 'information pollution' as "the contamination of information by misinformation, disinformation, propaganda and incorrect information." The purpose of this paper is to present the methods of information pollution. It is concluded that it is sometim...
Vieira, R.; Moreira, A.; M. Wooldridge; Bordini, R. H.
Research on agent communication languages has typically taken the speech acts paradigm as its starting point. Despite their manifest attractions, speech-act models of communication have several serious disadvantages as a foundation for communication in artificial agent systems. In particular, it has proved to be extremely difficult to give a satisfactory semantics to speech-act based agent communication languages. In part, the problem is that speech-act semantics typically make reference to t...
Bordini, R H; Vieira, R; Wooldridge, M; 10.1613/jair.2221
Research on agent communication languages has typically taken the speech acts paradigm as its starting point. Despite their manifest attractions, speech-act models of communication have several serious disadvantages as a foundation for communication in artificial agent systems. In particular, it has proved to be extremely difficult to give a satisfactory semantics to speech-act based agent communication languages. In part, the problem is that speech-act semantics typically make reference to the "mental states" of agents (their beliefs, desires, and intentions), and there is in general no way to attribute such attitudes to arbitrary computational agents. In addition, agent programming languages have only had their semantics formalised for abstract, stand-alone versions, neglecting aspects such as communication primitives. With respect to communication, implemented agent programming languages have tended to be rather ad hoc. This paper addresses both of these problems, by giving semantics to speech-act based me...
Wu Xing; Yu Jun; Lou Peihuang; Tang Dunbing
This paper presents a control system design and development approach for a vision‐based automated guided vehicle (AGV) based on the multi‐agent system (MAS) methodology and embedded system resources. A three‐phase agent‐oriented design methodology Prometheus is used to analyse system functions, construct operation scenarios, define agent types and design the MAS coordination mechanism. The control system is then developed in an embedded implementation containing a digital signal processor (DS...
I call any subjects, connected with an information the informational objects. It is clear that information received from such informational object can be expressed by a text which is made of sentences. I call a set of sentences expressing information about some informational object recorder of this object. Some recorders systems form structures similar to clocks. The following results are obtained from the logical properties of a set of recorders: First, all such clocks have th...
Singhal, Monica; Olken, Benjamin A.
Informal payments are a frequently overlooked source of local public finance in developing countries. We use microdata from ten countries to establish stylized facts on the magnitude, form, and distributional implications of this "informal taxation." Informal taxation is widespread, particularly in rural areas, with substantial in-kind labor payments. The wealthy pay more, but pay less in percentage terms, and informal taxes are more regressive than formal taxes. Failing to include informal t...
Full Text Available Information management (IM is the collection and management of information from one or more sources and the distribution of that information to one or more audiences. Management means the organization of and control over the planning, structure and organization, controlling, processing, evaluating and reporting of information activities in order to meet client objectives and to enable corporate functions in the delivery of information. 'Information' here refers to all types of information of value, whether having their origin inside or outside the organization, including data resources, such as production data; records and files related, for example, to the personnel function; market research data; and competitive intelligence from a wide range of sources. Information management deals with the value, quality, ownership, use and security of information in the context of organizational performance.
Information is essential to all human activity, and information in electronic form both amplifies and augments human information interactions. This lecture surveys some of the different classical meanings of information, focuses on the ways that electronic technologies are affecting how we think about these senses of information, and introduces an emerging sense of information that has implications for how we work, play, and interact with others. The evolutions of computers and electronic networks and people's uses and adaptations of these tools manifesting a dynamic space called cyberspace. O
Wolfgang G. Stock
Full Text Available Contemporary and future cities are often labeled as "smart cities," "ubiquitous cities," "knowledge cities" and "creative cities." Informational urbanism includes all aspects of information and knowledge with regard to urban regions. "Informational city" is an umbrella term uniting the divergent trends of information-related city research. Informational urbanism is an interdisciplinary endeavor incorporating on the one side computer science and information science and on the other side urbanism, architecture, (city economics, and (city sociology. In our research project on informational cities, we visited more than 40 metropolises and smaller towns all over the world. In this paper, we sketch the theoretical background on a journey from Max Weber to the Internet of Things, introduce our research methods, and describe main results on characteristics of informational cities as prototypical cities of the emerging knowledge society.
Lin, Kiyam; Lin, SongLing
Despite the wide usage of the concept of information, we have yet to develop a unified scientific definition. Inspired by Shannon's and Boltzmann's work, by investigating information's role in various working processes, we recognised that information's primary function is to direct working processes, and found that the probability of successfully achieving any working goal is related with the amount of corresponding information. Furthermore, we deduced that the relationship between informatio...
As communication technologies change, so do libraries. Library instruction programs are now focused on teaching information literacy, a term that may just as well be referred to as information "literacies." The new media age involves information in a wide variety of mediums. Educators everywhere are realizing media's power to communicate and…
This dissertation introduces the concept of Information Integrity, which is the detection and possible correction of information manipulation by any intermediary node in a communication system. As networks continue to grow in complexity, information theoretic security has failed to keep pace. As a result many parties whom want to communicate,…
Yi, Zhao; Dewan, Maneesh; Zhan, Yiqiang
We describe Information Forests, an approach to classification that generalizes Random Forests by replacing the splitting criterion of non-leaf nodes from a discriminative one -- based on the entropy of the label distribution -- to a generative one -- based on maximizing the information divergence between the class-conditional distributions in the resulting partitions. The basic idea consists of deferring classification until a measure of "classification confidence" is sufficiently high, and instead breaking down the data so as to maximize this measure. In an alternative interpretation, Information Forests attempt to partition the data into subsets that are "as informative as possible" for the purpose of the task, which is to classify the data. Classification confidence, or informative content of the subsets, is quantified by the Information Divergence. Our approach relates to active learning, semi-supervised learning, mixed generative/discriminative learning.
Masatlioglu, Yusufcan; Rigolini, Jamele
Despite large deregulation efforts, informal economic activity still represents a large share of GDP in many developing countries. In this paper we look at incentives to reduce informal activity when capitalists in the formal sector regulate entry. We consider a dual economy with a formal sector employing educated workers and an informal sector with unskilled workers. We show that high costs of education make labor migration and profits in the formal sector an increasing function of its size....
Information circulars are published from time to time under the symbol INFCIRC/... for the purpose of bringing matters of general interest to the attention of all Members of the Agency. The present revision contains INFCIRCs published up to mid-August 1994. A complete numerical list of information circulars is reproduced with their titles in the Annex
The document summarizes the Information Circulars published by the IAEA for the purpose of bringing matters of general interest to the attention of all Members of the Agency. This revision contains INFCIRCs published up to mid-August 1992. A complete numerical lift of Information Circulars with their titles is reproduced in an Annex
The document summarizes the Information Circulars published by the IAEA for the purpose of bringing matters of general interest to the attention of all Member States. This revision contains INFCIRCs published up to the end of May 1999, grouped by field of activity. A complete list of information circulars in numerical order is given in an annex
The document summarizes the Information Circulars published by the IAEA for the purpose of bringing matters of general interest to the attention of all Member States. This revision contains INFCIRCs published up to February 1997, grouped by field of activity. A complete list of information circulars in numerical order is given in an annex
Information circulars are published from time to time under the symbol INFCIRC/... for the purpose of bringing matters of general interest to the attention of all Members of the Agency. The present revision contains INFCIRCs published up to the end of April 2002. A complete numerical list of information circulars is reproduced with their titles in the Annex
An information barrier (IB) consists of procedures and technology that prevent the release of sensitive information during a joint inspection of a sensitive nuclear item, and provides confidence that the measurement system into which it has been integrated functions exactly as designed and constructed. Work in the U.S. on radiation detection system information barriers dates back at least to 1990, even though the term is more recent. In January 1999, an Information Barrier Working Group (IBWG) was formed in the United States to help coordinate technical efforts related to information barrier research and development (R and D). This paper presents an overview of the efforts of this group, by its present and former Chairs, as well as recommendations for further information barrier R and D. Progress on the demonstration of monitoring systems containing IBs is also provided. From the U.S. IBWG perspective, the top-level functional requirements for the information barrier portion of an integrated radiation signature-information barrier inspection system are twofold: The host must be assured that its classified information is protected from disclosure to the inspecting party; and The inspecting party must be confident that the integrated inspection system measures, processes, and presents the radiation-signature-based measurement conclusion in an accurate and reproducible manner. It is the position in the United States that in the absence of any agreement to share classified nuclear weapons design information while implementing an inspection regime, the need to protect host country classified warhead design information is paramount and overrules the need to provide confidence to the inspecting party regarding the accuracy and reproducibility of the measurements. The U.S. IBWG has reached a consensus on several critical design elements that define a general standard for radiation signature information barrier design. Technical specialists from cooperating parties must be
Barnett, Stephen M
Quantum information- the subject- is a new and exciting area of science, which brings together physics, information theory, computer science and mathematics. "Quantum Information"- the book- is based on two successful lecture courses given to advanced undergraduate and beginning postgraduate students in physics. The intention is to introduce readers at this level to the fundamental, but offer rather simple, ideas behind ground-breaking developments including quantum cryptography,teleportation and quantum computing. The text is necessarily rather mathematical in style, but the mathema
During the reception of a piece of information, we are never passive. Depending on its origin and content, from our personal beliefs and convictions, we bestow upon this piece of information, spontaneously or after reflection, a certain amount of confidence. Too much confidence shows a degree of naivety, whereas an absolute lack of it condemns us as being paranoid. These two attitudes are symmetrically detrimental, not only to the proper perception of this information but also to its use. Beyond these two extremes, each person generally adopts an intermediate position when faced with the recep
... Here: Home → Copyright Information URL of this page: https://www.nlm.nih.gov/medlineplus/copyright.html Copyright ... the Magazine and NIH MedlinePlus Salud The FAQs ( https://www.nlm.nih.gov/medlineplus/faq/faq.html ) ...
ISSN print edition: 1672-1799 ISSN electronic edition: 1862-2844 Volume 51 (12 issues) will appear in 2008 Subscription rates For information on subscription rates please contact: Customer Service China: email@example.com North
ISSN print edition: 1006-9321 ISSN electronic edition: 1862-281X Volume 51 (12 issues) will appear in 2008 Subscription rates For information on subscription rates please contact: Customer Service China
ISSN print edition:1672-1799 ISSN electronic edition:1862-2844 Volume 51 (12 issues) will appear in 2008 Subscription rates For information on subscription rates please contact:Customer Service China:sales@scichina.
As a supplement to the information published on 27.05.2002, we inform you that the works foreseen in the building 504 will begin July 1st. The alterations become necessary force us to suspend the contomat service for a duration of one month. From July 1st the services of counter will be offered in the building 500. We ask you to excuse us for this interruption and thank you for your understanding. Your UBS
The document summarizes the information circulars published by the IAEA for the purpose of bringing matters of general interest to the attention of all Members of the Agency. In the main body of the document only those documents which are regarded as likely to be of current interest are listed. A complete numerical list of information circulars with their titles is reproduced in the Annex
Sharma, Manohar; Zeller, Manfred
In most developing countries, it is the private, informal markets that the rural poor have traditionally turned to service their financial needs. Why have these institutions succeeded in providing services to the poor when formal institutions have not? Do these informal institutions provide any lessons that bigger formal institutions could use? What are their basic limitations? Answers to such questions indicate important direc-tions for public policy.
This paper analyzes the problem of matching heterogeneous agents in a Bayesian learning model. One agent gives a noisy signal to another agent, who is responsible for learning. If production has a strong informational component, a phase of cross-matching occurs, so that agents of low knowledge catch up with those of higher one. It is shown that: (i) a greater informational component in production makes cross-matching more likely; (ii) as the new technology is mastered, pr...
The Information Engineering thrust area develops information technology to support the programmatic needs of Lawrence Livermore National Laboratory`s Engineering Directorate. Progress in five programmatic areas are described in separate reports contained herein. These are entitled Three-dimensional Object Creation, Manipulation, and Transport, Zephyr:A Secure Internet-Based Process to Streamline Engineering Procurements, Subcarrier Multiplexing: Optical Network Demonstrations, Parallel Optical Interconnect Technology Demonstration, and Intelligent Automation Architecture.
Full text: An information barrier (IB) consists of procedures and technology that prevent the release of sensitive information during a joint inspection of a sensitive nuclear item, and provides confidence that the measurement system into which it has been integrated functions exactly as designed and constructed. Work in the U.S. on radiation detection system information barriers dates back at least to 1990, even though the terminology is more recent. In January 1999 the Joint DoD-DOE Information Barrier Working Group was formed in the United States to help coordinate technical efforts related to information barrier R and D. This paper presents an overview of the efforts of this group, by its Chairs, as well as recommendations for further information barrier R and D. Progress on the demonstration of monitoring systems containing IBs is also provided. From the U.S. perspective, the basic, top-level functional requirements for the information barrier portion of an integrated radiation signature-information barrier inspection system are twofold: The host must be assured that his classified information is protected from disclosure to the inspecting party; and The inspecting party must be confident that the integrated inspection system measures, processes, and presents the radiation-signature-based measurement conclusion in an accurate and reproducible manner. It is the position of the United States that in the absence of any agreement to share classified nuclear weapons design information in the conduct of an inspection regime, the requirement to protect host country classified warhead design information is paramount and admits no tradeoff versus the confidence provided to the inspecting party in the accuracy and reproducibility of the measurements. The U.S. has reached an internal consensus on several critical design elements that define a general standard for radiation signature information barrier design. These criteria have stood the test of time under intense
Christiansen, Ellen Tove
The paper describes a pedagogical didactical paradigm for teaching student-designers how to deal with context issues. Form/context-relationships are conceptualized as information ecologies and described as behavioral settings using a key concept developed by social psychologist R.A. Baker in the...... 1960ties, and chosen here because it integrates cultural and psychological trajectories in a theory of living settings. The pedagogical-didactical paradigm comprises three distinct information ecologies, named after their intended outcome: the problem-setting, the exploration-setting, and the fit......-setting. It is specified how context issues can be treated within each of these information ecologies. The paper concludes by discussing the outcome of applying this paradigm with respect to the student-designers’ competence as reflective practitioners....
The document summarizes the Information Circulars published by the IAEA under the symbol INFCIRC/ for the purpose of bringing matters of general interest to the attention of all Members of the Agency. A complete list of INFCIRCs in numerical order with their titles is given in the Annex
Information circulars are published from time to time under the symbol INFCIRC/. for the purpose of bringing matters of general interest to the attention of all Members of the Agency. A list of the circulars that were current on 31 December 1964 is given, followed by an index to their subject matter.
McKay, Martin D.; Stout, J. David
Discusses access to Internet resources in school libraries, including the importance of evaluating content and appropriate use. The following online services that provide current factual information from legitimate resources are described: SIRS (Social Issues Resource Series), InfoTrac, EBSCO Host, SearchBank, and the Electric Library. (MES)
REBECA MEJÍA ARAUZ
[ES]La conferencia “Aprendizaje Informal” fue impartida el 20 de junio de 2016 en el MediaLab Prado de Madrid en el contexto de las VI Jornadas eMadrid “Unbundling Education”. El objetivo de esta charla es contextualizar el concepto de aprendizaje informal y su relación con las tecnologías educativas.
Training Information: TEFL in China Certificate Training Program, with job placement This intensive training program will prepare you as a native speaker of English to be qualified to teach oral English in China, even without previous teaching experience. Dates, venues and fees: Tuition:4,000 yuan
ISSN print edition:1006-9283 ISSN electronic edition:1862-2763 Volume 50(12 issues)will appear in 2007 Subscription rates For information on subscription rates please contact: Customer Service Chine:sales@ scichina.org North and South America: journals-ny @ springer.com Outside North and South America: firstname.lastname@example.org Orders and inquiries:
Bala, Piotr; Osińska, Veslava; Gawarkiewicz, Michał
This article presents the analytical and retrieval potential of visualization maps. Obtained maps were tested as information retrieval (IR) interface. The collection of documents derived from the ACM Digital Library was mapped on the sphere surface. Proposed approach uses nonlinear similarity of documents by comparing ascribed thematic categories and thereby development of semantic connections between them. For domain analysis the newest IT trend - Cloud ...
Capital Hotel Mid-Autumn Festival is a time for reunion with family and loved ones. Treat them to a special gift-Capital Hotel moon cakes. This year we present six types of moon cakes, including both traditional favorites and new specialties. Tasty delicacies in fine gift packing, Capital Hotel moon cakes are also an ideal choice for your business associates. For more information or orders, please contact us at 86-10-58159988 ext. 3401/3240.
Grand Hyatt Beijing Share irresistible moon cakes under the full moon of mid-autumn with friends and family. This year, savor traditional moon cakes prepared with the finest quality. Golden Moon Cake Hamper at 238 yuan consists of eight pieces made of red or white lotus paste, green tea and red been paste. Opening Hours: 7:00 a.m.-9:00 p.m. For more information, please call 010-85181234 ext. 6362
This bulletin contains information about activities of the Nuclear Regulatory Authority of the Slovak Republic. It consist of nine leaflets: (1) Role and responsibility of the Nuclear Regulatory Authority; (2) Principles of Good Regulation for the UJD; (3) Legislation; (4) Inspection and Assessment Activity of UJD in Nuclear Safety; (5) International relations and co-operation; (6) Regulation of radioactive waste management; (7) Regulation at nuclear fuel cycle; (8) Emergency planning and preparedness; (9) Public communications at the UJD
1. Questionnaire By Beijing Review and Chinajob.com Thanks for your close attention to our column. We very much appreciate your feedback, on which we depend to offer you the information you need and make this page valuable reading! 1. What are your usual channels for seeking jobs in China? 2. Do you prefer a full-time job or part-time job? 3. What is your preferred job: language teacher, professional in a company or manager?
Research on Lightning Monitoring System Based on the Geo-spatial Combined with the contemporary application of lightning monitoring, this paper aimed to analyze the structure, working principle, and functions of the Lightning Monitoring System based on the geo-spatial framework, which merged modern surveying and mapping of geographic information technologies, and also present the more ac- curate and more in-depth research about lightning disasters.
Schopper,H; Brianti; Picasso; Laporte,H
Le DG H.Schopper, secondé par certains de ses directeurs, informe sur les travaux et projets au Cern. Prennent la parole: M.Heine, directeur de l'administration M.Brianti, directeur technique M.Picasso, directeur du projet LEP M.Henri Laporte, l'adjoint de M.Picasso et chef des travaux de genie civil de Genève
[english] The focus of the current issue 3/2014 of GMS Medizin – Bibliothek – Information is the annual conference 2014 of the German Medical Libraries Association in Mannheim. The motto of the conference was “Medical libraries: Information”. The authors in this issue are Michaele Adam (Bibliometrics 2.0 – Altmetrics in Medicine), Bruno Bauer (Open access cooperation in Austria: Open Access Network Austria and Austria – recent developments since 2012), Fabian Gail & Ulrich Korwitz (Market an...
Levin, Leonid A.
Goedel Incompleteness Theorem leaves open a way around it, vaguely perceived for a long time but not clearly identified. (Thus, Goedel believed informal arguments can answer any math question.) Closing this loophole does not seem obvious and involves Kolmogorov complexity. (This is unrelated to, well studied before, complexity quantifications of the usual Goedel effects.) I consider extensions U of the universal partial recursive predicate (or, say, Peano Arithmetic). I prove that any U eithe...
Full Text Available [english] The focus of the current issue 3/2014 of GMS Medizin – Bibliothek – Information is the annual conference 2014 of the German Medical Libraries Association in Mannheim. The motto of the conference was “Medical libraries: Information”. The authors in this issue are Michaele Adam (Bibliometrics 2.0 – Altmetrics in Medicine, Bruno Bauer (Open access cooperation in Austria: Open Access Network Austria and Austria – recent developments since 2012, Fabian Gail & Ulrich Korwitz (Market and strategy – results of the ZB MED market study, Sabine Gehrlein (Library goes Anatomy: Anatomical teaching media at Heidelberg University Library, Kaja Scheliga (Opening science: New publication forms in science, Ulrike Ostrzinski (The four types of social media user in the academic and research community. Results of a nationwide study, Sandra Pfob & Alena Ittner (First aid for library use on PC: webinars increase library visits, reach everyone, save costs, Simone Waldboth (Integration of e-learning in the lecture “Information Literacy” at the Provincial College for Health-Care Professions Claudiana, Maike Piegler (The pick up box of the library of the Hamburg medical association – a way to bring scientific information to medical specialists and Christoph Wehrmüller & Heidrun Janka (Medical : Information – Annual meeting 2014 of the German MLA, September 22 to 24 in Mannheim.Furthermore this focus issue features articles from Bruno Bauer (: transformation strategies for subscription-based journaleport on the 8 Open Access Days at Cologne, September 8–9 2014, Eike Hentschel (German MLA News; Pioneer projects in medical libraries 2014: Introduction of the winners; Pioneer projects in medical libraries 2015 – Announcement and Franz J. Kühnen (Klaus Gerber 1934–2014.
Information circulars are published from time to time under the symbol INFCIRC/. . . . for the purpose of bringing matters of general interest to the attention of all Members of the Agency. A list of the circulars which were of current interest on 15 January 1969 is given below, followed by an index to their subject matter. Other circulars can be traced by reference to earlier issues of the present document.
Rogers, William H.
Information demand is defined in terms of both information content (what information) and form (when, how, and where it is needed). Providing the information richness required for flight crews to be informed without overwhelming their information processing capabilities will require a great deal of automated intelligence. It is seen that the essence of this intelligence is comprehending and capturing the demand for information.
See more at www.chinajob.com Teaching Vacancies: Capital University of Economics & Business is looking for for eign teachers with teaching experience. Offer package: 4,000 yuan per month, free accommodation and airfare. For more information, please contact cuebwsb@ 263.net.cn and visit www.cueb.edu.cn Huijia Kindergarten Beijing is looking for kindergarten ESL teachers. Salary is 4,000-6,000 yuan per month. Contact: shin-ingcj1981 @ hotmail.com Website: www.hjkids.com
Full Text Available The area of image processing has made rapid strides because of enormous applications it has in different fields. This growth can also be attributed to the increasing use of fuzzy logic in all tasks of image processing as the fuzzy logic facilitates the representation of inherent uncertainty in the image information which can be local or global. For problems like enhancement global information is of interest whereas the local information is needed for the problems of edge detection, segmentation, and recognition. However we need both for the noise removal. The images are of varied types: Medical images (CT scans, MR, X-rays, ECG, etc., satellite images, natural scenes, videos, games, multimedia, biometrics, industrial, astronomical so on and so forth. The approaches to tackle different images have to be different. For example skin texture can’t represented by a colour model.Defence Science Journal, 2011, 61(5, pp.405-407, DOI:http://dx.doi.org/10.14429/dsj.61.1192
Seiders, Barbara; McQuerry, Dennis; Ferryman, Thomas A.; Whitney, Paul D.; Rybka, Anthony
Biological weapons are within reach of individuals, small groups, terrorist organizations, as well as nations. With pervasive integration of civilian and military populations worldwide, the ill winds of biological warfare stand to affect military troops and civilians alike. A variety of technologies are emerging - such as pathogen detection devices, streaming internet characterization tools, information exploitation techniques, automated feature extraction, and ubiquitous wireless communication - that can help. These technologies, if taken together within an integrated analytical framework, could make possible the monitoring of diverse parameters that may indicate a change in the state of health of a given population - either the emergence of a naturally occurring disease or the outbreak of a disease as a result of hostile intent. This presentation will discuss the application of new information surveillance tools and technologies as they apply to health and disease monitoring, particularly within the context of potential terrorist or hostile nation use of biological warfare. Although discussed within the specific context of health surveillance, the tools and processes described here are generally applicable within other domains of subject matter expertise.
There is more to information than a string of ones and zeroes the ability of ''quantum bits'' to be in two states at the same time could revolutionize information technology. In the mid-1930s two influential but seemingly unrelated papers were published. In 1935 Einstein, Podolsky and Rosen proposed the famous EPR paradox that has come to symbolize the mysteries of quantum mechanics. Two years later, Alan Turing introduced the universal Turing machine in an enigmatically titled paper, On computable numbers, and laid the foundations of the computer industry one of the biggest industries in the world today. Although quantum physics is essential to understand the operation of transistors and other solid-state devices in computers, computation itself has remained a resolutely classical process. Indeed it seems only natural that computation and quantum theory should be kept as far apart as possible surely the uncertainty associated with quantum theory is anathema to the reliability expected from computers? Wrong. In 1985 David Deutsch introduced the universal quantum computer and showed that quantum theory can actually allow computers to do more rather than less. The ability of particles to be in a superposition of more than one quantum state naturally introduces a form of parallelism that can, in principle, perform some traditional computing tasks faster than is possible with classical computers. Moreover, quantum computers are capable of other tasks that are not conceivable with their classical counterparts. Similar breakthroughs in cryptography and communication followed. (author)
Steam Locomotive Tour Tiefa Coal Industry Group Corp. Ltd. is headquartered in Tieling City, Liaoning Province. At present, the group has 21 steam locomotives and all of them can still be operated. Since 2000, the group has held four steam iocomotive-themed tourist festivals, and has built a special website for steam locomotive tours, an exhibition hall and several special tourist railways, becoming China and the world’s only tourist attraction with operational steam locomotives. In recent years, the tourist attraction has received tourist groups from dozens of countries, including Britain, the United States, France, Japan and Australia, and many domestic tourists, being honored with a "floating steam locomotive museum." Visit http://www.steam-locomotive.cn/ for more information.
Stoecker, Nora Kathleen
A Systems Analysis Group has existed at Sandia National Laboratories since at least the mid-1950s. Much of the groups work output (reports, briefing documents, and other materials) has been retained, along with large numbers of related documents. Over time the collection has grown to hundreds of thousands of unstructured documents in many formats contained in one or more of several different shared drives or SharePoint sites, with perhaps five percent of the collection still existing in print format. This presents a challenge. How can the group effectively find, manage, and build on information contained somewhere within such a large set of unstructured documents? In response, a project was initiated to identify tools that would be able to meet this challenge. This report documents the results found and recommendations made as of August 2013.
As nuclear materials and technologies spread, the global community needs to be ever more vigilant to prevent their acquisition by those that have no legitimate reason to access or use them. International efforts to strengthen nuclear security measures gained momentum when, in 2009, President Obama announced his intention to convene for the first time an international Nuclear Security Summit. Held in Washington in 2010, the Summit was attended by 47 Heads of State who collectively committed to securing all vulnerable nuclear material within four years. Two years later, 53 Heads of State came together at a second Summit in Seoul and agreed a set of concrete actions to deliver on this ambition. The Summit process has functioned not only as a catalyst to move nuclear security up States’ political consciousness, but also as a platform for broadening their perspective on this agenda. Specifically, the last three years have seen the international community increasingly recognise the fundamental need for nuclear security regimes to protect not only nuclear material and physical assets from non-state actors, but also the information needed to obtain and use these goods for nefarious purposes
... ODPHP National Health Information Center National Health Information Center The National Health Information Center (NHIC) is sponsored ... interest View the NHO calendar . Federal Health Information Centers and Clearinghouses Federal Health Information Centers and Clearinghouses ...
The general theory of information (GTI) is a synthetic approach, which reveals the essence of information, organizing and encompassing all main directions in information theory. On the methodological level, it is formulated as system of principles explaining what information is and how to measure information. The goal of this paper is the further development of a mathematical stratum of the general theory of information based on category theory. Abstract categories allow us to construct flexi...
In this paper we present an approach for the enforcement of privacy in distributed active object systems, illustrate its implementation in the language ASPfun, and formally prove privacy based on information flow security.
José M. Canino-Rodríguez
Full Text Available The limited efficiency of current air traffic systems will require a next-generation of Smart Air Traffic System (SATS that relies on current technological advances. This challenge means a transition toward a new navigation and air-traffic procedures paradigm, where pilots and air traffic controllers perform and coordinate their activities according to new roles and technological supports. The design of new Human-Computer Interactions (HCI for performing these activities is a key element of SATS. However efforts for developing such tools need to be inspired on a parallel characterization of hypothetical air traffic scenarios compatible with current ones. This paper is focused on airborne HCI into SATS where cockpit inputs came from aircraft navigation systems, surrounding traffic situation, controllers’ indications, etc. So the HCI is intended to enhance situation awareness and decision-making through pilot cockpit. This work approach considers SATS as a system distributed on a large-scale with uncertainty in a dynamic environment. Therefore, a multi-agent systems based approach is well suited for modeling such an environment. We demonstrate that current methodologies for designing multi-agent systems are a useful tool to characterize HCI. We specifically illustrate how the selected methodological approach provides enough guidelines to obtain a cockpit HCI design that complies with future SATS specifications.
Ergonomics are an essential safety factor in controlling automated processes. It has to be taken into account in three stages: information presentation, information perception and information treatment
Information has two aspects. One aspect is the objective one; another aspect is the subjective one. Shannon has discussed the objective aspect of information in information theory. But the subjective aspect of information has not been fully discussed. Someone use "Bayesian approaches" to evaluate the value of information. But in some cases it does not meet the information user's need. This paper is focus on the subjective aspect of objectively measurable information and gives formal definitions for information, information utility, and marginal information utility, normalized calculation of information utility. The information discussed in the paper has interdisciplinary nature. This work can be the foundation of many application areas.
Ganuza, Juan José; Jansen, Jos
By using general information structures and precision criteria based on the dispersion of conditional expectations, we study how oligopolists’ information acquisition decisions may change the effects of information sharing on the consumer surplus. Sharing information about individual cost paramet...
In this paper, the original Japanese idea of "advanced information society" was reviewed at the first step. Thus, advancement of information/communication technology, advancement of information/communication needs and tendency of industrialization of information" were examined. Next, by comparing studies on advanced information society in various countries, the Japanese characteristics of consensus building was reviewed. Finally, in pursuit of prospect and tasks for the society, advancement of innovation and convergence information/communication technology, information/communication needs, institutional environment for utilization of information/communication and countermeasures against information pollution. Matching of information/communication technology and needs, besides with countermeasures against information pollution were discussed.
In pattern recognition, learning, and data mining one obtains information from information-carrying objects. This involves an objective definition of the information in a single object, the information to go from one object to another object in a pair of objects, the information to go from one object to any other object in a multiple of objects, and the shared information between objects. This is called "information distance." We survey a selection of new developments in information distance.
Marinescu, Dan C
A new discipline, Quantum Information Science, has emerged in the last two decades of the twentieth century at the intersection of Physics, Mathematics, and Computer Science. Quantum Information Processing is an application of Quantum Information Science which covers the transformation, storage, and transmission of quantum information; it represents a revolutionary approach to information processing. This book covers topics in quantum computing, quantum information theory, and quantum error correction, three important areas of quantum information processing. Quantum information theory an
Full Text Available The work of managers in small and medium-sized enterprises is very information-intensive and the environment in which it is done is very information rich. But are managers able to exploit the wealth of information which surrounds them? And how can information be managed in organisations so that its potential for improving business performance and enhancing the competitiveness of these enterprises can be realised? Answers to these questions lie in clarifying the context of the practice of information management by exploring aspects of organisations and managerial work and in exploring the nature of information at the level of the organisation and the individual manager. From these answers it is possible to suggest some guidelines for managing the integration of business strategy and information, the adoption of a broadly-based definition of information and the development of information capabilities.
Dahl, Katja; Kesmodel, Ulrik; Hvidman, Lone;
Prenatal care has gradually moved away from paternalism, to a state where patient autonomy and information is vital. It is known from other health care settings that the way information is presented affects understanding.The objective is to summarize current knowledge on aspects of informing...... pregnant women about prenatal examinations. Women's knowledge, decisional conflict, satisfaction and anxiety will be explored as compared with different ways and different groups of health professionals providing information. To what extent information empowers informed decision making will be explored as......, individual sessions and by way of written materials. None of the interventions leads to a raise in anxiety scores or influence up-take rates. Satisfaction with information provided is found unrelated to level of knowledge, but associated with having expectations for information met. Information does not seem...
different underlying concepts: Information Management1: information management at institutional level. Information Management2: content-oriented information management, rooted in information science and Information Management3: technology-oriented information management, rooted in information systems...
Hansen, Lone Koefoed; Pedersen, Peter Dalsgård; Eriksson, Eva
This paper introduces information offload as a supplement way of responding to and designing for information. By presenting iFlush, a design concept aiming at providing the user with a possibility to offload information and then instantly dispose of it, the paper presents an approach towards...... designing for reflection and also serves as a critique towards information overload. Furthermore, the absence of reflection on the role played by HCI community in the constant augmenting of all spaces is addressed....
田范江; 李丛蓉; 王鼎兴
Information filtering (IF) systems are important for personalized information service. However, most current IF systems suffer from low quality and long training time. In this paper, a refined evolving information filtering method is presented. This method describes user's information need from multi-aspects and improves filtering quality through a process like natural selection. Experimental result shows this method can shorten training time, improve filtering quality, and reduce the relevance between filtering results and training sequence.
In this Information system age many organizations consider information system as their weapon to compete or gain competitive advantage or give the best services for non profit organizations. Game Information System as combining Information System and game is breakthrough to achieve organizations' performance. The Game Information System will run the Information System with game and how game can be implemented to run the Information System. Game is not only for fun and entertainment, but will ...
Disciplinary Foundations and Global ImpactEvolving Discipline of Information Systems Heikki TopiDiscipline of Information Technology Barry M. Lunt and Han ReichgeltInformation Systems as a Practical Discipline Juhani IivariInformation Technology Han Reichgelt, Joseph J. Ekstrom, Art Gowan, and Barry M. LuntSociotechnical Approaches to the Study of Information Systems Steve Sawyer and Mohammad Hossein JarrahiIT and Global Development Erkki SutinenUsing ICT for Development, Societal Transformation, and Beyond Sherif KamelTechnical Foundations of Data and Database ManagementData Models Avi Silber
A Transportation Technology Center (TTC) has been established at Sandia to address the transportation of nuclear waste and spent fuel. The Technology Information Center (TIC) acts as TTC's clearing house for nuclear material transportation information. TIC's activities are divided into three activities: public information, policy information, and technical information. Some of the uses of TIC's activities are briefly outlined
Deruchie, Douglas M.
Discusses the value of information-based services in today's global economy. The combination of information technology with library and information services at an international accounting and auditing firm is described; the Global Information Network is explained; and the importance of the appropriate use of information is discussed. (LRW)
Hirsch, Michael J; Murphey, Robert
Our understanding of information and information dynamics has outgrown classical information theory. This book presents the research explaining the importance of information in the evolution of a distributed or networked system. It presents techniques for measuring the value or significance of information within the context of a system
Full Text Available The paper brings an overview of information visualization field, concentrating on its application to information retrieval systems. It presents the basis of information visualization and the reasons that implicate the use of visualization in information retrieval systems. It also discusses the selection of the right visualization technique and portrays some examples of visualization. Special attention is given to evaluation problems and results of information retrieval visualizations that were made so far. Even though studies have not proved information retrieval to be more successful with the use of visualization, it seems that researchers still believe in the power and the advantages of visualization and continue to look for a technique that would prove that. The authors conclude that with the changes on the web and the progress made in information retrieval systems, the time for visualization that would live up to its expectations might only be coming.
... Other Sites: Genetic and Rare Diseases Information Center Financial Assistance Information The National Institutes of Health (NIH) ... area call 900-638-0742. Top of page Financial Aid for Medical Treatments Information on financial aid ...
The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the Information Protection Playbook, security and information technology (IT) managers will learn how to
Background. The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in 'Bookmarks' and 'Favourites'. Argument. It is suggested that personal information collections are created in anticipation of some future need for that information-personal, anticipated information need, which also underlies the design of formal information systems. ...
Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu
Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...
Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles
The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the public. The Energy Information Sheets was developed to provide general information on various aspects of fuel production, prices, consumption, and capability. Additional information on related subject matter can be found in other Energy Information Administration (EIA) publications as referenced at the end of each sheet.
... AAOS Orthopaedic Disclosure Program Position Statements Information Statements Ethics Resources Resolutions Patient, Public & Media Information OrthoInfo Patient Education Newsroom/Media Resources Find ...
National Aeronautics and Space Administration — Updated November 2, 2011 Contains summary information and analysis condition details for the Aeroelastic Prediction Workshop Information plotted in this package is...
Department of Transportation — The Aeronautical Information System (AIS) is a leased weather automated system that provides a means of collecting and distributing aeronautical weather information...
Since common ground is pivotal to collaboration, this paper proposes to define collaborative information seeking as the combined activity of information seeking and collaborative grounding. While information-seeking activities are necessary for collaborating actors to acquire new information, the...... activities involved in information seeking are often performed by varying subgroups of actors. Consequently, collaborative grounding is necessary to share information among collaborating actors and, thereby, establish and maintain the common ground necessary for their collaborative work. By focusing on the...... collaborative level, collaborative information seeking aims to avoid both individual reductionism and group reductionism, while at the same time recognizing that only some information and understanding need be shared....
Starting from the discrepancy between the assessment of information in French public transport systems and customer-users expectations, this article will demonstrate that new information and communication technologies (NITCS) can contribute to fill in specific gaps. Some potential areas for technological research will be explored. NITCS as such cannot solve all of the complexities of passenger information; hence some prerequisites will become necessary, such as exchanges between all the parti...
This paper is a continuation of my previous work on informational confidence. The main idea of this technique is to normalize confidence values from different sources in such a way that they match their informational content determined by their performance in an application domain. This reduces classifier combination to a simple integration of information. The proposed method has shown good results in handwriting recognition and other applications involving classifier combination. In the pres...
Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu
The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.
Bonnet, François; Venkatesh, Sudhir
International audience Informal economic activity is a significant part of world production and distribution. This chapter reviews different core definitions (informal economic activities versus informal sector), different historical instances of "the" informal economy (in the Third World, under Communism and in contemporary Western cities), and different theoretical approaches (the dualist or development perspective, the legalist or neoliberal perspective, the structuralist or neomarxist ...
Boyd, T.; Rafferty, K. [editors
This package of information is intended to provide background to developers of geothermal aquaculture projects. The material is divided into eight sections and includes information on market and price information for typical species, aquaculture water quality issues, typical species culture information, pond heat loss calculations, an aquaculture glossary, regional and university aquaculture offices and state aquaculture permit requirements.
Main object of this thesis is design information system for warehouse management for Fi & Ho Trading Company, which will be accessible through web. Warehouse will be based on portal technology and connected with E-shop. In this thesis will be described elements of information system, resources used for realization, processes coverage by information system and complex evaluation of this information system.
This article overviews what community information means and its implications on the role of a library and information centre. No single institution can meet the general information requirements of any given community. It attempts to examine how .a cooperative venture of interagency network can lead to an effective community information service suitable for the local population.
Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.
Are we at a turning point in digital information? The expansion of the internet is unprecedented. Will information science become part of computer science and does rise of the term informatics demonstrate convergence of information science and information technology - a convergence that must surely develop? This work reflects on such issues.
The article discusses selected problems in methodology of designing comprehensive information systems. Main emphasis has been laid on modelling of information systems for companies. Presentation of bases for construction of models and description of their main types provides a basis allowing the author to draw conclusions concerning their application. Modelling of information systems is treated as one of stages in designing information systems.
Johnson-Throop, Kathy A.; Joe, John C.; Follansbee, Nicole M.
This viewgraph presentation gives an overview of the Mission Medical Information System (MMIS). The topics include: 1) What is MMIS?; 2) MMIS Goals; 3) Terrestrial Health Information Technology Vision; 4) NASA Health Information Technology Needs; 5) Mission Medical Information System Components; 6) Electronic Medical Record; 7) Longitudinal Study of Astronaut Health (LSAH); 8) Methods; and 9) Data Submission Agreement (example).
Davies, Philip H. J.
Addresses the use of information technology for intelligence and information warfare in the context of national security and reviews the status of clandestine collection. Discusses hacking, human agent collection, signal interception, covert action, counterintelligence and security, and communications between intelligence producers and consumers…
Full Text Available Companies have always been very carefully managed money, raw materials, machines and human resources. Today, they recognize the growing importance of the fifth big resource: information. They have finally understood that the within the global market with increased competition, using modern methods for planning, coordination and control, a company can-not function without acknowledging information and communications technology progress.
SHEN ChangXiang; ZHANG HuangGuo; FENG DengGuo; CAO ZhenFu; HUANG JiWu
The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of jnformation security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.
Stock, Wolfgang G
Dealing with information is one of the vital skills in thetwenty-first century. It takes a fair degree of information savvy to create, represent and supply information as well as to search for and retrieve relevant knowledge. This Handbook is a basic work of information science, providing a comprehensive overview of the current state of information retrieval and knowledge representation. It addresses readers from all professions and scientific disciplines, but particularly scholars, practitioners and students of Information Science, Library Science, Computer Science, Information Management, an
... Forest Service Information Collection; Financial Information Security Request Form AGENCY: Forest Service... extension with revision of a currently approved information collection, Financial Information Security... Time, Monday through Friday. SUPPLEMENTARY INFORMATION: Title: Financial Information Security...
In order to evaluate Floridi's philosophy of information (PI) and correlative information ethics (IE) as potential frameworks for a global information and computing ethics (ICE), I review a range of important criticisms, defenses, and extensions of PI and IE, along with Floridi's responses to these......, as gathered together in a recent special issue of Ethics and Information Technology. A revised and expanded version of PI and IE emerges here, one that brings to the foreground PI's status as a philosophical naturalism—one with both current application and important potential in the specific domains...... of privacy and information law. Further, the pluralism already articulated by Floridi in his PI is now more explicitly coupled with an ethical pluralism in IE that will be enhanced through IE's further incorporation of discourse ethics. In this form, PI and IE emerge as still more robust frameworks...
The aim of information lifecycle management is to develop a cost‐effective strategy for maintaining information assets, balancing the cost of maintaining information against business value. This paper contributes to development of theoretical information value based on a classification scheme that does not consider operational factors (e.g., storage, access). It concentrates on valuing information in terms of its type, organizational level and the extent of its effects. An informatio...
Cosmin Bonchis; Cornel Izbasa; Gabriel Ciobanu
Starting from Shannon theory of information, we present the case of producing information in the form of multisets, and encoding information using multisets. We compute the entropy of a multiset information source by constructing an equientropic string source (with interdependent symbols), and we compare this with a string information source with independent symbols. We then study the encoder and channel part of the system, obtaining some results about multiset encoding length ...
Boyd, T.; Rafferty, K.
This package of information is intended to provide background information to developers of geothermal aquaculture projects. The material is divided into eight sections and includes information on market and price information for typical species, aquaculture water quality issues, typical species culture information, pond heat loss calculations, an aquaculture glossary, regional and university aquaculture offices and state aquaculture permit requirements. A bibliography containing 68 references is also included.
Abstract: We propose here to clarify some of the relations existing between information and meaning by showing how meaningful information can be generated by a system submitted to a constraint. We build up definitions and properties for meaningful information, a meaning generator system and the domain of efficiency of a meaning (to cover cases of meaningful information transmission). Basic notions of information processing are used.
There are (at least) three approaches to quantifying information. The first, algorithmic information or Kolmogorov complexity, takes events as strings and, given a universal Turing machine, quantifies the information content of a string as the length of the shortest program producing it. The second, Shannon information, takes events as belonging to ensembles and quantifies the information resulting from observing the given event in terms of the number of alternate events that have been ruled ...
Dube, Kudakwashe; Shoniregun, Charles A
The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu
U.S. Geological Survey
The Geographic Names Information System (GNIS) is an automated data system developed by the U.S. Geological Survey (USGS) to standardize and disseminate information on geographic names. GNIS provides primary information for all known places, features, and areas in the United States identified by a proper name. The information in the system can be manipulated to meet varied needs. You can incorporate information from GNIS into your own data base for special applications.
Information Technology: Made Simple covers the full range of information technology topics, including more traditional subjects such as programming languages, data processing, and systems analysis. The book discusses information revolution, including topics about microchips, information processing operations, analog and digital systems, information processing system, and systems analysis. The text also describes computers, computer hardware, microprocessors, and microcomputers. The peripheral devices connected to the central processing unit; the main types of system software; application soft
S. Flowerday; R. von Solms
This research focused on what constitutes information integrity as this is a problem facing companies today. Moreover, information integrity is a pillar of information security and is required in order to have a sound security management programme. However, it is acknowledged that 100% information integrity is not currently achievable due to various limitations and therefore the auditing concept of reasonable assurance is adopted. This is in line with the concept that 100% information securit...
S. Flowerday; R. von Solms
This research focused on what constitutes information integrity as this is a problem facing companies today. Moreover, information integrity is a pillar of information security and is required in order to have a sound security management programme. However, it is acknowledged that 100% information integrity is not currently achievable due to various limitations and therefore the auditing concept of reasonable assurance is adopted. This is in line with the concept that 100% information securit...
The main purpose of the thesis was to present different areas of information security controls based on the international information security standard ISO 27001. The thesis also describes the methods of risk analysis and how to establish, implement, maintain and improve information security system in organizations. Most of the material was collected from books and various online resources. Some information was taken also from the teaching materials of the information security course. ...
Despite the fact that more money is spent annually on information technology, very few firms have found competitive advantage through the use of information technology. Information technology is seen as a backoffice function that is used for administrative functions and not as a key business enabler. Information technology will not only aid the business in surviving, but can be a strategic component to providing competitive advantage to the business, provided that the information technology f...
This is an ongoing review on the idea that the phase space information loss at causal horizons is the key ingredient of major physical laws. Assuming that information is fundamental and the information propagates with finite velocity, one can find that basic physical laws such as Newton's second law and Einstein's equation simply describe the energy-information relation (dE=TdS) for matter or space time crossing causal horizons. Quantum mechanics is related to the phase space information loss...
Evolutionary information theory is a constructive approach that studies information in the context of evolutionary processes, which are ubiquitous in nature and society. In this paper, we develop foundations of evolutionary information theory, building several measures of evolutionary information and obtaining their properties. These measures are based on mathematical models of evolutionary computations, machines and automata. To measure evolutionary information in an invariant form, we const...
Full Text Available Digital information changes the ways in which people and organisations interact. This paper examines the nature of this change in the context of the author’s Model for Information (MfI. It investigates the relationship between outcomes and value, selection processes and some attributes of information and explores how this relationship changes in the move from analogue to digital information. Selection processes shape the evolution of information ecosystems in which conventions are established for the ways in which information is used. The conventions determine norms for information friction and information quality as well as the sources of information and channels used. Digital information reduces information friction, often dramatically, and changes information quality. The increasing use of analytics in business increasingly delivers predictive or prescriptive digital information. These changes are happening faster than information ecosystem conventions can change. The relationships established in the paper enable an analysis of, and guide changes to, these conventions enabling a more effective use of digital information.
Schneider, T D
How do genetic systems gain information by evolutionary processes? Answering this question precisely requires a robust, quantitative measure of information. Fortunately, 50 years ago Claude Shannon defined information as a decrease in the uncertainty of a receiver. For molecular systems, uncertainty is closely related to entropy and hence has clear connections to the Second Law of Thermodynamics. These aspects of information theory have allowed the development of a straightforward and practical method of measuring information in genetic control systems. Here this method is used to observe information gain in the binding sites for an artificial 'protein' in a computer simulation of evolution. The simulation begins with zero information and, as in naturally occurring genetic systems, the information measured in the fully evolved binding sites is close to that needed to locate the sites in the genome. The transition is rapid, demonstrating that information gain can occur by punctuated equilibrium. PMID:10908337
SHIBKO O. N.
Full Text Available Problem statement. Modern information technology is developing in a globalized economy, the formation of a common information space and as a result, changes relation to the information of participants of market relations. New conditions lead to an increase in the number of parties involved in the creation and use of information, to the increase of the volume of information and the frequency of its use, making the actual task of the operational management of the activity of the staff of the various organizations. Information support includes normative and reference data; the necessary classificatory of technical and economic information; arrays of data needed to solve problems; standardized documents. The main purpose of providing information is timely to give management system, accurate information in particular, decision-makers, necessary and sufficient for making optimal or near-management decisions. Purpose of the article: to study and to improve methods of the design of information support (IS and of implemented solutions for the objects, the arrangement and forms of organization of the information circulating in the automated control system when it is functioning as an object of a certain structure. Conclusion. Thus, the choice of a method of designing information support determines by the necessity of the development of the mathematical apparatus, providing the formal means of work with information resources. The mathematical apparatus and methods should provide the formulated tasks of designing information support.
Full Text Available Evolutionary information theory is a constructive approach that studies information in the context of evolutionary processes, which are ubiquitous in nature and society. In this paper, we develop foundations of evolutionary information theory, building several measures of evolutionary information and obtaining their properties. These measures are based on mathematical models of evolutionary computations, machines and automata. To measure evolutionary information in an invariant form, we construct and study universal evolutionary machines and automata, which form the base for evolutionary information theory. The first class of measures introduced and studied in this paper is evolutionary information size of symbolic objects relative to classes of automata or machines. In particular, it is proved that there is an invariant and optimal evolutionary information size relative to different classes of evolutionary machines. As a rule, different classes of algorithms or automata determine different information size for the same object. The more powerful classes of algorithms or automata decrease the information size of an object in comparison with the information size of an object relative to weaker4 classes of algorithms or machines. The second class of measures for evolutionary information in symbolic objects is studied by introduction of the quantity of evolutionary information about symbolic objects relative to a class of automata or machines. To give an example of applications, we briefly describe a possibility of modeling physical evolution with evolutionary machines to demonstrate applicability of evolutionary information theory to all material processes. At the end of the paper, directions for future research are suggested.
Aureo de Paula; Scheinkman, Jose A.
This paper investigates the determinants of informal economic activity. We present two equilibrium models of informality and test their implications using a survey of 48,000+ small firms in Brazil. We define informality as tax avoidance; firms in the informal sector avoid tax payments but suffer other limitations. In the first model there is a single industry and informal firms face a higher cost of capital and a limitation on size. As a result informal firms are smaller and have a lower capi...
Wind Energy Information has been prepared to provide researchers, designers, manufacturers, distributors, dealers, and users of wind energy conversion systems with easy access to technical information. This directory lists organizations and publications which have the main objective of promoting the use of wind energy conversion systems, some organizations that can respond to requests for information on wind energy or make referrals to other sources of information, and some publications that occasionally include information on wind energy. The bibliography contains references to information for both the neophyte and the expert.
The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. Written for the general public, the EIA publication Energy Information Sheets was developed to provide information on various aspects of fuel production, prices, consumption and capability. The information contained herein pertains to energy data as of December 1991. Additional information on related subject matter can be found in other EIA publications as referenced at the end of each sheet.
Lucking, Robert A.; Christmann, Edwin P.
Describes the Geographic Information System (GIS) which is capable of storing, manipulating, and displaying data allowing students to explore complex relationships through scientific inquiry. Explains applications of GIS in middle school classrooms and includes assessment strategies. (YDS)
Kludas, Jana; Bruno, Eric; Marchand-Maillet, Stéphane
In retrieval, indexing and classification of multimedia data an efficient information fusion of the different modalities is essential for the system's overall performance. Since information fusion, its influence factors and performance improvement boundaries have been lively dis- cussed in the last years in different research communities, we will review their latest findings. They most importantly point out that exploiting the feature's and modality's dependencies will yield to maximal perfor...
Álvarez, Juan Carlos
Full Text Available This paper is intended to describe the results of a study of training the ability to obtain scientific data. The need and importance of the topic, in the era of the information and the knowledge, is backed up. Global current tendencies on the abilities in the handling and use of the scientific information are reviewed on the basis of regularities and inconsistencies. This leads to define the ability and its corresponding operational system.
Álvarez, Juan Carlos; Ríos, Isabel
This paper is intended to describe the results of a study of training the ability to obtain scientific data. The need and importance of the topic, in the era of the information and the knowledge, is backed up. Global current tendencies on the abilities in the handling and use of the scientific information are reviewed on the basis of regularities and inconsistencies. This leads to define the ability and its corresponding operational system.
Kolm, Anne-Sofie; Larsen, Birthe
This paper develops a four sector equilibrium search and matching model with informal sector employment opportunities and educational choice. We show that underground activities reduce educational attainments if informal employment opportunities mainly are available to low educated workers. More ...
Constantiou, Ioanna D.; Lehrer, Christiane; Hess, Thomas
on the continuance of LBS use and indicate changes in individuals' information retrieval behaviours in everyday life. In particular, the distinct value dimension of LBS in specific contexts of use changes individuals' behaviours towards accessing location-related information....
Ploug, Thomas; Holm, Søren
This article introduces the notion of ‘routinisation’ into discussions of informed consent. It is argued that the routinisation of informed consent poses a threat to the protection of the personal autonomy of a patient through the negotiation of informed consent. On the basis of a large survey, we...... provide evidence of the routinisation of informed consent in various types of interaction on the internet; among these, the routinisation of consent to the exchange of health related information. We also provide evidence that the extent of the routinisation of informed consent is dependent on the...... character of the information exchanged, and we uncover a range of causes of routinisation. Finally, the article discusses possible ways of countering the problem of routinisation of informed consent....
... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...
U.S. Environmental Protection Agency — This asset includes hazardous waste information, which is mostly contained in the Resource Conservation and Recovery Act Information (RCRAInfo) System, a national...
... are here: EPA Home Climate Change Basic Information Climate Change: Basic Information On This Page Climate change ... We can make a difference How is the climate changing in the U.S.? Observations across the United ...
Full Text Available ... to this external site does not constitute an endorsement of the site or the information it contains ... to this external site does not constitute an endorsement of the site or the information it contains ...
Coyne, Joseph G.; Moneyhun, Dora H.
Describes the Energy Information Administration (EIA) and the Technical Information Center (TIC), and lists databases accessible online to the Department of Energy and its contractors through DOE/RECON. (RAA)
In recent years, risk informed activities are being investigated as scientifically rational measures. Some Risk informed activities using Core Damage Frequency (CDF) have been already employed. Examples are extraction of accident management strategies, risk informed maintenance importance and such. This paper describes risk information such as CDF, risk profile, risk importance of equipments' contribution to risk, gained from Probabilistic Analysis (PSA). Furthermore, risk informed activities conducted and/or considered are also introduced. The examples are investigation of accident management strategies, on-line maintenance and risk informed In Service Inspection (ISI). In the end, open issues for further employment of risk information in the NPP activities are summarized. Technical quality of PSA methodology is one of these issues and it should be continuously addressed, however, the risk information as it is still useful for better activities in NPP. (author)
Full Text Available ... Education / Safety Education Centers En Español Carbon Monoxide Information Center The Invisible Killer Carbon monoxide, also known ... Install one and check its batteries regularly. View Information About CO Alarms Other CO Topics Safety Tips ...
... to access your health information Right to an accounting of disclosures of your health information Right to ... Yes. You have a right to receive an "accounting of disclosures," which is a list of certain ...
Developing countries need mechanisms by which the information they generate themselves and development information from the rest of the world can be retrieved. The international cooperative information system is such a mechanism. Delegates to the Seminar on International Cooperative Information Systems were informed about various existing systems (INIS, AGRIS, INFOTERRA, TCDC/INRES, POPIN, DEVSIS, and INPADROC), some specialized information systems and services (CDS/ISIS and the Cassava Information Centre), and computer programs for information processing (INIS/AGRIS, CDS/ISIS, and MINISIS). The participants suggested some changes that should be made on both the national and the international levels to ensure that these systems meet the needs of developing countries more effectively. (LL)
... Screening Research Melanoma Treatment (PDQ®)–Patient Version General Information About Melanoma Go to Health Professional Version Key ... the PDQ Adult Treatment Editorial Board . Clinical Trial Information A clinical trial is a study to answer ...
Desai, B.N.; Kunte, P.D.; Bhargava, R.M.S.
Ocean. At INODC, a National Information system for oceanographic studies is under development. Bibliographic information forms an integral part of oceanographic system as it is an essential component for data analysis and interpretation. Hence two major...
The chapter gives an introduction to Geographical Information Systems (GIS) with particular focus on their application within environmental management.......The chapter gives an introduction to Geographical Information Systems (GIS) with particular focus on their application within environmental management....
Food production and consumption influence health, the environment, social structures, etc. For this reason consumers are increasingly interested in information about these effects. Disclosure of information about the consequences of food production and consumption is essential for the idea of...
The Indiana Health Information Exchange is comprised of various Indiana health care institutions, established to help improve patient safety and is recognized as a best practice for health information exchange.
Schneider, Thomas D.
How do genetic systems gain information by evolutionary processes? Answering this question precisely requires a robust, quantitative measure of information. Fortunately, 50 years ago Claude Shannon defined information as a decrease in the uncertainty of a receiver. For molecular systems, uncertainty is closely related to entropy and hence has clear connections to the Second Law of Thermodynamics. These aspects of information theory have allowed the development of a straightforward and practic...
Product Information Management (PIM) is a field that deals with the product master data management and combines into one base the experience and the principles of data integration and data quality. Product Information Management merges the specific attributes of products across all channels in the supply chain. By unification, centralization and standardization of product information into one platform, quality and timely information with added value can be achieved. The goal of the theoretica...
Interpersonal communication is very important as for managers as for personnel. Companies improve markedly by establishing open and no threatening interpersonal communications throughout the organization. One of the manager's roles is information role. Managers give and exchange information with personnel; they disclose information about the company and about anything that can improve effects of personnel jobs and personnel responsibilities. Management information has implications for decisio...
Brody, Dorje C.; Yan Tai Law
In financial markets valuable information is rarely circulated homogeneously, because of time required for information to spread. However, advances in communication technology means that the 'lifetime' of important information is typically short. Hence, viewed as a tradable asset, information shares the characteristics of a perishable commodity: while it can be stored and transmitted freely, its worth diminishes rapidly in time. In view of recent developments where internet search engines and...
The diploma thesis focuses on design of the information system for the department of medical transport service, which is part of the hospital. This thesis describes the theoretical knowledge necessary for analysis and custom design, is also concerned with the analysis of the current state of processes and information system. Last but not least, based on the analysis and the requirements lays down suggestions for improvement of the information system and design of optimal information system, t...
The purpose of these Public Information Guidelines is to provide principles for the implementation of the NWPA mandate and the Mission Plan requirements for the provision of public information. These Guidelines set forth the public information policy to be followed by all Office of Civilian Radioactive Waste Management (OCRWM) performance components. The OCRWM offices should observe these Guidelines in shaping and conducting public information activities.
Blethyn, Stanley G
Designing Information Systems focuses on the processes, methodologies, and approaches involved in designing information systems. The book first describes systems, management and control, and how to design information systems. Discussions focus on documents produced from the functional construction function, users, operators, analysts, programmers and others, process management and control, levels of management, open systems, design of management information systems, and business system description, partitioning, and leveling. The text then takes a look at functional specification and functiona
The purpose of these Public Information Guidelines is to provide principles for the implementation of the NWPA mandate and the Mission Plan requirements for the provision of public information. These Guidelines set forth the public information policy to be followed by all Office of Civilian Radioactive Waste Management (OCRWM) performance components. The OCRWM offices should observe these Guidelines in shaping and conducting public information activities
Coff, Christian Eyde
Food production and consumption influence health, the environment, social structures, etc. For this reason consumers are increasingly interested in information about these effects. Disclosure of information about the consequences of food production and consumption is essential for the idea of inf......, supporting rationality (the best choice), consumers’ self-governance (autonomy) and life coherence (integrity). On a practical level, informed food choice remains an ideal to strive for, as information on food often is inadequate....
Van Lingen, Frank
This document gives an overview of issues related to integration of information. Different aspects are discussed. Furthermore, several projects related to integration of information are described. Also several standards that relate to information integration are discussed. Finally, these issues are related to information integration within a high-energy physics environment. Keywords : heterogeneous databases, multidatabases, temporal databases, meta-model, meta-data, ontologies, mediator, data management.
Acemoglu, Daron; Zilibotti, Fabrizio
We propose a model in which economic relations and institutions in advanced and less developed countires differ as these societies have access to different amounts of information. The lack of information in less developped economies makes it hard to evaluate the performance of managers, and leads to high "agency costs". Differencies in the amount of information have a variety of sources. As well as factors related to the informational infrastructure, we emphasize that societies accumulate inf...
What is an Information Access Survey? An Information Access Survey is a tool that: • Identifies key issues about people and what information needs they have • Identifies what media sources are available, what strategies people use to get information and finds out how cost-effective these are • Recommends methods of communication that are useful for poor rural communities who use aquatic resources to improve their livelihoods (Pdf contains 4 pages).
Management information systems (MIS) is a commonly used term in computer profession. The new information technology has caused management to expect more from computer. The process of supplying information follows a well defined procedure. MIS should be capable for providing usable information to the various areas and levels of organization. MIS is different from data processing. MIS and business hierarchy provides a good framework for many organization which are using computers. (A.B.)
Background: The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in "Bookmarks" and "Favourites". Argument: It is suggested that personal information collections are…
Краліна, Ганна Сергіївна; Тупота, Евгеній Вікторович
Information retrieval is the science of searching for documents, for information within documents and for metadata about documents, as well as that of searching relational databases and the World Wide Web. There is overlap in the usage of the terms data retrieval, document retrieval, information retrieval, and text retrieval, but each also has its own body of literature, theory, praxis and technologies
Discussion of connectionist views for adaptive clustering in information retrieval focuses on a connectionist clustering technique and activation spreading-based information retrieval model using the interaction information retrieval method. Presents theoretical as well as simulation results as regards computational complexity and includes…
Asif, Muhammad; Krogstie, John
Purpose: A mobile student information system (MSIS) based on mobile computing and context-aware application concepts can provide more user-centric information services to students. The purpose of this paper is to describe a system for providing relevant information to students on a mobile platform. Design/methodology/approach: The research…
Gazendam, Henk W.M.
Metaphors are useful because they are efficient: they transfer a complex of meaning in a few words. Information systems are social constructs. Therefore, metaphors seem to be especially useful for explaining the space of possible meaning complexes or designs of information systems. Three information
The purpose of an information strategy is to highlight the extent to which a modern, complex organization depends on information, in all of its guises, and to consider how this strategic asset should be managed. This dependency has always been present and nowhere more so than in universities, whose very purpose is built around information and its…
Hospital drug information pharmacists have set up a viewdata drug information service (VADIS) which can be accessed through the telephone system. It may not be an essential service for all doctors yet, but it is a new way of receiving drug information together with unbiased therapeutic comments based on available research data.
Dearstyne, Bruce W.; And Others
Six articles discuss government information policy in context of technology and electronic records; policies on information resources management from OMB (Office of Management and Budget); state information resources, including Council of State Governments (CSG); state record laws and preservation of archival records; and management of electronic…
Multisource information theory is well known in Shannon setting. It studies the possibilities of information transfer through a network with limited capacities. Similar questions could be studied for algorithmic information theory and provide a framework for several known results and interesting questions.
The National Energy Information Center provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. This Energy Information Directory is used to assist the Center staff as well as other DOE staff in directing inquires to the proper offices.
This book presents an insider's perspective on information in a wide range of disciplines, from quantum physics to library science. It reflects the diversity of understanding of information within these disciplines, but also brings clarity and coherence to the different perspectives through promoting information as a unifying concept.
This discussion of the ethics of the information process provides a brief review of the process of information supply and flow, primarily in science and technology; looks at various points in the flow of information; and highlights particular ethical concerns. Facets of the process discussed in more detail include ways in which some scientists…
Valentijn, E.; Belikov, A. N.
The Lofar Information System is a solution for Lofar Long Term Archive that is capable to store and handle PBs of raw and processed data. The newly created information system is based on Astro-WISE - the information system for wide field astronomy. We review an adaptation of Astro-WISE for the new t
Hongladarom, Soraj; Ess, Charles
This book was the first publication to take a genuinely global approach to the diverse ethical issues evoked by Information and Communication Technologies and their possible resolutions. Readers will gain a greater appreciation for the problems and possibilities of genuinely global information...... ethics, which are urgently needed as information and communication technologies continue their exponential growth...
Taylor, M. J.; Jones, R. P.; Haggerty, J.; Gresty, D.
In this paper we discuss an approach to the teaching of information technology law to higher education computing students that attempts to prepare them for professional computing practice. As information technology has become ubiquitous its interactions with the law have become more numerous. Information technology practitioners, and in particular…
This article deals with theoretical developments in the subject of quantum information and quantum computation, and includes an overview of classical information and some relevant quantum mechanics. The discussion covers topics in quantum communication, quantum cryptography, and quantum computation, and concludes by considering whether a perspective in terms of quantum information sheds new light on the conceptual problems of quantum mechanics.
Rafferty, K. [P.E.; Boyd, T. [ed.
This package of information is intended to provide a foundation of background information for developers of geothermal greenhouses. The material is divided into seven sections covering such issues as crop culture and prices, operating costs for greenhouses, heating system design, vendors and a list of other sources of information.
This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.
Millions of consumers get health information from magazines, TV or the Internet. Some of the information is reliable and up to date; some is not. How can ... the site have an editorial board? Is the information reviewed before it is posted? Be skeptical. Things ...
Introduction: The term "information" in information science does not share the characteristics of those of a nomenclature: it does not bear a generally accepted definition and it does not serve as the bases and assumptions for research studies. As the data deluge has arrived, is the concept of information still relevant for information…
La Caille John, Patricia
The Rural Information Center (RIC), a project of two agencies of the U.S. Department of Agriculture, has served rural information needs since 1988. The targeted audience for the RIC is local officials and citizens, rather than scientists and federal officials, and the thrust of its information is rural development rather than production…
Hiemstra, Djoerd; Göker, Ayse; Davies, John
Many applications that handle information on the internet would be completely inadequate without the support of information retrieval technology. How would we find information on the world wide web if there were no web search engines? How would we manage our email without spam filtering? Much of the
Jensen, Thomas; Vatrapu, Ravi
systems researchers engaged in the design and development of a prototype for an innovative IT-artifact called Shipping Information Pipeline which is a kind of “an internet” for shipping information. The instrumental aim is to enable information seamlessly to cross the organizational boundaries and...
In recent years we extended Shannon static statistical information theory to dynamic processes and established a Shannon dynamic statistical information theory, whose core is the evolution law of dynamic entropy and dynamic information. We also proposed a corresponding Boltzmman dynamic statistical information theory. Based on the fact that the state variable evolution equation of respective dynamic systems, i.e. Fokker-Planck equation and Liouville diffusion equation can be regarded as their information symbol evolution equation, we derived the nonlinear evolution equations of Shannon dynamic entropy density and dynamic information density and the nonlinear evolution equations of Boltzmann dynamic entropy density and dynamic information density, that describe respectively the evolution law of dynamic entropy and dynamic information. The evolution equations of these two kinds of dynamic entropies and dynamic informations show in unison that the time rate of change of dynamic entropy densities is caused by their drift, diffusion and production in state variable space inside the systems and coordinate space in the transmission processes; and that the time rate of change of dynamic information densities originates from their drift, diffusion and dissipation in state variable space inside the systems and coordinate space in the transmission processes. Entropy and information have been combined with the state and its law of motion of the systems. Furthermore we presented the formulas of two kinds of entropy production rates and information dissipation rates, the expressions of two kinds of drift information flows and diffusion information flows. We proved that two kinds of information dissipation rates (or the decrease rates of the total information) were equal to their corresponding entropy production rates (or the increase rates of the total entropy) in the same dynamic system. We obtained the formulas of two kinds of dynamic mutual informations and dynamic channel
This book is a significant step towards developing a body of management knowledge pertinent to the context of Library Information Science (LIS) and provides a succinct but deep account of management and information organizations. Management of Information Organizations presents a broad view of the information organizations and the nature of management in these organizations, and how information professionals are affected by such management systems. The book equips the reader with the knowledge that will enable them to develop a strong intellectual foundation relating to management and its mani
Rafferty, Pauline; Baker, David
This special issue explores information behaviour and practice in general, and specifically focuses on the implications for library and information services. Information seeking behaviour and information practice remain areas of importance in information science and librarianship, perhaps even more so in the digital age. This special issue is an opportunity to share ideas and scholarship and to explore models and methods. The papers chosen for inclusion cover a range of topics and approach them from a number of different epistemological and methodological positions demonstrating the liveliness
Gray, J E; Vogt, A
Is symmetry informative? The answer is both yes and no. We examine what information and symmetry are and how they are related. Our approach is primarily mathematical, not because mathematics provides the final word, but because it provides an insightful and relatively precise starting point. Information theory treats transformations that messages undergo from source to destination. Symmetries are information that leave some property of interest unchanged. In this respect the studies of information and symmetry can both be regarded as a Quest for the identity transformation. PMID:9224554
Information Systems Project Management addresses project management in the context of information systems. It deals with general project management principles, with focus on the special characteristics of information systems. It is based on an earlier text, but shortened to focus on essential project management elements.This updated version presents various statistics indicating endemic problems in completing information system projects on time, within budget, at designed functionality. While successful completion of an information systems project is a challenge, there are some things that ca
Duff, Alistair S
We are often told that we are ""living in an information society"" or that we are ""information workers."" But what exactly do these claims mean, and how might they be verified? In this important methodological study, Alistair S. Duff cuts through the rhetoric to get to the bottom of the ""information society thesis."" Wide-ranging in coverage, this study will be of interest to scholars in information science, communication and media studies and social theory. It is a key text for the newly-unified specialism of information society studies, and an indispensable guide to the future of this disc
In order to develop new types of information media and technology, it is essential to model complex and flexible information processing in living systems. This book presents a new approach to modeling complex information processing in living systems. Traditional information-theoretic methods in neural networks are unified in one framework, i.e. a-entropy. This new approach will enable information systems such as computers to imitate and simulate human complex behavior and to uncover the deepest secrets of the human mind.
Nuclear information (Nl) interests people for many reasons, with energy supply, safety, and security being at the top of the list. Democratizing nuclear information has its roots in the growth of a knowledge-based economy, the knowledge worker as a user of nuclear information, developments in information and communication technologies (ICT), and the impact of internet growth. Results of democratization are apparent in the process of information creation, in how nuclear information is distributed and accessed, and in the conditions for using the information found. The International Nuclear Information System (INIS) both reflects and contributes to these trends. Nuclear information falls under the overall umbrella of scientific and technical information (STI). It is highly specialized, but it follows general principles and trends of STI. The world of STI has its own culture and its own long-established rules of use and existence. These have brought us many inventions and improvements, introduced important technological changes, and made our lives and work much easier and more pleasurable. However, the world is constantly changing, and the traditional closed STI environment, including the world of nuclear information, is not keeping up with today’s changes. (author)
Society is on the verge of a new era: the information age. Economical changes, a new way of looking at services and new types of conflict are forecasted. Some glimpses of these changes were noticed during the Persian Gulf War. Government decision units, organisations, society and critical industries
IBM Security Intelligence with Analytics of massive data provides exceptional threat and risk detection, combining deep security expertise with analytical insights on a massive scale. For forward-leaning organizations seeking advanced insight into security risks, the IBM solution -- Security Intelligence Platform for massive data -- provides a comprehensive, integrated approach that combines real-time correlation for continuous insight, custom analytics across massive structured and unstructured data, and forensic capabilities for irrefutable evidence. The combination can help you address advanced persistent threats, fraud and insider threats. The IBM solution is designed to widening the scope and scale of investigation, enabling analyzes of any kind of data in any format, such as DNS transactions or full packet capture data to find malicious activity hidden deep in the masses of an organization's data. IBMWatson Explorer provides a unified view displaying all of security relevant information in a portal-like UI. The information analytics system is built around AQL (Annotated query language), a declarative rule language with a familiar SQL-like syntax. AQL supports the paradigm describing data for data with an optional data governance catalogue for massive volumes of data supporting individual views in addition to the pre-defined Document view that holds the textual and label content. An underlying Role-Based Access Control that data protection rules are strictly enforced within the whole architecture. Security at the document, sub-document and record level is built intoWatson Explorer. When Watson Explorer security is implemented, users cannot see information that they would be prohibited from seeing if they were directly logged into the target system. (author)
Bais, F Alexander
We review of the interface between (theoretical) physics and information for non-experts. The origin of information as related to the notion of entropy is described, first in the context of thermodynamics then in the context of statistical mechanics. A close examination of the foundations of statistical mechanics and the need to reconcile the probabilistic and deterministic views of the world leads us to a discussion of chaotic dynamics, where information plays a crucial role in quantifying predictability. We then discuss a variety of fundamental issues that emerge in defining information and how one must exercise care in discussing concepts such as order, disorder, and incomplete knowledge. We also discuss an alternative form of entropy and its possible relevance for nonequilibrium thermodynamics. In the final part of the paper we discuss how quantum mechanics gives rise to the very different concept of quantum information. Entirely new possibilities for information storage and computation are possible due t...
This Directory will facilitate dissemination of information. It is a reference document that lists the sources of program information available to the states, Indian Tribes, and the public. Chapter 1 describes current program information sources produced by OCRWM and by DOE's Office of Scientific and Technical Information (OSTI). Chapter 2 provides a directory of OCRWM and DOE technical information, and includes descriptions of computerized data bases and other resources. Chapter 3 is an index of OCRWM Headquarters and Project Office contacts, as well as state and Indian Tribe contacts. Chapter 4 enumerates Congressional Committees and Subcommittees that have jurisdiction over various components of the Civilian Radioactive Waste Management Program, and Chapter 5 lists DOE reading rooms, as well as information offices and the public libraries in affected states that are on one or more of OCRWM's mailing lists
Djordjevic, Ivan B
This book is a self-contained, tutorial-based introduction to quantum information theory and quantum biology. It serves as a single-source reference to the topic for researchers in bioengineering, communications engineering, electrical engineering, applied mathematics, biology, computer science, and physics. The book provides all the essential principles of the quantum biological information theory required to describe the quantum information transfer from DNA to proteins, the sources of genetic noise and genetic errors as well as their effects. Integrates quantum information and quantum biology concepts; Assumes only knowledge of basic concepts of vector algebra at undergraduate level; Provides a thorough introduction to basic concepts of quantum information processing, quantum information theory, and quantum biology; Includes in-depth discussion of the quantum biological channel modelling, quantum biological channel capacity calculation, quantum models of aging, quantum models of evolution, quantum models o...
Full Text Available This research focused on what constitutes information integrity as this is a problem facing companies today. Moreover, information integrity is a pillar of information security and is required in order to have a sound security management programme. However, it is acknowledged that 100% information integrity is not currently achievable due to various limitations and therefore the auditing concept of reasonable assurance is adopted. This is in line with the concept that 100% information security is not achievable and the notion that adequate security is the goal, using appropriate countermeasures. The main contribution of this article is to illustrate the importance of and provide a macro view of what constitutes information integrity. The findings are in harmony with Samuel Johnson's words (1751: 'Integrity without knowledge is weak and useless, and knowledge without integrity is dangerous and dreadful.'
The tables contained in this Appendix A describe the information needs for a pressurized water reactor (PWR) with a large, dry containment. To identify these information needs, the branch points in the safety objective trees were examined to decide what information is necessary to (a) determine the status of the safety functions in the plant, i.e., whether the safety functions are being adequately maintained within predetermined limits, (b) identify plant behavior (mechanisms) or precursors to this behavior which indicate that a challenge to plant safety is occurring or is imminent, and (c) select strategies that will prevent or mitigate this plant behavior and monitor the implementation and effectiveness of these strategies. The information needs for the challenges to the safety functions are not examined since the summation of the information needs for all mechanisms associated with a challenge comprise the information needs for the challenge itself
Acceptance of nuclear materials into a monitoring regime is complicated if the materials are in classified shapes or have classified composition. An attribute measurement system with an information barrier can be emplo,yed to generate an unclassified display from classified measurements. This information barrier must meet two criteria: (1) classified information cannot be released to the monitoring party, and (2) the monitoring party must be convinced that the unclassified output accurately represents the classified input. Criterion 1 is critical to the host country to protect the classified information. Criterion 2 is critical to the monitoring party and is often termed the 'authentication problem.' Thus, the necessity for authentication of a measurement system with an information barrier stems directly from the description of a useful information barrier. Authentication issues must be continually addressed during the entire development lifecycle of the measurement system as opposed to being applied only after the system is built.