Masaud-Wahaishi, Abdulmutalib; Ghenniwa, Hamada
Healthcare industry is facing a major reform at all levels—locally, regionally, nationally, and internationally. Healthcare services and systems become very complex and comprise of a vast number of components (software systems, doctors, patients, etc.) that are characterized by shared, distributed and heterogeneous information sources with varieties of clinical and other settings. The challenge now faced with decision making, and management of care is to operate effectively in order to meet t...
Full Text Available Information systems (IS development should not only accomplish functional models but also conceptual models to represent the organizational environment in which it will have to evolve and must be aligned with strategic objectives. Generally, a significant innovations in the enterprise, is to organize its IS around its business processes. Otherwise, business models must be enriched by the agent paradigm to reduce the complexity involved in solving a problem by the structuring of knowledge on a set of intelligent agents, the association between agents and activities and collaboration among agents. To do this, we propose an agent oriented approach based on the model-driven-architecture (MDA for the information system development. This approach uses in its different phases, the BPMN language for the business processes modeling, AML language for the agent modeling, and JADEX platform for the implementation. The IS development is realized by different automated mappings from source models to target models.
GUAN Xu; CHENG Ming; LIU Bao
An increasing number of computer systems are being viewed in terms of autonomous agents.Most people believe that agent-oriented approach is well suited to design and build complex systems. Yet. todate, little effort had been devoted to discuss the advantages of agent-oriented approach as a mainstreamsoftware engineering paradigm. Here both of this issues and the relation between object-oriented and agent-oriented will be argued. we describe an agent-oriented methodology and provide a quote for designing anauction system.
MingCheng; XuGuan; BaoLiu
An increasing number of computer systems are being viewed in terms of autonomous agents．Most people believe that agent-oriented approach is well suited to designing and building complex systems． Yet， to date， little effort had been devoted to discussing the advantages of agent-oriented approach as a mainstream software engineering paradiam．Here both of this issues and the relation between object-oriented and agentoriented will be argued．We describe an agent-oriented methodology and provide a quote for designing a auction system．
Agent-oriented programming (AOP) is a framework to develop agents, and it aims to link the gap betweentheory and practical in agent research. The core of an AOP framework is its language and semantics. In this paper,we propose the necessary properties which agents should have, and then give a summary and analysis about differentAOP languages based on these properties.
Jie Wang; Shi-Er Ju; Chun-Nian Liu
Currently, agent-based computing is an active research area, and great efforts have been made towards the agent-oriented programming both from a theoretical and practical view. However, most of them assume that there is no uncertainty in agents' mental state and their environment. In other words, under this assumption agent developers are just allowed to specify how his agent acts when the agent is 100% sure about what is true/false. In this paper, this unrealistic assumption is removed and a new agent-oriented probabilistic logic programming language is proposed, which can deal with uncertain information about the world. The programming language is based on a combination of features of probabilistic logic programming and imperative programming.
Babak Darvish Rouhani
Full Text Available Nowadays, utilizing EA by enterprises with medium and long term goals causes improvement in their productivity and competitiveness. With respect to varied changes in enterprise's business activities and attitudes, flexibility in information systems of EA is a crucial factor. Agent's capacities in implementation of complex systems goal convince huge enterprises to use agent oriented architecture in their EA programs. Combination of EA and agent oriented architecture introduces a new attitude in order to make a better conditions for huge enterprises with complex information systems. This paper firstly enumerates the current problems of Enterprise Architecture, and then agent-oriented Enterprise Architecture is introduced as a comprehensive solution for eliminating mentioned defects deals raised. The main results of agent-oriented Enterprise Architecture includes: more flexibility in organizational change, reengineering organizational processes and comprehensive coverage of all activities of huge and complex organizations with no other lateral requirements.
Babak Darvish Rouhani; Fatemeh Nikpay
Nowadays, utilizing EA by enterprises with medium and long term goals causes improvement in their productivity and competitiveness. With respect to varied changes in enterprise's business activities and attitudes, flexibility in information systems of EA is a crucial factor. Agent's capacities in implementation of complex systems goal convince huge enterprises to use agent oriented architecture in their EA programs. Combination of EA and agent oriented architecture introduces a new attitude i...
Full Text Available A new Agent-Oriented Programming (AOP language called A++ is introduced in this research for developing agent-based distributed systems. In this work, agent-oriented programming is defined as a programming method with characteristics of distribution, autonomy, concurrency, and mobility. Both agents and objects can be modeled in A++. In addition to data and methods that can be defined in objects including classes and instances, each agent is also associated with an independent computing process in agent-oriented programming.
陆汝钤; 石纯一; 张松懋; 毛希平; 徐晋晖; 杨萍; 范路
Common sense processing has been the key difficulty in Al community. Through analyzing various research methods on common sense, a large-scale agent-oriented commonsense knowledge base is described in this paper. We propose a new type of agent——CBS agent, specify common sense oriented semantic network descriptive language-Csnet, augment Prolog for common sense, analyze the ontology structure, and give the execution mechanism of the knowledge base.
Bogg, Paul; Beydoun, Ghassan; Low, Graham
Problem-solving methods (PSM) are abstract structures that describe specific reasoning processes employed to solve a set of similar problems. We envisage that off-the-shelf PSMs can assist in the development of agent-oriented solutions, not only as reusable and extensible components that software engineers employ for designing agent architecture solutions, but just as importantly as a set of runtime capabilities that agents themselves dynamically employ in order to solve problems. This chapter describes PSMs for agent-oriented software engineering (AOSE) that address interaction-dependent problem-solving such as negotiation or cooperation. An extension to an AOSE methodology MOBMAS is proposed whereby PSMs are integrated in the software development phases of MAS Organization Design, Internal Design, and Interaction Design. In this way, knowledge engineering drives the development of agent-oriented systems.
Petri net is a kind of effective graphic modeling tool. The agent technology is combined with petri net in order to enhance flexibility and extendibility, and the agent-oriented single token and colored transition petri net is proposed. Some characteristics such as liveness, fairness and safety are analyzed. Finally, an example in mould agile manufacturing is given to illustrate the use of it.
Sivakumar, N.; K. Vivekanandan
Several Agent Oriented Software Engineering (AOSE) methodologies were proposed to build open, heterogeneous and complex internet based systems. AOSE methodologies offer different conceptual frameworks, notations and techniques, thereby provide a platform to make the system abstract, generalize, dynamic and autonomous. Lifecycle coverage is one of the important criteria for evaluating an AOSE methodology. Most of the existing AOSE methodologies focuses only on analysis, design, implementation ...
Bresciani, Paolo; Giorgini, Paolo; Giunchiglia, Fausto; Mylopoulos, John; PERINI, Anna
Our goal in this paper is to introduce and motivate a methodology, called Tropos, 1 for building agent oriented software systems. Tropos is based on two key ideas. First, the notion of agent and all the related mentalistic notions (for instance: goals and plans) are used in all phases of software development, from the early analysis down to the actual implementation. Second, Tropos covers also the very early phases of requirements analysis, thus allowing for a deeper understanding of the envi...
Full Text Available Several Agent Oriented Software Engineering (AOSE methodologies were proposed to build open, heterogeneous and complex internet based systems. AOSE methodologies offer different conceptual frameworks, notations and techniques, thereby provide a platform to make the system abstract, generalize, dynamic and autonomous. Lifecycle coverage is one of the important criteria for evaluating an AOSE methodology. Most of the existing AOSE methodologies focuses only on analysis, design, implementation and disregarded testing, stating that the testing can be done by extending the existing objectoriented testing techniques. Though objects and agents have some similarities, they both differ widely. Role is an important attribute of an agent that has a huge scope and support for the analysis, design and implementation of Multi-Agent System (MAS. The main objective of the paper is to extend the scope and support of role towards testing, thereby the vacancy for software testing perception in the AOSE series will be filled up. This paper presents an overview of role based testing based on the V-Model in order to add the next new component as of AgentOriented Software testing in the agent oriented development life cycle.
Mitrović, Dejan; Ivanović, Mirjana; Budimac, Zoran
Scala and its multi-threaded model based on actors represent an excellent framework for developing purely reactive agents. This paper presents an early research on extending Scala with declarative programming constructs, which would result in a new agent-oriented programming language suitable for developing more advanced, BDI agent architectures. The main advantage the new language over many other existing solutions for programming BDI agents is a natural and straightforward integration of imperative and declarative programming constructs, fitted under a single development framework.
With this book, Onn Shehory and Arnon Sturm, together with further contributors, introduce the reader to various facets of agent-oriented software engineering (AOSE). They provide a selected collection of state-of-the-art findings, which combines research from information systems, artificial intelligence, distributed systems and software engineering and covers essential development aspects of agent-based systems. The book chapters are organized into five parts. The first part introduces the AOSE domain in general, including introduction to agents and the peculiarities of software engineerin
Lin, Chia-En [University of North Texas; Kavi, Krishna M. [University of North Texas; Sheldon, Frederick T [ORNL; Daley, Kristopher M [ORNL; Abercrombie, Robert K [ORNL
Systems using software agents (or multi-agent systems, MAS) are becoming more popular within the development mainstream because, as the name suggests, an agent aims to handle tasks autonomously with intelligence. To benefit from autonomous control and reduced running costs, system functions are performed automatically. Agent-oriented considerations are being steadily accepted into the various software design paradigms. Agents may work alone, but most commonly, they cooperate toward achieving some application goal(s). MAS's are components in systems that are viewed as many individuals living in a society working together. From a SE perspective, solving a problem should encompass problem realization, requirements analysis, architecture design and implementation. These steps should be implemented within a life-cycle process including testing, verification, and reengineering to proving the built system is sound. In this paper, we explore the various applications of agent-based systems categorized into different application domains. A baseline is developed herein to help us focus on the core of agent concepts throughout the comparative study and to investigate both the object-oriented and agent-oriented techniques that are available for constructing agent-based systems. In each respect, we address the conceptual background associated with these methodologies and how available tools can be applied within specific domains.
Agent-oriented techniques represent a new means of analyzing,designing and building complex software systems.They have the potential to significantly improve current practice in software engineering.In this paper some important techniques and methods for analyzing,designing,specification,implementation,and verification are analyzed.The comparison of characteristics between agent-oriented engineering and object-oriented engineering are given.And the issues and research methods of agent-oriented engineering are discussed.
Agent concepts have been used in a number of recent approaches of requirement engineering (RE),such as KAOS (Knowledge acquisition in automated specification), i* and GBRAM (Goal-based requirements analysis method). And the modeling languages used in those approaches only permit precise and unambiguous modeling of system properties and behavior. However, some system problems, particularly those drawn from the agentoriented problem domain, may be difficult to model in crisp or precise terms. There are several reasons for this. On one hand, the lack of information may produce the uncertainty of the class to which an object belongs. If we have enough information or if we are considering sufficient attributes,we should be able to make a precise categorization. On the other hand, uncertainty may also arise from some natural imprecision in requirement describing itself, such as soft goal describing and uncertain concepts describing. In the second case, the classification into precise classes may be impossible, not because we do not have enough information, but because the classes themselves are not naturally discrete. In this paper, we start with a discussion of the uncertainty in agent-oriented requirement engineering. Then we propose to handle the uncertainty using fuzzy sets. Finally we refine this proposal to integrate a fuzzy version of Z with the KAOS method. This integration is illustrated on the example of the mine pump. In the conclusion part,we compare the advantages of our approach with those of the classical KAOS approach.
Traditional software engineering approaches and metaphors fall short when applied to areas of growing relevance such as electronic commerce, enterprise resource planning, and mobile computing: such areas, in fact, generally call for open architectures that may evolve dynamically over time so as to accommodate new components and meet new requirements. This is probably one of the main reasons that the agent metaphor and the agent-oriented paradigm are gaining momentum in these ar...
Thunem, Harald P-J; Thunem, Atoosa P-J; Lind, Morten
This paper demonstrates how a generic agent-oriented framework can be used in advanced automation environments, for systems analysis in general and supervision, diagnosis and prognosis purposes in particular. The framework’s background and main application areas are briefly described. Next, the......-oriented supervision, diagnosis and prognosis purposes are equally explained. Finally, the paper sums up by also addressing plans for further enhancement and in that respect integration with other tailor-made tools for joint treatment of various modeling and analysis activities upon advanced automation environments....
Full Text Available Agent-oriented techniques characterize an exciting new way of analyzing, designing and building complex software systems in real time world. These techniques have the prospective to significantly improve current practice in software engineering and to extend the range of applications that can feasibly be tackled. The Agent Oriented Programming & Software Engineering is being focused to design distributed software systems. The agent technology has been dominated to enhance software reusability and maintainability.Now more than 100 Agent toolkits for commercial & research purpose are available. Most of the toolkits are designed using Java language. Although use of agent toolkits makes programming more efficient, butthe security of code is not achieved. The security of the program code cannot be ignored. In this paper we discuss the approach of using jar file to enhance the security. The JAR files can be electronically signed & verified. The digital certificates can be used by the programmers. By using the jar file agent programcode can be more secure. In this paper we will discuss an approach to achieve the security of the code of agent programs. Now we will discuss how jar file are created & security is to be implemented.
Hinchey, Michael G. (Inventor); Penn, Joaquin (Inventor); Sterritt, Roy (Inventor)
Systems, methods and apparatus are provided through which in some embodiments, an agent-oriented specification modeled with MaCMAS, is analyzed, flaws in the agent-oriented specification modeled with MaCMAS are corrected, and an implementation is derived from the corrected agent-oriented specification. Described herein are systems, method and apparatus that produce fully (mathematically) tractable development of agent-oriented specification(s) modeled with methodology fragment for analyzing complex multiagent systems (MaCMAS) and policies for autonomic systems from requirements through to code generation. The systems, method and apparatus described herein are illustrated through an example showing how user formulated policies can be translated into a formal mode which can then be converted to code. The requirements-based programming systems, method and apparatus described herein may provide faster, higher quality development and maintenance of autonomic systems based on user formulation of policies.
To better describe the behaviors of single agent and the complex interactions between agents in MAS, a kind of model called Agent-Oriented Petri Nets(AOPN) was proposed by unifying the technology of agent and Petri Nets.An AOPN formalized definition was given first.And then by modeling interactions between buyer agent and seller agent based on on-line shopping, agent-oriented Petri nets modeling method was smdied and analyzed by using the Petri net modeling tool.The method solved the complex problem of system structure effectively and built the foundation for further application.%为了更好地刻画单个Asent的行为和多Asent间复杂、并行的动态交互,将面向Agent的设计思想与Petri网建模方法相结合,形成了一种面向Agent的Petri网(AOPN)模型.首先给出了面向Agent的Petri网的形式化定义,然后利用Petri网的建模工具,以网上购物背景下买卖双方简单交互为例,对基于面向Agent的Petri网模型的系统建模方法进行了研究和分析,有效地解决了系统结构复杂性的问题.
Järvinen, Hannu; Garcia Gasulla, Dario
Building Automation Systems typically consists of di erent types of devices interacting and sharing information with each other. Similarly, Multi-Agent Systems has focused on flexible mechanisms to coordinate networks of (usually distributed) autonomous computational entities. The integration of these two fields provides powerful solutions to complex problems. Such integration has often been attempted by using Web technologies, such as Web services. However, the lack of a common standa...
This paper introduces an agent-oriented methodology and modeling tools based on MAGE. The methodology supports analysis, desing and implimentation of multi-agent systems. The modeling tools assist the developer in building multi-agent systems using the methodology through a set of visual model editors.
The purpose of this paper is to give a short motivation for and an introduction to a novel approach of how to view and develop flexible open distributed systems of the future. We propose that the emerging style of Agent Oriented Sofnyare Engineering (AOSE) has high potentials as a candidate for future models of system development. We indicate in this paper some recent and upcoming applications of AO-SE. Furthermore, we round off the paper by giving an overview of an ongoing project within an ...
Information privacy has received much public and research interest in recent years. Globally this has arisen from public anxiety following the September 11 attacks and within Australia a progressive tightening of privacy legislation in particular the privacy amendment (private sector) Act of 2000 which became operative in 2001. This paper presents the results of a study into attitudes towards information privacy. Based on an instrument developed and validated by Smith et al (1996a) this st...
由于因特网具有良好的开放性和参与性以及丰富多彩的视频、音频效果,使得在Web站点上做广告的业务近年来得到了迅速发展.本文就因特网上的广告,利用网上能够实时获取瞬间在线加工信息的特点,给出了一个面向agent的广告实时在线决策的方法AAD(Agents-oriented Advertisement Decisions).AAD基于面向agent程序设计的思想,根据网络用户浏览广告概率特性以及网络用户有关的潜在个人专门信息,以及相应的规则应用专家系统技术分别构造概率知识库和模糊知识库,作为系统的Agent,并且利用专家系统的推理技术,完成广告的选择和决策.
Research in Knowledge Management (KM) has evolved substantially in the past 30 years, coming from a centralized view of KM processes to a distributed view, grounded in organizational and cognitive sciences studies that point out the social, distributed, and subjective nature of knowledge. However, KM systems still face considerable resistance, mainly because they generally impose a specific process instead of fitting in the current practices of the organization. This thesis defends a human-ce...
Roč. 5, č. 2 (2006), s. 430-433. ISSN 1109-2777 R&D Projects: GA MŠk 1M0567 Institutional research plan: CEZ:AV0Z10300504 Keywords : multi - agent system s * adaptive agent s * computational intelligence Subject RIV: IN - Informatics, Computer Science
Ashamalla, Amir Nabil; Beydoun, Ghassan; Low, Graham
There is more chance of a completed sale if the end customers and relationship managers are suitably matched. This in turn can reduce the number of calls made by a call centre reducing operational costs such as working time and phone bills. This chapter is part of ongoing research aimed at helping a CMC to make better use of its personnel and equipment while maximizing the value of the service it offers to its client companies and end customers. This is accomplished by ensuring the optimal use of resources with appropriate real-time scheduling and load balancing and matching the end customers to appropriate relationship managers. In a globalized market, this may mean taking into account the cultural environment of the customer, as well as the appropriate profile and/or skill of the relationship manager to communicate effectively with the end customer. The chapter evaluates the suitability of a MAS to a call management system and illustrates the requirement analysis phase using i* models.
David; Z; Zhang
The dynamic variations in demand patterns and produ ct mix, driven by unpredictable changes in a global market, are placing manufactur ing systems under significant pressure. In order to remain competitive, manu facturing organisations must satisfy demands timely. This implies that companies must increase product varieties, reduce time-to-market, shorten product-life cycles and at the same time maintain good quality and reduce investment costs. Conventional methodologies for planning and control have ...
There are unstructured abstracts (no more than 256 words) and structured abstracts (no more than 480). The specific requirements for structured abstracts are as follows:An informative, structured abstracts of no more than 4-80 words should accompany each manuscript. Abstracts for original contributions should be structured into the following sections. AIM (no more than 20 words): Only the purpose should be included. Please write the aim as the form of "To investigate/ study/..."; MATERIALS AND METHODS (no more than 140 words); RESULTS (no more than 294 words): You should present P values where appropnate and must provide relevant data to illustrate how they were obtained, e.g. 6.92 ± 3.86 vs 3.61 ± 1.67, P< 0.001; CONCLUSION (no more than 26 words).
Groh, Georg; Donaubauer, Andreas; Koster, Benjamin
We discuss in a compact way how the implicit relations between spatiotemporal relatedness of information items, spatiotemporal relatedness of users, social relatedness of users and semantic relatedness of information items may be exploited for an information retrieval architecture that operates along the lines of human ways of searching. The decentralized and agent oriented architecture mirrors emerging trends such as upcoming mobile and decentralized social networking as a new paradigm in social computing and is targetted to satisfy broader and more subtly interlinked information demands beyond immediate information needs which can be readily satisfied with current IR services. We briefly discuss why using spatio-temporal references as primary information criterion implicitly conserves other relations and is thus suitable for such an architecture. We finally shortly point to results from a large evaluation study using Wikipedia articles.
Full Text Available Information privacy has received much public and research interest in recent years. Globally this has arisen from public anxiety following the September 11 attacks and within Australia a progressive tightening of privacy legislation in particular the privacy amendment (private sector Act of 2000 which became operative in 2001. This paper presents the results of a study into attitudes towards information privacy. Based on an instrument developed and validated by Smith et al (1996a this study sets out to measure individual concerns regarding organisational use of information along four dimensions: collection, errors, unauthorised secondary use, and improper access. The survey was completed by 67 undergraduate and postgraduate students enrolled in an e-commerce security subject at the University of Queensland. Comparisons are drawn between the results of this study and an identical one carried out at the University of North Alabama. Whilst it is too early to draw conclusions about the impact of these attitudes on the success of e-commerce in general, the results should be of interest to those within universities seeking to expand the use of networking technologies for handling sensitive information such as enrolment and fee processing (Vanscoy & Oakleaf 2003
Karabach A. E.
Full Text Available Semantic technologies provide existence of a certain abstraction layer over available information to technologies which allows realizing communication of data, semantics and processes executed in distributed environment. Development of these technologies will allow creating the unified representation of SWS in a wide range of applications, to find precisely necessary information, to simplify intra firm integration and integration of network applications in distributed environment. The article defines the semantic specification SWS, the tools for creating ontological Web services (SWS and Web services (WS at the conceptual level, defined requirements and assets of services composition. The architecture of SWS of applications, assets for deployment and execution of SWS by coordination of a flow of operations, network agents is described. It also considers the role of agents in creation and implementation service - the oriented applications, and also distinction between services and agents. Furthermore, the system architecture of integration of SWS with use of a multiagentny flow of operations is shown in article. It inspects the interaction between service and process agents with web services and distributed resources. In the article we have highlighted the advantages of the standard workflow management, portability and interoperability, strict formalization of the process description workflow and versatility. Based on the process of service composition using agent-based approach we have presented the future model of adaptive service composition based on the interaction of agents considered and architecture of multi-agent coordination. Step through the process of presenting service using agent-oriented approach was emphasized. On the basis of the process of service composition using agent-based approach we have presented the structure of the future model of adaptive service composition. Process of representation of service with use the agent-oriented
Manuel KOLP; Adrien COYETTE; Stéphane FAULKNER
Agent architectures are gaining popularity for building open, distributed, and evolving software required by e-commerce applications. Unfortunately, despite considerable work in software architecture during the last decade, few research efforts have aimed at truly defining patterns and languages for agent architectural design. This paper proposes a modern approach based on organizational structures and architectural description languages to define and specify agent architectures notably in the case of e-commerce system design.
Pena, Joaquin; Rouff, Christopher; Hinchey, Mike; Ruiz-Cortes, Antonio
peer-reviewed The need to collect new data and perform new science is causing the complexity of NASA missions to continually increase. This complexity needs to be controlled via new technological advancements and balanced with a reduction in mission and operation costs. Planned and hypothesized missions involve self-management,biological-inspiration based on swarms, and autonomous operation as a means of achieving these goals.We consider a tailored software engineering approach to developi...
Hägg, Staffan; Ygge, Fredrik; Gustavsson, Rune; Ottosson, Hans
As computing systems are being applied to ever more demanding and complex domains, the infeasibility of constructing a single, monolithic problem solver becomes more apparent. Furthermore, important applications such as different types of management control systems for power generation and distribution are inherently distributed. A promising novel research direction to overcome complexity barriers in the design and maintenance of complex distributed applications is based on the view of such s...
Hägg, Staffan; Ygge, Fredrik
Distributed computing, where the underlying network is complex, heterogeneous and un-reliable, is hard to realize with traditional approaches. Energy Distribution Automation (DA), where the power line is used for communication, and the processing is highly distributed, is our application domain for assessments of new technologies for this kind of system. In this paper we propose a Multi-Agent approach with a large expected number of heavily distributed, medium grain agents. The concept of Age...
Full Text Available In this research paper we presented a model of multi-agent system based learning environment for physically impaired students. The learning system is modeled on the basis of both centralized as well as distributed multi-agent planning. The entire learning system keeps track of the type of impairment the student has and mode of interaction of the environment is set depending on the type of impairment(s. The system consists of agents which are developed using JADE agent technology that helps the students with disabilities to continue studies from their own places.
Full Text Available Virtual enterprise is a temporary organization consists of some independent enterprises, aiming to share technology, cost and other resource. It is predicted to be the most important business organizational patterns in the 21st century. To up speed the development of virtual enterprise, this paper presented a policy-based multi-agent management system to simulate the manipulation of virtual enterprise. Firstly, a hierarchical policy specification is proposed to control the behavior of agent. Secondly, the detection algorithms and resolution strategies are described for the conflicts that may be brought about by hierarchical policy. Thirdly, a policy admin tool to simplify the operations of policies is presented. Each enterprise registered in this tool is assigned an agent; policies made by enterprises are executed by agents correspondingly. Subdivision of application level and representation scope of policy leads to that policy-based mechanism not only provides good system control on autonomy agents, but also ensures the flexibility of agents; and gives the solution for policy conflicts at the same time. Finally, the main characteristics of this system are discussed by an example.
Bjerrum, Peter; Olsen, Kasper Nefer
Inform@ed space Sensorial Perception And Computer Enchancement - bidrag til Nordisk Arkitekturforskningsforenings IT-konference, AAA april 2001.......Inform@ed space Sensorial Perception And Computer Enchancement - bidrag til Nordisk Arkitekturforskningsforenings IT-konference, AAA april 2001....
Larsson, Magnus; Segerstéen, Solveig; Svensson, Cathrin
The article presents an empirical study of informal leadership in an international high-tech company. The empirical work consisted of qualitative observation and shadowing of managers in the company, and a total of 14 interviews. The transcribed fieldnotes and audio recordings of observations...... leaders on the basis of their possession of reliable knowledge in technical as well as organizational domains. The informal leaders engaged in interpretation and brokering of information and knowledge, as well as in mediating strategic values and priorities on both formal and informal arenas. Informal...... and interviews were analyzed thematically, resulting in three central themes: informality, information based authority, and information brokering. The general informal character of interactions at work included a network based information dissemination. In these networks, persons were percieved as informal...
Brinberg, Herbert R.
Addresses the question of why previous articles and studies on the value of information have failed to provide meaningful techniques for measuring that value. The discussion covers four principle causes for confusion surrounding the valuation of information and draws conclusions about the value added model of information. (seven references) (CLB)
Information Crisis discusses the scope and types of information available online and teaches readers how to critically assess it and analyze potentially dangerous information, especially when teachers, editors, or other information gatekeepers are not available to assess the information for them. Chapters and topics include:. The Internet as an information tool. Critical analysis. Legal issues, traps, and tricks. Protecting personal safety and identity. Types of online information.
The exponential growth of information resources creates new challenges for end-users. The correct information may be polluted by misinformation, disinformation, propaganda or incorrect information via the Internet and other media. This paper defines 'information pollution' as "the contamination of information by misinformation, disinformation, propaganda and incorrect information." The purpose of this paper is to present the methods of information pollution. It is concluded that it is sometim...
Vieira, R.; Moreira, A.; M. Wooldridge; Bordini, R. H.
Research on agent communication languages has typically taken the speech acts paradigm as its starting point. Despite their manifest attractions, speech-act models of communication have several serious disadvantages as a foundation for communication in artificial agent systems. In particular, it has proved to be extremely difficult to give a satisfactory semantics to speech-act based agent communication languages. In part, the problem is that speech-act semantics typically make reference to t...
Bordini, R H; Vieira, R; Wooldridge, M; 10.1613/jair.2221
Research on agent communication languages has typically taken the speech acts paradigm as its starting point. Despite their manifest attractions, speech-act models of communication have several serious disadvantages as a foundation for communication in artificial agent systems. In particular, it has proved to be extremely difficult to give a satisfactory semantics to speech-act based agent communication languages. In part, the problem is that speech-act semantics typically make reference to the "mental states" of agents (their beliefs, desires, and intentions), and there is in general no way to attribute such attitudes to arbitrary computational agents. In addition, agent programming languages have only had their semantics formalised for abstract, stand-alone versions, neglecting aspects such as communication primitives. With respect to communication, implemented agent programming languages have tended to be rather ad hoc. This paper addresses both of these problems, by giving semantics to speech-act based me...
Wu Xing; Yu Jun; Lou Peihuang; Tang Dunbing
This paper presents a control system design and development approach for a vision‐based automated guided vehicle (AGV) based on the multi‐agent system (MAS) methodology and embedded system resources. A three‐phase agent‐oriented design methodology Prometheus is used to analyse system functions, construct operation scenarios, define agent types and design the MAS coordination mechanism. The control system is then developed in an embedded implementation containing a digital signal processor (DS...
I call any subjects, connected with an information the informational objects. It is clear that information received from such informational object can be expressed by a text which is made of sentences. I call a set of sentences expressing information about some informational object recorder of this object. Some recorders systems form structures similar to clocks. The following results are obtained from the logical properties of a set of recorders: First, all such clocks have th...
Singhal, Monica; Olken, Benjamin A.
Informal payments are a frequently overlooked source of local public finance in developing countries. We use microdata from ten countries to establish stylized facts on the magnitude, form, and distributional implications of this "informal taxation." Informal taxation is widespread, particularly in rural areas, with substantial in-kind labor payments. The wealthy pay more, but pay less in percentage terms, and informal taxes are more regressive than formal taxes. Failing to include informal t...
Full Text Available Information management (IM is the collection and management of information from one or more sources and the distribution of that information to one or more audiences. Management means the organization of and control over the planning, structure and organization, controlling, processing, evaluating and reporting of information activities in order to meet client objectives and to enable corporate functions in the delivery of information. 'Information' here refers to all types of information of value, whether having their origin inside or outside the organization, including data resources, such as production data; records and files related, for example, to the personnel function; market research data; and competitive intelligence from a wide range of sources. Information management deals with the value, quality, ownership, use and security of information in the context of organizational performance.
Information is essential to all human activity, and information in electronic form both amplifies and augments human information interactions. This lecture surveys some of the different classical meanings of information, focuses on the ways that electronic technologies are affecting how we think about these senses of information, and introduces an emerging sense of information that has implications for how we work, play, and interact with others. The evolutions of computers and electronic networks and people's uses and adaptations of these tools manifesting a dynamic space called cyberspace. O
Wolfgang G. Stock
Full Text Available Contemporary and future cities are often labeled as "smart cities," "ubiquitous cities," "knowledge cities" and "creative cities." Informational urbanism includes all aspects of information and knowledge with regard to urban regions. "Informational city" is an umbrella term uniting the divergent trends of information-related city research. Informational urbanism is an interdisciplinary endeavor incorporating on the one side computer science and information science and on the other side urbanism, architecture, (city economics, and (city sociology. In our research project on informational cities, we visited more than 40 metropolises and smaller towns all over the world. In this paper, we sketch the theoretical background on a journey from Max Weber to the Internet of Things, introduce our research methods, and describe main results on characteristics of informational cities as prototypical cities of the emerging knowledge society.
Lin, Kiyam; Lin, SongLing
Despite the wide usage of the concept of information, we have yet to develop a unified scientific definition. Inspired by Shannon's and Boltzmann's work, by investigating information's role in various working processes, we recognised that information's primary function is to direct working processes, and found that the probability of successfully achieving any working goal is related with the amount of corresponding information. Furthermore, we deduced that the relationship between informatio...
As communication technologies change, so do libraries. Library instruction programs are now focused on teaching information literacy, a term that may just as well be referred to as information "literacies." The new media age involves information in a wide variety of mediums. Educators everywhere are realizing media's power to communicate and…
This dissertation introduces the concept of Information Integrity, which is the detection and possible correction of information manipulation by any intermediary node in a communication system. As networks continue to grow in complexity, information theoretic security has failed to keep pace. As a result many parties whom want to communicate,…
Yi, Zhao; Dewan, Maneesh; Zhan, Yiqiang
We describe Information Forests, an approach to classification that generalizes Random Forests by replacing the splitting criterion of non-leaf nodes from a discriminative one -- based on the entropy of the label distribution -- to a generative one -- based on maximizing the information divergence between the class-conditional distributions in the resulting partitions. The basic idea consists of deferring classification until a measure of "classification confidence" is sufficiently high, and instead breaking down the data so as to maximize this measure. In an alternative interpretation, Information Forests attempt to partition the data into subsets that are "as informative as possible" for the purpose of the task, which is to classify the data. Classification confidence, or informative content of the subsets, is quantified by the Information Divergence. Our approach relates to active learning, semi-supervised learning, mixed generative/discriminative learning.
Masatlioglu, Yusufcan; Rigolini, Jamele
Despite large deregulation efforts, informal economic activity still represents a large share of GDP in many developing countries. In this paper we look at incentives to reduce informal activity when capitalists in the formal sector regulate entry. We consider a dual economy with a formal sector employing educated workers and an informal sector with unskilled workers. We show that high costs of education make labor migration and profits in the formal sector an increasing function of its size....
Information circulars are published from time to time under the symbol INFCIRC/... for the purpose of bringing matters of general interest to the attention of all Members of the Agency. The present revision contains INFCIRCs published up to mid-August 1994. A complete numerical list of information circulars is reproduced with their titles in the Annex
The document summarizes the Information Circulars published by the IAEA for the purpose of bringing matters of general interest to the attention of all Members of the Agency. This revision contains INFCIRCs published up to mid-August 1992. A complete numerical lift of Information Circulars with their titles is reproduced in an Annex
The document summarizes the Information Circulars published by the IAEA for the purpose of bringing matters of general interest to the attention of all Member States. This revision contains INFCIRCs published up to the end of May 1999, grouped by field of activity. A complete list of information circulars in numerical order is given in an annex
The document summarizes the Information Circulars published by the IAEA for the purpose of bringing matters of general interest to the attention of all Member States. This revision contains INFCIRCs published up to February 1997, grouped by field of activity. A complete list of information circulars in numerical order is given in an annex
Information circulars are published from time to time under the symbol INFCIRC/... for the purpose of bringing matters of general interest to the attention of all Members of the Agency. The present revision contains INFCIRCs published up to the end of April 2002. A complete numerical list of information circulars is reproduced with their titles in the Annex
An information barrier (IB) consists of procedures and technology that prevent the release of sensitive information during a joint inspection of a sensitive nuclear item, and provides confidence that the measurement system into which it has been integrated functions exactly as designed and constructed. Work in the U.S. on radiation detection system information barriers dates back at least to 1990, even though the term is more recent. In January 1999, an Information Barrier Working Group (IBWG) was formed in the United States to help coordinate technical efforts related to information barrier research and development (R and D). This paper presents an overview of the efforts of this group, by its present and former Chairs, as well as recommendations for further information barrier R and D. Progress on the demonstration of monitoring systems containing IBs is also provided. From the U.S. IBWG perspective, the top-level functional requirements for the information barrier portion of an integrated radiation signature-information barrier inspection system are twofold: The host must be assured that its classified information is protected from disclosure to the inspecting party; and The inspecting party must be confident that the integrated inspection system measures, processes, and presents the radiation-signature-based measurement conclusion in an accurate and reproducible manner. It is the position in the United States that in the absence of any agreement to share classified nuclear weapons design information while implementing an inspection regime, the need to protect host country classified warhead design information is paramount and overrules the need to provide confidence to the inspecting party regarding the accuracy and reproducibility of the measurements. The U.S. IBWG has reached a consensus on several critical design elements that define a general standard for radiation signature information barrier design. Technical specialists from cooperating parties must be
Barnett, Stephen M
Quantum information- the subject- is a new and exciting area of science, which brings together physics, information theory, computer science and mathematics. "Quantum Information"- the book- is based on two successful lecture courses given to advanced undergraduate and beginning postgraduate students in physics. The intention is to introduce readers at this level to the fundamental, but offer rather simple, ideas behind ground-breaking developments including quantum cryptography,teleportation and quantum computing. The text is necessarily rather mathematical in style, but the mathema
During the reception of a piece of information, we are never passive. Depending on its origin and content, from our personal beliefs and convictions, we bestow upon this piece of information, spontaneously or after reflection, a certain amount of confidence. Too much confidence shows a degree of naivety, whereas an absolute lack of it condemns us as being paranoid. These two attitudes are symmetrically detrimental, not only to the proper perception of this information but also to its use. Beyond these two extremes, each person generally adopts an intermediate position when faced with the recep
... Here: Home → Copyright Information URL of this page: https://www.nlm.nih.gov/medlineplus/copyright.html Copyright ... the Magazine and NIH MedlinePlus Salud The FAQs ( https://www.nlm.nih.gov/medlineplus/faq/faq.html ) ...
ISSN print edition: 1672-1799 ISSN electronic edition: 1862-2844 Volume 51 (12 issues) will appear in 2008 Subscription rates For information on subscription rates please contact: Customer Service China: firstname.lastname@example.org North
ISSN print edition: 1006-9321 ISSN electronic edition: 1862-281X Volume 51 (12 issues) will appear in 2008 Subscription rates For information on subscription rates please contact: Customer Service China
ISSN print edition:1672-1799 ISSN electronic edition:1862-2844 Volume 51 (12 issues) will appear in 2008 Subscription rates For information on subscription rates please contact:Customer Service China:sales@scichina.
As a supplement to the information published on 27.05.2002, we inform you that the works foreseen in the building 504 will begin July 1st. The alterations become necessary force us to suspend the contomat service for a duration of one month. From July 1st the services of counter will be offered in the building 500. We ask you to excuse us for this interruption and thank you for your understanding. Your UBS
The document summarizes the information circulars published by the IAEA for the purpose of bringing matters of general interest to the attention of all Members of the Agency. In the main body of the document only those documents which are regarded as likely to be of current interest are listed. A complete numerical list of information circulars with their titles is reproduced in the Annex
Sharma, Manohar; Zeller, Manfred
In most developing countries, it is the private, informal markets that the rural poor have traditionally turned to service their financial needs. Why have these institutions succeeded in providing services to the poor when formal institutions have not? Do these informal institutions provide any lessons that bigger formal institutions could use? What are their basic limitations? Answers to such questions indicate important direc-tions for public policy.
This paper analyzes the problem of matching heterogeneous agents in a Bayesian learning model. One agent gives a noisy signal to another agent, who is responsible for learning. If production has a strong informational component, a phase of cross-matching occurs, so that agents of low knowledge catch up with those of higher one. It is shown that: (i) a greater informational component in production makes cross-matching more likely; (ii) as the new technology is mastered, pr...
The Information Engineering thrust area develops information technology to support the programmatic needs of Lawrence Livermore National Laboratory`s Engineering Directorate. Progress in five programmatic areas are described in separate reports contained herein. These are entitled Three-dimensional Object Creation, Manipulation, and Transport, Zephyr:A Secure Internet-Based Process to Streamline Engineering Procurements, Subcarrier Multiplexing: Optical Network Demonstrations, Parallel Optical Interconnect Technology Demonstration, and Intelligent Automation Architecture.
Full text: An information barrier (IB) consists of procedures and technology that prevent the release of sensitive information during a joint inspection of a sensitive nuclear item, and provides confidence that the measurement system into which it has been integrated functions exactly as designed and constructed. Work in the U.S. on radiation detection system information barriers dates back at least to 1990, even though the terminology is more recent. In January 1999 the Joint DoD-DOE Information Barrier Working Group was formed in the United States to help coordinate technical efforts related to information barrier R and D. This paper presents an overview of the efforts of this group, by its Chairs, as well as recommendations for further information barrier R and D. Progress on the demonstration of monitoring systems containing IBs is also provided. From the U.S. perspective, the basic, top-level functional requirements for the information barrier portion of an integrated radiation signature-information barrier inspection system are twofold: The host must be assured that his classified information is protected from disclosure to the inspecting party; and The inspecting party must be confident that the integrated inspection system measures, processes, and presents the radiation-signature-based measurement conclusion in an accurate and reproducible manner. It is the position of the United States that in the absence of any agreement to share classified nuclear weapons design information in the conduct of an inspection regime, the requirement to protect host country classified warhead design information is paramount and admits no tradeoff versus the confidence provided to the inspecting party in the accuracy and reproducibility of the measurements. The U.S. has reached an internal consensus on several critical design elements that define a general standard for radiation signature information barrier design. These criteria have stood the test of time under intense
Christiansen, Ellen Tove
The paper describes a pedagogical didactical paradigm for teaching student-designers how to deal with context issues. Form/context-relationships are conceptualized as information ecologies and described as behavioral settings using a key concept developed by social psychologist R.A. Baker in the...... 1960ties, and chosen here because it integrates cultural and psychological trajectories in a theory of living settings. The pedagogical-didactical paradigm comprises three distinct information ecologies, named after their intended outcome: the problem-setting, the exploration-setting, and the fit......-setting. It is specified how context issues can be treated within each of these information ecologies. The paper concludes by discussing the outcome of applying this paradigm with respect to the student-designers’ competence as reflective practitioners....
The document summarizes the Information Circulars published by the IAEA under the symbol INFCIRC/ for the purpose of bringing matters of general interest to the attention of all Members of the Agency. A complete list of INFCIRCs in numerical order with their titles is given in the Annex
Information circulars are published from time to time under the symbol INFCIRC/. for the purpose of bringing matters of general interest to the attention of all Members of the Agency. A list of the circulars that were current on 31 December 1964 is given, followed by an index to their subject matter.
McKay, Martin D.; Stout, J. David
Discusses access to Internet resources in school libraries, including the importance of evaluating content and appropriate use. The following online services that provide current factual information from legitimate resources are described: SIRS (Social Issues Resource Series), InfoTrac, EBSCO Host, SearchBank, and the Electric Library. (MES)
REBECA MEJÍA ARAUZ
[ES]La conferencia “Aprendizaje Informal” fue impartida el 20 de junio de 2016 en el MediaLab Prado de Madrid en el contexto de las VI Jornadas eMadrid “Unbundling Education”. El objetivo de esta charla es contextualizar el concepto de aprendizaje informal y su relación con las tecnologías educativas.
Training Information: TEFL in China Certificate Training Program, with job placement This intensive training program will prepare you as a native speaker of English to be qualified to teach oral English in China, even without previous teaching experience. Dates, venues and fees: Tuition:4,000 yuan
ISSN print edition:1006-9283 ISSN electronic edition:1862-2763 Volume 50(12 issues)will appear in 2007 Subscription rates For information on subscription rates please contact: Customer Service Chine:sales@ scichina.org North and South America: journals-ny @ springer.com Outside North and South America: email@example.com Orders and inquiries:
Bala, Piotr; Osińska, Veslava; Gawarkiewicz, Michał
This article presents the analytical and retrieval potential of visualization maps. Obtained maps were tested as information retrieval (IR) interface. The collection of documents derived from the ACM Digital Library was mapped on the sphere surface. Proposed approach uses nonlinear similarity of documents by comparing ascribed thematic categories and thereby development of semantic connections between them. For domain analysis the newest IT trend - Cloud ...
Capital Hotel Mid-Autumn Festival is a time for reunion with family and loved ones. Treat them to a special gift-Capital Hotel moon cakes. This year we present six types of moon cakes, including both traditional favorites and new specialties. Tasty delicacies in fine gift packing, Capital Hotel moon cakes are also an ideal choice for your business associates. For more information or orders, please contact us at 86-10-58159988 ext. 3401/3240.
Grand Hyatt Beijing Share irresistible moon cakes under the full moon of mid-autumn with friends and family. This year, savor traditional moon cakes prepared with the finest quality. Golden Moon Cake Hamper at 238 yuan consists of eight pieces made of red or white lotus paste, green tea and red been paste. Opening Hours: 7:00 a.m.-9:00 p.m. For more information, please call 010-85181234 ext. 6362
This bulletin contains information about activities of the Nuclear Regulatory Authority of the Slovak Republic. It consist of nine leaflets: (1) Role and responsibility of the Nuclear Regulatory Authority; (2) Principles of Good Regulation for the UJD; (3) Legislation; (4) Inspection and Assessment Activity of UJD in Nuclear Safety; (5) International relations and co-operation; (6) Regulation of radioactive waste management; (7) Regulation at nuclear fuel cycle; (8) Emergency planning and preparedness; (9) Public communications at the UJD
1. Questionnaire By Beijing Review and Chinajob.com Thanks for your close attention to our column. We very much appreciate your feedback, on which we depend to offer you the information you need and make this page valuable reading! 1. What are your usual channels for seeking jobs in China? 2. Do you prefer a full-time job or part-time job? 3. What is your preferred job: language teacher, professional in a company or manager?
Research on Lightning Monitoring System Based on the Geo-spatial Combined with the contemporary application of lightning monitoring, this paper aimed to analyze the structure, working principle, and functions of the Lightning Monitoring System based on the geo-spatial framework, which merged modern surveying and mapping of geographic information technologies, and also present the more ac- curate and more in-depth research about lightning disasters.
Schopper,H; Brianti; Picasso; Laporte,H
Le DG H.Schopper, secondé par certains de ses directeurs, informe sur les travaux et projets au Cern. Prennent la parole: M.Heine, directeur de l'administration M.Brianti, directeur technique M.Picasso, directeur du projet LEP M.Henri Laporte, l'adjoint de M.Picasso et chef des travaux de genie civil de Genève
[english] The focus of the current issue 3/2014 of GMS Medizin – Bibliothek – Information is the annual conference 2014 of the German Medical Libraries Association in Mannheim. The motto of the conference was “Medical libraries: Information”. The authors in this issue are Michaele Adam (Bibliometrics 2.0 – Altmetrics in Medicine), Bruno Bauer (Open access cooperation in Austria: Open Access Network Austria and Austria – recent developments since 2012), Fabian Gail & Ulrich Korwitz (Market an...
Levin, Leonid A.
Goedel Incompleteness Theorem leaves open a way around it, vaguely perceived for a long time but not clearly identified. (Thus, Goedel believed informal arguments can answer any math question.) Closing this loophole does not seem obvious and involves Kolmogorov complexity. (This is unrelated to, well studied before, complexity quantifications of the usual Goedel effects.) I consider extensions U of the universal partial recursive predicate (or, say, Peano Arithmetic). I prove that any U eithe...
Full Text Available [english] The focus of the current issue 3/2014 of GMS Medizin – Bibliothek – Information is the annual conference 2014 of the German Medical Libraries Association in Mannheim. The motto of the conference was “Medical libraries: Information”. The authors in this issue are Michaele Adam (Bibliometrics 2.0 – Altmetrics in Medicine, Bruno Bauer (Open access cooperation in Austria: Open Access Network Austria and Austria – recent developments since 2012, Fabian Gail & Ulrich Korwitz (Market and strategy – results of the ZB MED market study, Sabine Gehrlein (Library goes Anatomy: Anatomical teaching media at Heidelberg University Library, Kaja Scheliga (Opening science: New publication forms in science, Ulrike Ostrzinski (The four types of social media user in the academic and research community. Results of a nationwide study, Sandra Pfob & Alena Ittner (First aid for library use on PC: webinars increase library visits, reach everyone, save costs, Simone Waldboth (Integration of e-learning in the lecture “Information Literacy” at the Provincial College for Health-Care Professions Claudiana, Maike Piegler (The pick up box of the library of the Hamburg medical association – a way to bring scientific information to medical specialists and Christoph Wehrmüller & Heidrun Janka (Medical : Information – Annual meeting 2014 of the German MLA, September 22 to 24 in Mannheim.Furthermore this focus issue features articles from Bruno Bauer (: transformation strategies for subscription-based journaleport on the 8 Open Access Days at Cologne, September 8–9 2014, Eike Hentschel (German MLA News; Pioneer projects in medical libraries 2014: Introduction of the winners; Pioneer projects in medical libraries 2015 – Announcement and Franz J. Kühnen (Klaus Gerber 1934–2014.
Information circulars are published from time to time under the symbol INFCIRC/. . . . for the purpose of bringing matters of general interest to the attention of all Members of the Agency. A list of the circulars which were of current interest on 15 January 1969 is given below, followed by an index to their subject matter. Other circulars can be traced by reference to earlier issues of the present document.
Rogers, William H.
Information demand is defined in terms of both information content (what information) and form (when, how, and where it is needed). Providing the information richness required for flight crews to be informed without overwhelming their information processing capabilities will require a great deal of automated intelligence. It is seen that the essence of this intelligence is comprehending and capturing the demand for information.
See more at www.chinajob.com Teaching Vacancies: Capital University of Economics & Business is looking for for eign teachers with teaching experience. Offer package: 4,000 yuan per month, free accommodation and airfare. For more information, please contact cuebwsb@ 263.net.cn and visit www.cueb.edu.cn Huijia Kindergarten Beijing is looking for kindergarten ESL teachers. Salary is 4,000-6,000 yuan per month. Contact: shin-ingcj1981 @ hotmail.com Website: www.hjkids.com
Full Text Available The area of image processing has made rapid strides because of enormous applications it has in different fields. This growth can also be attributed to the increasing use of fuzzy logic in all tasks of image processing as the fuzzy logic facilitates the representation of inherent uncertainty in the image information which can be local or global. For problems like enhancement global information is of interest whereas the local information is needed for the problems of edge detection, segmentation, and recognition. However we need both for the noise removal. The images are of varied types: Medical images (CT scans, MR, X-rays, ECG, etc., satellite images, natural scenes, videos, games, multimedia, biometrics, industrial, astronomical so on and so forth. The approaches to tackle different images have to be different. For example skin texture can’t represented by a colour model.Defence Science Journal, 2011, 61(5, pp.405-407, DOI:http://dx.doi.org/10.14429/dsj.61.1192
Seiders, Barbara; McQuerry, Dennis; Ferryman, Thomas A.; Whitney, Paul D.; Rybka, Anthony
Biological weapons are within reach of individuals, small groups, terrorist organizations, as well as nations. With pervasive integration of civilian and military populations worldwide, the ill winds of biological warfare stand to affect military troops and civilians alike. A variety of technologies are emerging - such as pathogen detection devices, streaming internet characterization tools, information exploitation techniques, automated feature extraction, and ubiquitous wireless communication - that can help. These technologies, if taken together within an integrated analytical framework, could make possible the monitoring of diverse parameters that may indicate a change in the state of health of a given population - either the emergence of a naturally occurring disease or the outbreak of a disease as a result of hostile intent. This presentation will discuss the application of new information surveillance tools and technologies as they apply to health and disease monitoring, particularly within the context of potential terrorist or hostile nation use of biological warfare. Although discussed within the specific context of health surveillance, the tools and processes described here are generally applicable within other domains of subject matter expertise.
There is more to information than a string of ones and zeroes the ability of ''quantum bits'' to be in two states at the same time could revolutionize information technology. In the mid-1930s two influential but seemingly unrelated papers were published. In 1935 Einstein, Podolsky and Rosen proposed the famous EPR paradox that has come to symbolize the mysteries of quantum mechanics. Two years later, Alan Turing introduced the universal Turing machine in an enigmatically titled paper, On computable numbers, and laid the foundations of the computer industry one of the biggest industries in the world today. Although quantum physics is essential to understand the operation of transistors and other solid-state devices in computers, computation itself has remained a resolutely classical process. Indeed it seems only natural that computation and quantum theory should be kept as far apart as possible surely the uncertainty associated with quantum theory is anathema to the reliability expected from computers? Wrong. In 1985 David Deutsch introduced the universal quantum computer and showed that quantum theory can actually allow computers to do more rather than less. The ability of particles to be in a superposition of more than one quantum state naturally introduces a form of parallelism that can, in principle, perform some traditional computing tasks faster than is possible with classical computers. Moreover, quantum computers are capable of other tasks that are not conceivable with their classical counterparts. Similar breakthroughs in cryptography and communication followed. (author)
Steam Locomotive Tour Tiefa Coal Industry Group Corp. Ltd. is headquartered in Tieling City, Liaoning Province. At present, the group has 21 steam locomotives and all of them can still be operated. Since 2000, the group has held four steam iocomotive-themed tourist festivals, and has built a special website for steam locomotive tours, an exhibition hall and several special tourist railways, becoming China and the world’s only tourist attraction with operational steam locomotives. In recent years, the tourist attraction has received tourist groups from dozens of countries, including Britain, the United States, France, Japan and Australia, and many domestic tourists, being honored with a "floating steam locomotive museum." Visit http://www.steam-locomotive.cn/ for more information.
Stoecker, Nora Kathleen
A Systems Analysis Group has existed at Sandia National Laboratories since at least the mid-1950s. Much of the groups work output (reports, briefing documents, and other materials) has been retained, along with large numbers of related documents. Over time the collection has grown to hundreds of thousands of unstructured documents in many formats contained in one or more of several different shared drives or SharePoint sites, with perhaps five percent of the collection still existing in print format. This presents a challenge. How can the group effectively find, manage, and build on information contained somewhere within such a large set of unstructured documents? In response, a project was initiated to identify tools that would be able to meet this challenge. This report documents the results found and recommendations made as of August 2013.
As nuclear materials and technologies spread, the global community needs to be ever more vigilant to prevent their acquisition by those that have no legitimate reason to access or use them. International efforts to strengthen nuclear security measures gained momentum when, in 2009, President Obama announced his intention to convene for the first time an international Nuclear Security Summit. Held in Washington in 2010, the Summit was attended by 47 Heads of State who collectively committed to securing all vulnerable nuclear material within four years. Two years later, 53 Heads of State came together at a second Summit in Seoul and agreed a set of concrete actions to deliver on this ambition. The Summit process has functioned not only as a catalyst to move nuclear security up States’ political consciousness, but also as a platform for broadening their perspective on this agenda. Specifically, the last three years have seen the international community increasingly recognise the fundamental need for nuclear security regimes to protect not only nuclear material and physical assets from non-state actors, but also the information needed to obtain and use these goods for nefarious purposes
... ODPHP National Health Information Center National Health Information Center The National Health Information Center (NHIC) is sponsored ... interest View the NHO calendar . Federal Health Information Centers and Clearinghouses Federal Health Information Centers and Clearinghouses ...
The general theory of information (GTI) is a synthetic approach, which reveals the essence of information, organizing and encompassing all main directions in information theory. On the methodological level, it is formulated as system of principles explaining what information is and how to measure information. The goal of this paper is the further development of a mathematical stratum of the general theory of information based on category theory. Abstract categories allow us to construct flexi...
In this paper we present an approach for the enforcement of privacy in distributed active object systems, illustrate its implementation in the language ASPfun, and formally prove privacy based on information flow security.
José M. Canino-Rodríguez
Full Text Available The limited efficiency of current air traffic systems will require a next-generation of Smart Air Traffic System (SATS that relies on current technological advances. This challenge means a transition toward a new navigation and air-traffic procedures paradigm, where pilots and air traffic controllers perform and coordinate their activities according to new roles and technological supports. The design of new Human-Computer Interactions (HCI for performing these activities is a key element of SATS. However efforts for developing such tools need to be inspired on a parallel characterization of hypothetical air traffic scenarios compatible with current ones. This paper is focused on airborne HCI into SATS where cockpit inputs came from aircraft navigation systems, surrounding traffic situation, controllers’ indications, etc. So the HCI is intended to enhance situation awareness and decision-making through pilot cockpit. This work approach considers SATS as a system distributed on a large-scale with uncertainty in a dynamic environment. Therefore, a multi-agent systems based approach is well suited for modeling such an environment. We demonstrate that current methodologies for designing multi-agent systems are a useful tool to characterize HCI. We specifically illustrate how the selected methodological approach provides enough guidelines to obtain a cockpit HCI design that complies with future SATS specifications.
Ergonomics are an essential safety factor in controlling automated processes. It has to be taken into account in three stages: information presentation, information perception and information treatment
Information has two aspects. One aspect is the objective one; another aspect is the subjective one. Shannon has discussed the objective aspect of information in information theory. But the subjective aspect of information has not been fully discussed. Someone use "Bayesian approaches" to evaluate the value of information. But in some cases it does not meet the information user's need. This paper is focus on the subjective aspect of objectively measurable information and gives formal definitions for information, information utility, and marginal information utility, normalized calculation of information utility. The information discussed in the paper has interdisciplinary nature. This work can be the foundation of many application areas.
Ganuza, Juan José; Jansen, Jos
By using general information structures and precision criteria based on the dispersion of conditional expectations, we study how oligopolists’ information acquisition decisions may change the effects of information sharing on the consumer surplus. Sharing information about individual cost paramet...
In this paper, the original Japanese idea of "advanced information society" was reviewed at the first step. Thus, advancement of information/communication technology, advancement of information/communication needs and tendency of industrialization of information" were examined. Next, by comparing studies on advanced information society in various countries, the Japanese characteristics of consensus building was reviewed. Finally, in pursuit of prospect and tasks for the society, advancement of innovation and convergence information/communication technology, information/communication needs, institutional environment for utilization of information/communication and countermeasures against information pollution. Matching of information/communication technology and needs, besides with countermeasures against information pollution were discussed.
In pattern recognition, learning, and data mining one obtains information from information-carrying objects. This involves an objective definition of the information in a single object, the information to go from one object to another object in a pair of objects, the information to go from one object to any other object in a multiple of objects, and the shared information between objects. This is called "information distance." We survey a selection of new developments in information distance.
Marinescu, Dan C
A new discipline, Quantum Information Science, has emerged in the last two decades of the twentieth century at the intersection of Physics, Mathematics, and Computer Science. Quantum Information Processing is an application of Quantum Information Science which covers the transformation, storage, and transmission of quantum information; it represents a revolutionary approach to information processing. This book covers topics in quantum computing, quantum information theory, and quantum error correction, three important areas of quantum information processing. Quantum information theory an
Full Text Available The work of managers in small and medium-sized enterprises is very information-intensive and the environment in which it is done is very information rich. But are managers able to exploit the wealth of information which surrounds them? And how can information be managed in organisations so that its potential for improving business performance and enhancing the competitiveness of these enterprises can be realised? Answers to these questions lie in clarifying the context of the practice of information management by exploring aspects of organisations and managerial work and in exploring the nature of information at the level of the organisation and the individual manager. From these answers it is possible to suggest some guidelines for managing the integration of business strategy and information, the adoption of a broadly-based definition of information and the development of information capabilities.
Dahl, Katja; Kesmodel, Ulrik; Hvidman, Lone;
Prenatal care has gradually moved away from paternalism, to a state where patient autonomy and information is vital. It is known from other health care settings that the way information is presented affects understanding.The objective is to summarize current knowledge on aspects of informing...... pregnant women about prenatal examinations. Women's knowledge, decisional conflict, satisfaction and anxiety will be explored as compared with different ways and different groups of health professionals providing information. To what extent information empowers informed decision making will be explored as......, individual sessions and by way of written materials. None of the interventions leads to a raise in anxiety scores or influence up-take rates. Satisfaction with information provided is found unrelated to level of knowledge, but associated with having expectations for information met. Information does not seem...
different underlying concepts: Information Management1: information management at institutional level. Information Management2: content-oriented information management, rooted in information science and Information Management3: technology-oriented information management, rooted in information systems...
Hansen, Lone Koefoed; Pedersen, Peter Dalsgård; Eriksson, Eva
This paper introduces information offload as a supplement way of responding to and designing for information. By presenting iFlush, a design concept aiming at providing the user with a possibility to offload information and then instantly dispose of it, the paper presents an approach towards...... designing for reflection and also serves as a critique towards information overload. Furthermore, the absence of reflection on the role played by HCI community in the constant augmenting of all spaces is addressed....
田范江; 李丛蓉; 王鼎兴
Information filtering (IF) systems are important for personalized information service. However, most current IF systems suffer from low quality and long training time. In this paper, a refined evolving information filtering method is presented. This method describes user's information need from multi-aspects and improves filtering quality through a process like natural selection. Experimental result shows this method can shorten training time, improve filtering quality, and reduce the relevance between filtering results and training sequence.
In this Information system age many organizations consider information system as their weapon to compete or gain competitive advantage or give the best services for non profit organizations. Game Information System as combining Information System and game is breakthrough to achieve organizations' performance. The Game Information System will run the Information System with game and how game can be implemented to run the Information System. Game is not only for fun and entertainment, but will ...
Disciplinary Foundations and Global ImpactEvolving Discipline of Information Systems Heikki TopiDiscipline of Information Technology Barry M. Lunt and Han ReichgeltInformation Systems as a Practical Discipline Juhani IivariInformation Technology Han Reichgelt, Joseph J. Ekstrom, Art Gowan, and Barry M. LuntSociotechnical Approaches to the Study of Information Systems Steve Sawyer and Mohammad Hossein JarrahiIT and Global Development Erkki SutinenUsing ICT for Development, Societal Transformation, and Beyond Sherif KamelTechnical Foundations of Data and Database ManagementData Models Avi Silber
A Transportation Technology Center (TTC) has been established at Sandia to address the transportation of nuclear waste and spent fuel. The Technology Information Center (TIC) acts as TTC's clearing house for nuclear material transportation information. TIC's activities are divided into three activities: public information, policy information, and technical information. Some of the uses of TIC's activities are briefly outlined
Deruchie, Douglas M.
Discusses the value of information-based services in today's global economy. The combination of information technology with library and information services at an international accounting and auditing firm is described; the Global Information Network is explained; and the importance of the appropriate use of information is discussed. (LRW)
Hirsch, Michael J; Murphey, Robert
Our understanding of information and information dynamics has outgrown classical information theory. This book presents the research explaining the importance of information in the evolution of a distributed or networked system. It presents techniques for measuring the value or significance of information within the context of a system
Full Text Available The paper brings an overview of information visualization field, concentrating on its application to information retrieval systems. It presents the basis of information visualization and the reasons that implicate the use of visualization in information retrieval systems. It also discusses the selection of the right visualization technique and portrays some examples of visualization. Special attention is given to evaluation problems and results of information retrieval visualizations that were made so far. Even though studies have not proved information retrieval to be more successful with the use of visualization, it seems that researchers still believe in the power and the advantages of visualization and continue to look for a technique that would prove that. The authors conclude that with the changes on the web and the progress made in information retrieval systems, the time for visualization that would live up to its expectations might only be coming.
... Other Sites: Genetic and Rare Diseases Information Center Financial Assistance Information The National Institutes of Health (NIH) ... area call 900-638-0742. Top of page Financial Aid for Medical Treatments Information on financial aid ...
The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the Information Protection Playbook, security and information technology (IT) managers will learn how to
Background. The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in 'Bookmarks' and 'Favourites'. Argument. It is suggested that personal information collections are created in anticipation of some future need for that information-personal, anticipated information need, which also underlies the design of formal information systems. ...
Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu
Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...
Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles
The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the public. The Energy Information Sheets was developed to provide general information on various aspects of fuel production, prices, consumption, and capability. Additional information on related subject matter can be found in other Energy Information Administration (EIA) publications as referenced at the end of each sheet.
... AAOS Orthopaedic Disclosure Program Position Statements Information Statements Ethics Resources Resolutions Patient, Public & Media Information OrthoInfo Patient Education Newsroom/Media Resources Find ...
National Aeronautics and Space Administration — Updated November 2, 2011 Contains summary information and analysis condition details for the Aeroelastic Prediction Workshop Information plotted in this package is...
Department of Transportation — The Aeronautical Information System (AIS) is a leased weather automated system that provides a means of collecting and distributing aeronautical weather information...
Since common ground is pivotal to collaboration, this paper proposes to define collaborative information seeking as the combined activity of information seeking and collaborative grounding. While information-seeking activities are necessary for collaborating actors to acquire new information, the...... activities involved in information seeking are often performed by varying subgroups of actors. Consequently, collaborative grounding is necessary to share information among collaborating actors and, thereby, establish and maintain the common ground necessary for their collaborative work. By focusing on the...... collaborative level, collaborative information seeking aims to avoid both individual reductionism and group reductionism, while at the same time recognizing that only some information and understanding need be shared....
Starting from the discrepancy between the assessment of information in French public transport systems and customer-users expectations, this article will demonstrate that new information and communication technologies (NITCS) can contribute to fill in specific gaps. Some potential areas for technological research will be explored. NITCS as such cannot solve all of the complexities of passenger information; hence some prerequisites will become necessary, such as exchanges between all the parti...
This paper is a continuation of my previous work on informational confidence. The main idea of this technique is to normalize confidence values from different sources in such a way that they match their informational content determined by their performance in an application domain. This reduces classifier combination to a simple integration of information. The proposed method has shown good results in handwriting recognition and other applications involving classifier combination. In the pres...
Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu
The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.
Bonnet, François; Venkatesh, Sudhir
International audience Informal economic activity is a significant part of world production and distribution. This chapter reviews different core definitions (informal economic activities versus informal sector), different historical instances of "the" informal economy (in the Third World, under Communism and in contemporary Western cities), and different theoretical approaches (the dualist or development perspective, the legalist or neoliberal perspective, the structuralist or neomarxist ...
Boyd, T.; Rafferty, K. [editors
This package of information is intended to provide background to developers of geothermal aquaculture projects. The material is divided into eight sections and includes information on market and price information for typical species, aquaculture water quality issues, typical species culture information, pond heat loss calculations, an aquaculture glossary, regional and university aquaculture offices and state aquaculture permit requirements.
Main object of this thesis is design information system for warehouse management for Fi & Ho Trading Company, which will be accessible through web. Warehouse will be based on portal technology and connected with E-shop. In this thesis will be described elements of information system, resources used for realization, processes coverage by information system and complex evaluation of this information system.
This article overviews what community information means and its implications on the role of a library and information centre. No single institution can meet the general information requirements of any given community. It attempts to examine how .a cooperative venture of interagency network can lead to an effective community information service suitable for the local population.
Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.
Are we at a turning point in digital information? The expansion of the internet is unprecedented. Will information science become part of computer science and does rise of the term informatics demonstrate convergence of information science and information technology - a convergence that must surely develop? This work reflects on such issues.
The article discusses selected problems in methodology of designing comprehensive information systems. Main emphasis has been laid on modelling of information systems for companies. Presentation of bases for construction of models and description of their main types provides a basis allowing the author to draw conclusions concerning their application. Modelling of information systems is treated as one of stages in designing information systems.
Johnson-Throop, Kathy A.; Joe, John C.; Follansbee, Nicole M.
This viewgraph presentation gives an overview of the Mission Medical Information System (MMIS). The topics include: 1) What is MMIS?; 2) MMIS Goals; 3) Terrestrial Health Information Technology Vision; 4) NASA Health Information Technology Needs; 5) Mission Medical Information System Components; 6) Electronic Medical Record; 7) Longitudinal Study of Astronaut Health (LSAH); 8) Methods; and 9) Data Submission Agreement (example).
Davies, Philip H. J.
Addresses the use of information technology for intelligence and information warfare in the context of national security and reviews the status of clandestine collection. Discusses hacking, human agent collection, signal interception, covert action, counterintelligence and security, and communications between intelligence producers and consumers…
Full Text Available Companies have always been very carefully managed money, raw materials, machines and human resources. Today, they recognize the growing importance of the fifth big resource: information. They have finally understood that the within the global market with increased competition, using modern methods for planning, coordination and control, a company can-not function without acknowledging information and communications technology progress.
SHEN ChangXiang; ZHANG HuangGuo; FENG DengGuo; CAO ZhenFu; HUANG JiWu
The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of jnformation security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.
Stock, Wolfgang G
Dealing with information is one of the vital skills in thetwenty-first century. It takes a fair degree of information savvy to create, represent and supply information as well as to search for and retrieve relevant knowledge. This Handbook is a basic work of information science, providing a comprehensive overview of the current state of information retrieval and knowledge representation. It addresses readers from all professions and scientific disciplines, but particularly scholars, practitioners and students of Information Science, Library Science, Computer Science, Information Management, an
... Forest Service Information Collection; Financial Information Security Request Form AGENCY: Forest Service... extension with revision of a currently approved information collection, Financial Information Security... Time, Monday through Friday. SUPPLEMENTARY INFORMATION: Title: Financial Information Security...
In order to evaluate Floridi's philosophy of information (PI) and correlative information ethics (IE) as potential frameworks for a global information and computing ethics (ICE), I review a range of important criticisms, defenses, and extensions of PI and IE, along with Floridi's responses to these......, as gathered together in a recent special issue of Ethics and Information Technology. A revised and expanded version of PI and IE emerges here, one that brings to the foreground PI's status as a philosophical naturalism—one with both current application and important potential in the specific domains...... of privacy and information law. Further, the pluralism already articulated by Floridi in his PI is now more explicitly coupled with an ethical pluralism in IE that will be enhanced through IE's further incorporation of discourse ethics. In this form, PI and IE emerge as still more robust frameworks...
The aim of information lifecycle management is to develop a cost‐effective strategy for maintaining information assets, balancing the cost of maintaining information against business value. This paper contributes to development of theoretical information value based on a classification scheme that does not consider operational factors (e.g., storage, access). It concentrates on valuing information in terms of its type, organizational level and the extent of its effects. An informatio...
Cosmin Bonchis; Cornel Izbasa; Gabriel Ciobanu
Starting from Shannon theory of information, we present the case of producing information in the form of multisets, and encoding information using multisets. We compute the entropy of a multiset information source by constructing an equientropic string source (with interdependent symbols), and we compare this with a string information source with independent symbols. We then study the encoder and channel part of the system, obtaining some results about multiset encoding length ...
Boyd, T.; Rafferty, K.
This package of information is intended to provide background information to developers of geothermal aquaculture projects. The material is divided into eight sections and includes information on market and price information for typical species, aquaculture water quality issues, typical species culture information, pond heat loss calculations, an aquaculture glossary, regional and university aquaculture offices and state aquaculture permit requirements. A bibliography containing 68 references is also included.
Abstract: We propose here to clarify some of the relations existing between information and meaning by showing how meaningful information can be generated by a system submitted to a constraint. We build up definitions and properties for meaningful information, a meaning generator system and the domain of efficiency of a meaning (to cover cases of meaningful information transmission). Basic notions of information processing are used.
There are (at least) three approaches to quantifying information. The first, algorithmic information or Kolmogorov complexity, takes events as strings and, given a universal Turing machine, quantifies the information content of a string as the length of the shortest program producing it. The second, Shannon information, takes events as belonging to ensembles and quantifies the information resulting from observing the given event in terms of the number of alternate events that have been ruled ...
Dube, Kudakwashe; Shoniregun, Charles A
The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu
U.S. Geological Survey
The Geographic Names Information System (GNIS) is an automated data system developed by the U.S. Geological Survey (USGS) to standardize and disseminate information on geographic names. GNIS provides primary information for all known places, features, and areas in the United States identified by a proper name. The information in the system can be manipulated to meet varied needs. You can incorporate information from GNIS into your own data base for special applications.
Information Technology: Made Simple covers the full range of information technology topics, including more traditional subjects such as programming languages, data processing, and systems analysis. The book discusses information revolution, including topics about microchips, information processing operations, analog and digital systems, information processing system, and systems analysis. The text also describes computers, computer hardware, microprocessors, and microcomputers. The peripheral devices connected to the central processing unit; the main types of system software; application soft
S. Flowerday; R. von Solms
This research focused on what constitutes information integrity as this is a problem facing companies today. Moreover, information integrity is a pillar of information security and is required in order to have a sound security management programme. However, it is acknowledged that 100% information integrity is not currently achievable due to various limitations and therefore the auditing concept of reasonable assurance is adopted. This is in line with the concept that 100% information securit...
S. Flowerday; R. von Solms
This research focused on what constitutes information integrity as this is a problem facing companies today. Moreover, information integrity is a pillar of information security and is required in order to have a sound security management programme. However, it is acknowledged that 100% information integrity is not currently achievable due to various limitations and therefore the auditing concept of reasonable assurance is adopted. This is in line with the concept that 100% information securit...
The main purpose of the thesis was to present different areas of information security controls based on the international information security standard ISO 27001. The thesis also describes the methods of risk analysis and how to establish, implement, maintain and improve information security system in organizations. Most of the material was collected from books and various online resources. Some information was taken also from the teaching materials of the information security course. ...
Despite the fact that more money is spent annually on information technology, very few firms have found competitive advantage through the use of information technology. Information technology is seen as a backoffice function that is used for administrative functions and not as a key business enabler. Information technology will not only aid the business in surviving, but can be a strategic component to providing competitive advantage to the business, provided that the information technology f...
This is an ongoing review on the idea that the phase space information loss at causal horizons is the key ingredient of major physical laws. Assuming that information is fundamental and the information propagates with finite velocity, one can find that basic physical laws such as Newton's second law and Einstein's equation simply describe the energy-information relation (dE=TdS) for matter or space time crossing causal horizons. Quantum mechanics is related to the phase space information loss...
Evolutionary information theory is a constructive approach that studies information in the context of evolutionary processes, which are ubiquitous in nature and society. In this paper, we develop foundations of evolutionary information theory, building several measures of evolutionary information and obtaining their properties. These measures are based on mathematical models of evolutionary computations, machines and automata. To measure evolutionary information in an invariant form, we const...
Full Text Available Digital information changes the ways in which people and organisations interact. This paper examines the nature of this change in the context of the author’s Model for Information (MfI. It investigates the relationship between outcomes and value, selection processes and some attributes of information and explores how this relationship changes in the move from analogue to digital information. Selection processes shape the evolution of information ecosystems in which conventions are established for the ways in which information is used. The conventions determine norms for information friction and information quality as well as the sources of information and channels used. Digital information reduces information friction, often dramatically, and changes information quality. The increasing use of analytics in business increasingly delivers predictive or prescriptive digital information. These changes are happening faster than information ecosystem conventions can change. The relationships established in the paper enable an analysis of, and guide changes to, these conventions enabling a more effective use of digital information.
Schneider, T D
How do genetic systems gain information by evolutionary processes? Answering this question precisely requires a robust, quantitative measure of information. Fortunately, 50 years ago Claude Shannon defined information as a decrease in the uncertainty of a receiver. For molecular systems, uncertainty is closely related to entropy and hence has clear connections to the Second Law of Thermodynamics. These aspects of information theory have allowed the development of a straightforward and practical method of measuring information in genetic control systems. Here this method is used to observe information gain in the binding sites for an artificial 'protein' in a computer simulation of evolution. The simulation begins with zero information and, as in naturally occurring genetic systems, the information measured in the fully evolved binding sites is close to that needed to locate the sites in the genome. The transition is rapid, demonstrating that information gain can occur by punctuated equilibrium. PMID:10908337
SHIBKO O. N.
Full Text Available Problem statement. Modern information technology is developing in a globalized economy, the formation of a common information space and as a result, changes relation to the information of participants of market relations. New conditions lead to an increase in the number of parties involved in the creation and use of information, to the increase of the volume of information and the frequency of its use, making the actual task of the operational management of the activity of the staff of the various organizations. Information support includes normative and reference data; the necessary classificatory of technical and economic information; arrays of data needed to solve problems; standardized documents. The main purpose of providing information is timely to give management system, accurate information in particular, decision-makers, necessary and sufficient for making optimal or near-management decisions. Purpose of the article: to study and to improve methods of the design of information support (IS and of implemented solutions for the objects, the arrangement and forms of organization of the information circulating in the automated control system when it is functioning as an object of a certain structure. Conclusion. Thus, the choice of a method of designing information support determines by the necessity of the development of the mathematical apparatus, providing the formal means of work with information resources. The mathematical apparatus and methods should provide the formulated tasks of designing information support.
Full Text Available Evolutionary information theory is a constructive approach that studies information in the context of evolutionary processes, which are ubiquitous in nature and society. In this paper, we develop foundations of evolutionary information theory, building several measures of evolutionary information and obtaining their properties. These measures are based on mathematical models of evolutionary computations, machines and automata. To measure evolutionary information in an invariant form, we construct and study universal evolutionary machines and automata, which form the base for evolutionary information theory. The first class of measures introduced and studied in this paper is evolutionary information size of symbolic objects relative to classes of automata or machines. In particular, it is proved that there is an invariant and optimal evolutionary information size relative to different classes of evolutionary machines. As a rule, different classes of algorithms or automata determine different information size for the same object. The more powerful classes of algorithms or automata decrease the information size of an object in comparison with the information size of an object relative to weaker4 classes of algorithms or machines. The second class of measures for evolutionary information in symbolic objects is studied by introduction of the quantity of evolutionary information about symbolic objects relative to a class of automata or machines. To give an example of applications, we briefly describe a possibility of modeling physical evolution with evolutionary machines to demonstrate applicability of evolutionary information theory to all material processes. At the end of the paper, directions for future research are suggested.
Aureo de Paula; Scheinkman, Jose A.
This paper investigates the determinants of informal economic activity. We present two equilibrium models of informality and test their implications using a survey of 48,000+ small firms in Brazil. We define informality as tax avoidance; firms in the informal sector avoid tax payments but suffer other limitations. In the first model there is a single industry and informal firms face a higher cost of capital and a limitation on size. As a result informal firms are smaller and have a lower capi...
Wind Energy Information has been prepared to provide researchers, designers, manufacturers, distributors, dealers, and users of wind energy conversion systems with easy access to technical information. This directory lists organizations and publications which have the main objective of promoting the use of wind energy conversion systems, some organizations that can respond to requests for information on wind energy or make referrals to other sources of information, and some publications that occasionally include information on wind energy. The bibliography contains references to information for both the neophyte and the expert.
The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. Written for the general public, the EIA publication Energy Information Sheets was developed to provide information on various aspects of fuel production, prices, consumption and capability. The information contained herein pertains to energy data as of December 1991. Additional information on related subject matter can be found in other EIA publications as referenced at the end of each sheet.
Lucking, Robert A.; Christmann, Edwin P.
Describes the Geographic Information System (GIS) which is capable of storing, manipulating, and displaying data allowing students to explore complex relationships through scientific inquiry. Explains applications of GIS in middle school classrooms and includes assessment strategies. (YDS)
Kludas, Jana; Bruno, Eric; Marchand-Maillet, Stéphane
In retrieval, indexing and classification of multimedia data an efficient information fusion of the different modalities is essential for the system's overall performance. Since information fusion, its influence factors and performance improvement boundaries have been lively dis- cussed in the last years in different research communities, we will review their latest findings. They most importantly point out that exploiting the feature's and modality's dependencies will yield to maximal perfor...
Álvarez, Juan Carlos
Full Text Available This paper is intended to describe the results of a study of training the ability to obtain scientific data. The need and importance of the topic, in the era of the information and the knowledge, is backed up. Global current tendencies on the abilities in the handling and use of the scientific information are reviewed on the basis of regularities and inconsistencies. This leads to define the ability and its corresponding operational system.
Álvarez, Juan Carlos; Ríos, Isabel
This paper is intended to describe the results of a study of training the ability to obtain scientific data. The need and importance of the topic, in the era of the information and the knowledge, is backed up. Global current tendencies on the abilities in the handling and use of the scientific information are reviewed on the basis of regularities and inconsistencies. This leads to define the ability and its corresponding operational system.
Kolm, Anne-Sofie; Larsen, Birthe
This paper develops a four sector equilibrium search and matching model with informal sector employment opportunities and educational choice. We show that underground activities reduce educational attainments if informal employment opportunities mainly are available to low educated workers. More ...
Constantiou, Ioanna D.; Lehrer, Christiane; Hess, Thomas
on the continuance of LBS use and indicate changes in individuals' information retrieval behaviours in everyday life. In particular, the distinct value dimension of LBS in specific contexts of use changes individuals' behaviours towards accessing location-related information....
Ploug, Thomas; Holm, Søren
This article introduces the notion of ‘routinisation’ into discussions of informed consent. It is argued that the routinisation of informed consent poses a threat to the protection of the personal autonomy of a patient through the negotiation of informed consent. On the basis of a large survey, we...... provide evidence of the routinisation of informed consent in various types of interaction on the internet; among these, the routinisation of consent to the exchange of health related information. We also provide evidence that the extent of the routinisation of informed consent is dependent on the...... character of the information exchanged, and we uncover a range of causes of routinisation. Finally, the article discusses possible ways of countering the problem of routinisation of informed consent....
... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...
U.S. Environmental Protection Agency — This asset includes hazardous waste information, which is mostly contained in the Resource Conservation and Recovery Act Information (RCRAInfo) System, a national...
... are here: EPA Home Climate Change Basic Information Climate Change: Basic Information On This Page Climate change ... We can make a difference How is the climate changing in the U.S.? Observations across the United ...
Full Text Available ... to this external site does not constitute an endorsement of the site or the information it contains ... to this external site does not constitute an endorsement of the site or the information it contains ...
Coyne, Joseph G.; Moneyhun, Dora H.
Describes the Energy Information Administration (EIA) and the Technical Information Center (TIC), and lists databases accessible online to the Department of Energy and its contractors through DOE/RECON. (RAA)
In recent years, risk informed activities are being investigated as scientifically rational measures. Some Risk informed activities using Core Damage Frequency (CDF) have been already employed. Examples are extraction of accident management strategies, risk informed maintenance importance and such. This paper describes risk information such as CDF, risk profile, risk importance of equipments' contribution to risk, gained from Probabilistic Analysis (PSA). Furthermore, risk informed activities conducted and/or considered are also introduced. The examples are investigation of accident management strategies, on-line maintenance and risk informed In Service Inspection (ISI). In the end, open issues for further employment of risk information in the NPP activities are summarized. Technical quality of PSA methodology is one of these issues and it should be continuously addressed, however, the risk information as it is still useful for better activities in NPP. (author)
Full Text Available ... Education / Safety Education Centers En Español Carbon Monoxide Information Center The Invisible Killer Carbon monoxide, also known ... Install one and check its batteries regularly. View Information About CO Alarms Other CO Topics Safety Tips ...
... to access your health information Right to an accounting of disclosures of your health information Right to ... Yes. You have a right to receive an "accounting of disclosures," which is a list of certain ...
Developing countries need mechanisms by which the information they generate themselves and development information from the rest of the world can be retrieved. The international cooperative information system is such a mechanism. Delegates to the Seminar on International Cooperative Information Systems were informed about various existing systems (INIS, AGRIS, INFOTERRA, TCDC/INRES, POPIN, DEVSIS, and INPADROC), some specialized information systems and services (CDS/ISIS and the Cassava Information Centre), and computer programs for information processing (INIS/AGRIS, CDS/ISIS, and MINISIS). The participants suggested some changes that should be made on both the national and the international levels to ensure that these systems meet the needs of developing countries more effectively. (LL)
... Screening Research Melanoma Treatment (PDQ®)–Patient Version General Information About Melanoma Go to Health Professional Version Key ... the PDQ Adult Treatment Editorial Board . Clinical Trial Information A clinical trial is a study to answer ...
Desai, B.N.; Kunte, P.D.; Bhargava, R.M.S.
Ocean. At INODC, a National Information system for oceanographic studies is under development. Bibliographic information forms an integral part of oceanographic system as it is an essential component for data analysis and interpretation. Hence two major...
The chapter gives an introduction to Geographical Information Systems (GIS) with particular focus on their application within environmental management.......The chapter gives an introduction to Geographical Information Systems (GIS) with particular focus on their application within environmental management....
Food production and consumption influence health, the environment, social structures, etc. For this reason consumers are increasingly interested in information about these effects. Disclosure of information about the consequences of food production and consumption is essential for the idea of...
The Indiana Health Information Exchange is comprised of various Indiana health care institutions, established to help improve patient safety and is recognized as a best practice for health information exchange.
Schneider, Thomas D.
How do genetic systems gain information by evolutionary processes? Answering this question precisely requires a robust, quantitative measure of information. Fortunately, 50 years ago Claude Shannon defined information as a decrease in the uncertainty of a receiver. For molecular systems, uncertainty is closely related to entropy and hence has clear connections to the Second Law of Thermodynamics. These aspects of information theory have allowed the development of a straightforward and practic...
Product Information Management (PIM) is a field that deals with the product master data management and combines into one base the experience and the principles of data integration and data quality. Product Information Management merges the specific attributes of products across all channels in the supply chain. By unification, centralization and standardization of product information into one platform, quality and timely information with added value can be achieved. The goal of the theoretica...
Interpersonal communication is very important as for managers as for personnel. Companies improve markedly by establishing open and no threatening interpersonal communications throughout the organization. One of the manager's roles is information role. Managers give and exchange information with personnel; they disclose information about the company and about anything that can improve effects of personnel jobs and personnel responsibilities. Management information has implications for decisio...
Brody, Dorje C.; Yan Tai Law
In financial markets valuable information is rarely circulated homogeneously, because of time required for information to spread. However, advances in communication technology means that the 'lifetime' of important information is typically short. Hence, viewed as a tradable asset, information shares the characteristics of a perishable commodity: while it can be stored and transmitted freely, its worth diminishes rapidly in time. In view of recent developments where internet search engines and...
The diploma thesis focuses on design of the information system for the department of medical transport service, which is part of the hospital. This thesis describes the theoretical knowledge necessary for analysis and custom design, is also concerned with the analysis of the current state of processes and information system. Last but not least, based on the analysis and the requirements lays down suggestions for improvement of the information system and design of optimal information system, t...
The purpose of these Public Information Guidelines is to provide principles for the implementation of the NWPA mandate and the Mission Plan requirements for the provision of public information. These Guidelines set forth the public information policy to be followed by all Office of Civilian Radioactive Waste Management (OCRWM) performance components. The OCRWM offices should observe these Guidelines in shaping and conducting public information activities.
Blethyn, Stanley G
Designing Information Systems focuses on the processes, methodologies, and approaches involved in designing information systems. The book first describes systems, management and control, and how to design information systems. Discussions focus on documents produced from the functional construction function, users, operators, analysts, programmers and others, process management and control, levels of management, open systems, design of management information systems, and business system description, partitioning, and leveling. The text then takes a look at functional specification and functiona
The purpose of these Public Information Guidelines is to provide principles for the implementation of the NWPA mandate and the Mission Plan requirements for the provision of public information. These Guidelines set forth the public information policy to be followed by all Office of Civilian Radioactive Waste Management (OCRWM) performance components. The OCRWM offices should observe these Guidelines in shaping and conducting public information activities
Coff, Christian Eyde
Food production and consumption influence health, the environment, social structures, etc. For this reason consumers are increasingly interested in information about these effects. Disclosure of information about the consequences of food production and consumption is essential for the idea of inf......, supporting rationality (the best choice), consumers’ self-governance (autonomy) and life coherence (integrity). On a practical level, informed food choice remains an ideal to strive for, as information on food often is inadequate....
Van Lingen, Frank
This document gives an overview of issues related to integration of information. Different aspects are discussed. Furthermore, several projects related to integration of information are described. Also several standards that relate to information integration are discussed. Finally, these issues are related to information integration within a high-energy physics environment. Keywords : heterogeneous databases, multidatabases, temporal databases, meta-model, meta-data, ontologies, mediator, data management.
Acemoglu, Daron; Zilibotti, Fabrizio
We propose a model in which economic relations and institutions in advanced and less developed countires differ as these societies have access to different amounts of information. The lack of information in less developped economies makes it hard to evaluate the performance of managers, and leads to high "agency costs". Differencies in the amount of information have a variety of sources. As well as factors related to the informational infrastructure, we emphasize that societies accumulate inf...
What is an Information Access Survey? An Information Access Survey is a tool that: • Identifies key issues about people and what information needs they have • Identifies what media sources are available, what strategies people use to get information and finds out how cost-effective these are • Recommends methods of communication that are useful for poor rural communities who use aquatic resources to improve their livelihoods (Pdf contains 4 pages).
Management information systems (MIS) is a commonly used term in computer profession. The new information technology has caused management to expect more from computer. The process of supplying information follows a well defined procedure. MIS should be capable for providing usable information to the various areas and levels of organization. MIS is different from data processing. MIS and business hierarchy provides a good framework for many organization which are using computers. (A.B.)
Background: The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in "Bookmarks" and "Favourites". Argument: It is suggested that personal information collections are…
Краліна, Ганна Сергіївна; Тупота, Евгеній Вікторович
Information retrieval is the science of searching for documents, for information within documents and for metadata about documents, as well as that of searching relational databases and the World Wide Web. There is overlap in the usage of the terms data retrieval, document retrieval, information retrieval, and text retrieval, but each also has its own body of literature, theory, praxis and technologies
Discussion of connectionist views for adaptive clustering in information retrieval focuses on a connectionist clustering technique and activation spreading-based information retrieval model using the interaction information retrieval method. Presents theoretical as well as simulation results as regards computational complexity and includes…
Asif, Muhammad; Krogstie, John
Purpose: A mobile student information system (MSIS) based on mobile computing and context-aware application concepts can provide more user-centric information services to students. The purpose of this paper is to describe a system for providing relevant information to students on a mobile platform. Design/methodology/approach: The research…
Gazendam, Henk W.M.
Metaphors are useful because they are efficient: they transfer a complex of meaning in a few words. Information systems are social constructs. Therefore, metaphors seem to be especially useful for explaining the space of possible meaning complexes or designs of information systems. Three information
The purpose of an information strategy is to highlight the extent to which a modern, complex organization depends on information, in all of its guises, and to consider how this strategic asset should be managed. This dependency has always been present and nowhere more so than in universities, whose very purpose is built around information and its…
Hospital drug information pharmacists have set up a viewdata drug information service (VADIS) which can be accessed through the telephone system. It may not be an essential service for all doctors yet, but it is a new way of receiving drug information together with unbiased therapeutic comments based on available research data.
Dearstyne, Bruce W.; And Others
Six articles discuss government information policy in context of technology and electronic records; policies on information resources management from OMB (Office of Management and Budget); state information resources, including Council of State Governments (CSG); state record laws and preservation of archival records; and management of electronic…
Multisource information theory is well known in Shannon setting. It studies the possibilities of information transfer through a network with limited capacities. Similar questions could be studied for algorithmic information theory and provide a framework for several known results and interesting questions.
The National Energy Information Center provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. This Energy Information Directory is used to assist the Center staff as well as other DOE staff in directing inquires to the proper offices.
This book presents an insider's perspective on information in a wide range of disciplines, from quantum physics to library science. It reflects the diversity of understanding of information within these disciplines, but also brings clarity and coherence to the different perspectives through promoting information as a unifying concept.
This discussion of the ethics of the information process provides a brief review of the process of information supply and flow, primarily in science and technology; looks at various points in the flow of information; and highlights particular ethical concerns. Facets of the process discussed in more detail include ways in which some scientists…
Valentijn, E.; Belikov, A. N.
The Lofar Information System is a solution for Lofar Long Term Archive that is capable to store and handle PBs of raw and processed data. The newly created information system is based on Astro-WISE - the information system for wide field astronomy. We review an adaptation of Astro-WISE for the new t
Hongladarom, Soraj; Ess, Charles
This book was the first publication to take a genuinely global approach to the diverse ethical issues evoked by Information and Communication Technologies and their possible resolutions. Readers will gain a greater appreciation for the problems and possibilities of genuinely global information...... ethics, which are urgently needed as information and communication technologies continue their exponential growth...
Taylor, M. J.; Jones, R. P.; Haggerty, J.; Gresty, D.
In this paper we discuss an approach to the teaching of information technology law to higher education computing students that attempts to prepare them for professional computing practice. As information technology has become ubiquitous its interactions with the law have become more numerous. Information technology practitioners, and in particular…
This article deals with theoretical developments in the subject of quantum information and quantum computation, and includes an overview of classical information and some relevant quantum mechanics. The discussion covers topics in quantum communication, quantum cryptography, and quantum computation, and concludes by considering whether a perspective in terms of quantum information sheds new light on the conceptual problems of quantum mechanics.
Rafferty, K. [P.E.; Boyd, T. [ed.
This package of information is intended to provide a foundation of background information for developers of geothermal greenhouses. The material is divided into seven sections covering such issues as crop culture and prices, operating costs for greenhouses, heating system design, vendors and a list of other sources of information.
This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.
Millions of consumers get health information from magazines, TV or the Internet. Some of the information is reliable and up to date; some is not. How can ... the site have an editorial board? Is the information reviewed before it is posted? Be skeptical. Things ...
Introduction: The term "information" in information science does not share the characteristics of those of a nomenclature: it does not bear a generally accepted definition and it does not serve as the bases and assumptions for research studies. As the data deluge has arrived, is the concept of information still relevant for information…
La Caille John, Patricia
The Rural Information Center (RIC), a project of two agencies of the U.S. Department of Agriculture, has served rural information needs since 1988. The targeted audience for the RIC is local officials and citizens, rather than scientists and federal officials, and the thrust of its information is rural development rather than production…
Hiemstra, Djoerd; Göker, Ayse; Davies, John
Many applications that handle information on the internet would be completely inadequate without the support of information retrieval technology. How would we find information on the world wide web if there were no web search engines? How would we manage our email without spam filtering? Much of the
Jensen, Thomas; Vatrapu, Ravi
systems researchers engaged in the design and development of a prototype for an innovative IT-artifact called Shipping Information Pipeline which is a kind of “an internet” for shipping information. The instrumental aim is to enable information seamlessly to cross the organizational boundaries and...
In recent years we extended Shannon static statistical information theory to dynamic processes and established a Shannon dynamic statistical information theory, whose core is the evolution law of dynamic entropy and dynamic information. We also proposed a corresponding Boltzmman dynamic statistical information theory. Based on the fact that the state variable evolution equation of respective dynamic systems, i.e. Fokker-Planck equation and Liouville diffusion equation can be regarded as their information symbol evolution equation, we derived the nonlinear evolution equations of Shannon dynamic entropy density and dynamic information density and the nonlinear evolution equations of Boltzmann dynamic entropy density and dynamic information density, that describe respectively the evolution law of dynamic entropy and dynamic information. The evolution equations of these two kinds of dynamic entropies and dynamic informations show in unison that the time rate of change of dynamic entropy densities is caused by their drift, diffusion and production in state variable space inside the systems and coordinate space in the transmission processes; and that the time rate of change of dynamic information densities originates from their drift, diffusion and dissipation in state variable space inside the systems and coordinate space in the transmission processes. Entropy and information have been combined with the state and its law of motion of the systems. Furthermore we presented the formulas of two kinds of entropy production rates and information dissipation rates, the expressions of two kinds of drift information flows and diffusion information flows. We proved that two kinds of information dissipation rates (or the decrease rates of the total information) were equal to their corresponding entropy production rates (or the increase rates of the total entropy) in the same dynamic system. We obtained the formulas of two kinds of dynamic mutual informations and dynamic channel
This book is a significant step towards developing a body of management knowledge pertinent to the context of Library Information Science (LIS) and provides a succinct but deep account of management and information organizations. Management of Information Organizations presents a broad view of the information organizations and the nature of management in these organizations, and how information professionals are affected by such management systems. The book equips the reader with the knowledge that will enable them to develop a strong intellectual foundation relating to management and its mani
Rafferty, Pauline; Baker, David
This special issue explores information behaviour and practice in general, and specifically focuses on the implications for library and information services. Information seeking behaviour and information practice remain areas of importance in information science and librarianship, perhaps even more so in the digital age. This special issue is an opportunity to share ideas and scholarship and to explore models and methods. The papers chosen for inclusion cover a range of topics and approach them from a number of different epistemological and methodological positions demonstrating the liveliness
Gray, J E; Vogt, A
Is symmetry informative? The answer is both yes and no. We examine what information and symmetry are and how they are related. Our approach is primarily mathematical, not because mathematics provides the final word, but because it provides an insightful and relatively precise starting point. Information theory treats transformations that messages undergo from source to destination. Symmetries are information that leave some property of interest unchanged. In this respect the studies of information and symmetry can both be regarded as a Quest for the identity transformation. PMID:9224554
Information Systems Project Management addresses project management in the context of information systems. It deals with general project management principles, with focus on the special characteristics of information systems. It is based on an earlier text, but shortened to focus on essential project management elements.This updated version presents various statistics indicating endemic problems in completing information system projects on time, within budget, at designed functionality. While successful completion of an information systems project is a challenge, there are some things that ca
Duff, Alistair S
We are often told that we are ""living in an information society"" or that we are ""information workers."" But what exactly do these claims mean, and how might they be verified? In this important methodological study, Alistair S. Duff cuts through the rhetoric to get to the bottom of the ""information society thesis."" Wide-ranging in coverage, this study will be of interest to scholars in information science, communication and media studies and social theory. It is a key text for the newly-unified specialism of information society studies, and an indispensable guide to the future of this disc
In order to develop new types of information media and technology, it is essential to model complex and flexible information processing in living systems. This book presents a new approach to modeling complex information processing in living systems. Traditional information-theoretic methods in neural networks are unified in one framework, i.e. a-entropy. This new approach will enable information systems such as computers to imitate and simulate human complex behavior and to uncover the deepest secrets of the human mind.
Nuclear information (Nl) interests people for many reasons, with energy supply, safety, and security being at the top of the list. Democratizing nuclear information has its roots in the growth of a knowledge-based economy, the knowledge worker as a user of nuclear information, developments in information and communication technologies (ICT), and the impact of internet growth. Results of democratization are apparent in the process of information creation, in how nuclear information is distributed and accessed, and in the conditions for using the information found. The International Nuclear Information System (INIS) both reflects and contributes to these trends. Nuclear information falls under the overall umbrella of scientific and technical information (STI). It is highly specialized, but it follows general principles and trends of STI. The world of STI has its own culture and its own long-established rules of use and existence. These have brought us many inventions and improvements, introduced important technological changes, and made our lives and work much easier and more pleasurable. However, the world is constantly changing, and the traditional closed STI environment, including the world of nuclear information, is not keeping up with today’s changes. (author)
Society is on the verge of a new era: the information age. Economical changes, a new way of looking at services and new types of conflict are forecasted. Some glimpses of these changes were noticed during the Persian Gulf War. Government decision units, organisations, society and critical industries
IBM Security Intelligence with Analytics of massive data provides exceptional threat and risk detection, combining deep security expertise with analytical insights on a massive scale. For forward-leaning organizations seeking advanced insight into security risks, the IBM solution -- Security Intelligence Platform for massive data -- provides a comprehensive, integrated approach that combines real-time correlation for continuous insight, custom analytics across massive structured and unstructured data, and forensic capabilities for irrefutable evidence. The combination can help you address advanced persistent threats, fraud and insider threats. The IBM solution is designed to widening the scope and scale of investigation, enabling analyzes of any kind of data in any format, such as DNS transactions or full packet capture data to find malicious activity hidden deep in the masses of an organization's data. IBMWatson Explorer provides a unified view displaying all of security relevant information in a portal-like UI. The information analytics system is built around AQL (Annotated query language), a declarative rule language with a familiar SQL-like syntax. AQL supports the paradigm describing data for data with an optional data governance catalogue for massive volumes of data supporting individual views in addition to the pre-defined Document view that holds the textual and label content. An underlying Role-Based Access Control that data protection rules are strictly enforced within the whole architecture. Security at the document, sub-document and record level is built intoWatson Explorer. When Watson Explorer security is implemented, users cannot see information that they would be prohibited from seeing if they were directly logged into the target system. (author)
Bais, F Alexander
We review of the interface between (theoretical) physics and information for non-experts. The origin of information as related to the notion of entropy is described, first in the context of thermodynamics then in the context of statistical mechanics. A close examination of the foundations of statistical mechanics and the need to reconcile the probabilistic and deterministic views of the world leads us to a discussion of chaotic dynamics, where information plays a crucial role in quantifying predictability. We then discuss a variety of fundamental issues that emerge in defining information and how one must exercise care in discussing concepts such as order, disorder, and incomplete knowledge. We also discuss an alternative form of entropy and its possible relevance for nonequilibrium thermodynamics. In the final part of the paper we discuss how quantum mechanics gives rise to the very different concept of quantum information. Entirely new possibilities for information storage and computation are possible due t...
This Directory will facilitate dissemination of information. It is a reference document that lists the sources of program information available to the states, Indian Tribes, and the public. Chapter 1 describes current program information sources produced by OCRWM and by DOE's Office of Scientific and Technical Information (OSTI). Chapter 2 provides a directory of OCRWM and DOE technical information, and includes descriptions of computerized data bases and other resources. Chapter 3 is an index of OCRWM Headquarters and Project Office contacts, as well as state and Indian Tribe contacts. Chapter 4 enumerates Congressional Committees and Subcommittees that have jurisdiction over various components of the Civilian Radioactive Waste Management Program, and Chapter 5 lists DOE reading rooms, as well as information offices and the public libraries in affected states that are on one or more of OCRWM's mailing lists
Djordjevic, Ivan B
This book is a self-contained, tutorial-based introduction to quantum information theory and quantum biology. It serves as a single-source reference to the topic for researchers in bioengineering, communications engineering, electrical engineering, applied mathematics, biology, computer science, and physics. The book provides all the essential principles of the quantum biological information theory required to describe the quantum information transfer from DNA to proteins, the sources of genetic noise and genetic errors as well as their effects. Integrates quantum information and quantum biology concepts; Assumes only knowledge of basic concepts of vector algebra at undergraduate level; Provides a thorough introduction to basic concepts of quantum information processing, quantum information theory, and quantum biology; Includes in-depth discussion of the quantum biological channel modelling, quantum biological channel capacity calculation, quantum models of aging, quantum models of evolution, quantum models o...
Full Text Available This research focused on what constitutes information integrity as this is a problem facing companies today. Moreover, information integrity is a pillar of information security and is required in order to have a sound security management programme. However, it is acknowledged that 100% information integrity is not currently achievable due to various limitations and therefore the auditing concept of reasonable assurance is adopted. This is in line with the concept that 100% information security is not achievable and the notion that adequate security is the goal, using appropriate countermeasures. The main contribution of this article is to illustrate the importance of and provide a macro view of what constitutes information integrity. The findings are in harmony with Samuel Johnson's words (1751: 'Integrity without knowledge is weak and useless, and knowledge without integrity is dangerous and dreadful.'
The tables contained in this Appendix A describe the information needs for a pressurized water reactor (PWR) with a large, dry containment. To identify these information needs, the branch points in the safety objective trees were examined to decide what information is necessary to (a) determine the status of the safety functions in the plant, i.e., whether the safety functions are being adequately maintained within predetermined limits, (b) identify plant behavior (mechanisms) or precursors to this behavior which indicate that a challenge to plant safety is occurring or is imminent, and (c) select strategies that will prevent or mitigate this plant behavior and monitor the implementation and effectiveness of these strategies. The information needs for the challenges to the safety functions are not examined since the summation of the information needs for all mechanisms associated with a challenge comprise the information needs for the challenge itself
Acceptance of nuclear materials into a monitoring regime is complicated if the materials are in classified shapes or have classified composition. An attribute measurement system with an information barrier can be emplo,yed to generate an unclassified display from classified measurements. This information barrier must meet two criteria: (1) classified information cannot be released to the monitoring party, and (2) the monitoring party must be convinced that the unclassified output accurately represents the classified input. Criterion 1 is critical to the host country to protect the classified information. Criterion 2 is critical to the monitoring party and is often termed the 'authentication problem.' Thus, the necessity for authentication of a measurement system with an information barrier stems directly from the description of a useful information barrier. Authentication issues must be continually addressed during the entire development lifecycle of the measurement system as opposed to being applied only after the system is built.
We extend the concept of Wigner-Yanase-Dyson skew information to something we call "metric adjusted skew information" (of a state with respect to a conserved observable). This "skew information" is intended to be a non-negative quantity bounded by the variance (of an observable in a state) that...... vanishes for observables commuting with the state. We show that the skew information is a convex function on the manifold of states. It also satisfies other requirements, proposed by Wigner and Yanase, for an effective measure-of-information content of a state relative to a conserved observable. We...... establish a connection between the geometrical formulation of quantum statistics as proposed by Chentsov and Morozova and measures of quantum information as introduced by Wigner and Yanase and extended in this article. We show that the set of normalized Morozova-Chentsov functions describing the possible...
The agenda of quantum algorithmic information theory, ordered `top-down,' is the quantum halting amplitude, followed by the quantum algorithmic information content, which in turn requires the theory of quantum computation. The fundamental atoms processed by quantum computation are the quantum bits which are dealt with in quantum information theory. The theory of quantum computation will be based upon a model of universal quantum computer whose elementary unit is a two-port interferometer capa...
Peltier, Thomas R
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r
Alvim, Mário S.; Chatzikokolakis, Konstantinos; McIver, Annabelle; Morgan, Carroll; Palamidessi, Catuscia; Smith, Geoffrey
Quantitative information flow aims to assess and control the leakage of sensitive information by computer systems. A key insight in this area is that no single leakage measure is appropriate in all operational scenarios; as a result, many leakage measures have been proposed, with many different properties. To clarify this complex situation, this paper studies information leakage axiomatically, showing important dependencies among different axioms. It also establishes a completeness result abo...
Michael Paul Gough
Landauer’s principle and the Holographic principle are used to derive the holographic information energy contribution to the Universe. Information energy density has increased with star formation until sufficient to start accelerating the expansion of the universe. The resulting reduction in the rate of star formation due to the accelerated expansion may provide a feedback that limits the information energy density to a constant level. The characteristics of the universe’s holographic informa...
The basic concepts, structure, and operation of the Agency Safeguards Information System is discussed with respect to its role in accomplishing the overall objectives of safeguards. The basis and purposes of the Agency's information system, the structure and flow of information within the Agency's system, the relationship of the components is the Agency system, the requirements of Member States in respect of their reporting to the Agency, and the relationship of accounting data vis-a-vis facility and inspection data are described
LI Jun; WU Hai-yan; WANG Yun-yi
In the field of fashion industry, it is a bottleneck of how to control and apply the information in the procedure of fashion merchandising. By the aid of digital technology,a perfect and practical fashion information database could be established so that high- quality and efficient,low-cost and characteristic fashion merchandising system could be realized. The basic structure of fashion information database is discussed.
Raluca Daniela RIZEA; Roxana SÂRBU; Elena CONDREA
Intelligence competitiveness has already started to build its road in the company’s long term strategies. Nonetheless, business executives continue to look for ways to apply information technology strategically to their businesses. Using information managers manage to communicate, to convey their knowledge about markets, competitors, products, services and operations. Even if data and information are all over there are few amounts of managers that realize the importance of them to the success...
Le Guernic, Gurvan
Noninterference, which is an information flow property, is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. Noninterference verification mechanisms are usually based on static analyses and, to a lesser extent, on dynamic analyses. In contrast to those works, this paper proposes an information flow testing mechanism. This mechanism is sound from the point of view of noninterference. It is based on standard testing techniq...
Mossel, Elchanan; Peres, Yuval
Consider a tree network $T$, where each edge acts as an independent copy of a given channel $M$, and information is propagated from the root. For which $T$ and $M$ does the configuration obtained at level $n$ of $T$ typically contain significant information on the root variable? This problem arose independently in biology, information theory and statistical physics. ¶ For all $b$, we construct a channel for which the variable at the root of the break $b$-ary tree is...
Paradigmatic information is information requiring knowledge of morphological identity across words. It consists of the phonological consequences of knowing that a morpheme must have a single phonological underlying form, even if it surfaces differently in different words. There are two basic forms of paradigmatic information. One is morphemic alternation: the surface realizations of a single morpheme in different morphological contexts (a context consists of the other morphemes used to form t...
Heusinger, Klaus von
The concepts intonation and information structure refer to two components of grammar that are commonly assumed to be autonomous and independent of the canonical parts phonology, morphology, syntax and semantics. Both structures are closely related to each other: Intonational patterns express informational structuring, and a great part of the information structure is linguistically conveyed by intonation. Intonational patterns are not understood as a single structure, but as a complex of diffe...
This study investigates a simple theoretical model that explains how asset prices are affected by information risk and voluntary dissemination. Within this framework, we search for testing the impact of introducing disclosure risk on asset pricing model. The model offers a unified theoretical frame that can elicit the empirical findings that return sensitivity to market information is priced. We conclude that the expected stock return depends not only on information itself but also on the cor...
Aggregation in the presence of data-processing lags distorts the information content of data, violating orthogonality restrictions that hold at the individual level. Though the phenomenon is general, it is illustrated here for the life-cycle-permanent-income model. Cross-section and pooled-panel data induce information-aggregation bias akin to that in aggregate time series. Calculations show that information aggregation can seriously bias tests of the life-cycle model on aggregate time series...
The rapid development of information technology has influenced informatics as an important role in business development and management. Manifestations of computerization in the current economy mostly reflect the application of information systems for planning and strategic different analysis, especially when making long-term decisions. These systems consist of several information systems and management control systems for decision support. The construction of these systems was originally a re...
Introduction: Almost the entire human creativity today, from the standpoint of its efficiency and expediency, is conditioned with the existence of information systems. Most information systems are oriented to the management and decision-making, including health information system. System of health and health insurance together form one of the most important segments of society and its functioning as a compact unit. Increasing requirements for reducing health care costs while preserving or imp...
Spiller, Timothy P.
A new quantum information technology (QIT) could emerge in the future, based on current research in the fields of quantum information processing and communication1–3 (QIPC). In contrast to conventional IT, where quantum mechanics plays a support role in improving the building blocks, fundamental quantum phenomena play a central role in QIPC — information is stored, processed, and communicated according to the laws of quantum physics. This additional freedom could enable future QIT to perform ...
The paper provides the bases to complete a Design Information Questionnaire (DIQ) for a research reactor. The IAEA requirements for provision of design information for nuclear facility is described. The role of the provided information for the development of the safeguards approach and for planning of the IAEA's general inspection program for a specific facility is emphasized. Content and preparation of the IAEA DIQ by the State is presented
This book brings together geometric tools and their applications for Information analysis. It collects current and many uses of in the interdisciplinary fields of Information Geometry Manifolds in Advanced Signal, Image & Video Processing, Complex Data Modeling and Analysis, Information Ranking and Retrieval, Coding, Cognitive Systems, Optimal Control, Statistics on Manifolds, Machine Learning, Speech/sound recognition, and natural language treatment which are also substantially relevant for the industry.
The dissertation “Informal Economic Activities” takes a comprehensive approach to the informal economy by studying traditional shadow economic activities, household DIY activities, and the smuggling of illegal and legal goods. Chapter 2 analyzes shadow economic and DIY activities and presents a dual estimation for the development of both types of informal economic activities in Germany from 1970 to 2005. It also considers the impact of German reunification on shadow economic and DIY activ...
S. Maligalig, Dalisay; Cuevas, Sining; Rosario, Aleli
The paper developed a methodology for classifying workers into formal and informal employment using the 2005 Bangladesh Labor Force Survey (LFS). Although the 2005 LFS was not designed to collect data for this purpose, it included questions that can be used to determine whether workers are engaged in formal or informal employment. However, the process of identifying the combination of questions that could distinguish between formal and informal workers was hampered by data inconsistencies tha...
Ledenyov, Dimitri O.; Ledenyov, Viktor O.
The article formulates the information theory of firm, introduces the concept of firm as an operating system, which controls the firm’s operation by the means of the information resources processing, in an analogy with the operating system at a microprocessor in the computing devices, represents the director as an information processing element, describes the board of directors as the electronically-scanned electronically-steered phased array radar, considers the scientific problem of strateg...
US International Trade Commission — This dataset contains investigation, document and attachment metadata from the USITC's Electronic Document Information System (EDIS), as well as access to attached...
How much information can a transmitted physical system fundamentally communicate? We introduce the principle of quantum information causality, which states the maximum amount of quantum information that a quantum system can communicate as a function of its dimension, independently of any previously shared quantum physical resources. We present a new quantum information task, whose success probability is upper bounded by the new principle, and show that an optimal strategy to perform it combines the quantum teleportation and superdense coding protocols with a task that has classical inputs. PMID:23745844
Eng, T. [Swedish Nuclear Fuel and Waste Management Co., Stockholm (Sweden); Norberg, E. [National Swedish Archives, Stockholm (Sweden); Torbacke, J. [Stockholm Univ. (Sweden). Dept. of History; Jensen, M. [Swedish Radiation Protection Inst., Stockholm (Sweden)
The seminar took place on the Swedish ship for transportation of radioactive wastes, M/S Sigyn, which at summer time is used for exhibitions. The seminar treated items related to general information needs in society and questions related to radioactive waste, i.e. how knowledge about a waste repository should be passed on to future generations. Three contributions are contained in the report from the seminar and are indexed separately: `Active preservation - otherwise no achieves`; `The conservation and dissemination of information - A democratic issue`; and, `Conservation and retrieval of information - Elements of a strategy to inform future societies about nuclear waste repositories`.
Shuo BAI; Shouyang WANG; Lean YU; Aoying ZHOU
@@ The rapid growth in financial data volume has made financial information processing more and more difficult due to the increase in complexity, which has forced businesses and academics alike to turn to sophisticated information processing technologies for better solutions. A typical feature is that high-performance computers and advanced computational techniques play ever-increasingly important roles for business and industries to have competitive advantages. Accordingly, financial information processing has emerged as a new cross-disciplinary field integrating computer science, mathematics, financial economics, intelligent techniques, and computer simulations to make different decisions based on processed financial information.
The Future of Information Architecture examines issues surrounding why information is processed, stored and applied in the way that it has, since time immemorial. Contrary to the conventional wisdom held by many scholars in human history, the recurrent debate on the explanation of the most basic categories of information (eg space, time causation, quality, quantity) has been misconstrued, to the effect that there exists some deeper categories and principles behind these categories of information - with enormous implications for our understanding of reality in general. To understand this, the b
Department of Homeland Security — The Geospatial Information Infrastructure (GII) system is the Departments common solution architecture for the enterprise geospatial segment administered by the DHS...
Department of Homeland Security — When a Credential application or required documentation is incomplete, an Awaiting Information letter is issued. The application process cannot continue until all...
This landmark textbook takes a whole subject approach to Information Science as a discipline. Introduced by leading international scholars and offering a global perspective on the discipline, this is designed to be the standard text for students worldwide. The authors' expert narrative guides you through each of the essential building blocks of information science offering a concise introduction and expertly chosen further reading and resources.Critical topics covered include:foundations: concepts, theories and historical perspectivesorganising and retrieving Information information behaviour,
Full Text Available This research project is going to review the existing information cultures in 15 Finnish insurance businesses through a qualitative study. The interview-material consists of 40 in-depth-interviews and they are being analysed through the multiple case study method. The analysis is conducted in 5 stages considering information environment, information as resource, work processes, innovation and business success. The information culture varieties compared to the business success will hopefully be useful to create an understanding for the need of a broad understanding of the modern knowledge management concept in business organisations.
The requirements for the management of information at the IAEA and its Department of Safeguards are rapidly changing. Historically, the Department of Safeguards has had the requirement to process large volumes of conventional safeguards information. An information management system is currently in place that adequately handles the IAEA's conventional safeguards data needs. In the post-Iraq environment, however, there is a growing need to expand the IAEA information management capability to include unconventional forms of information. These data include environmental sampling results, photographs, video film, lists of machine tools, and open-source materials such as unclassified publications. The United States Department of Energy (DOE) has responded to this information management need by implementing the safeguards information management system (SIMS) initiative. SIMS was created by the DOE to anticipate and respond to IAEA information management needs through a multilaboratory initiative that will utilize an integrated approach to develop and deploy technology in a timely and cost effective manner. The DOE will use the SIMS initiative to co-ordinate US information management activities that support the IAEA Department of Safeguards. (author). 1 ref., 2 figs
Tipton, Harold F
For more than a decade, the Information Security Management Handbook has served as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination and as a reference for information security practitioners. Now thoroughly revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a comprehensive understanding of all the items in it. This is a valuable book, both for preparing for the CISSP exam and as a complete, up-to
Full Text Available The objective of this contribution is to characterize alternatives of information systems used for managing, processing and evaluation of information related to company vehicles. Especially we focus on logging, transferring and processing of on-road vehicle movement information in inland and international transportation. This segment of company information system has to monitor the car movement – actively or passively – according to demand of the company and after the processing it has to evaluate and give the complex monitoring of a situation of all the company vehicles to the controller.
Lauer, Thomas W; Graesser, Arthur C
The design and functioning of an information system improve to the extent that the system can handle the questions people ask. Surprisingly, however, researchers in the cognitive, computer, and information sciences have not thoroughly examined the multitude of relationships between information systems and questions -- both question asking and answering. The purpose of this book is to explicitly examine these relationships. Chapter contributors believe that questions play a central role in the analysis, design, and use of different kinds of natural or artificial information systems such as huma
U.S. Environmental Protection Agency — This asset contains all Brownfield facility data. It includes all information necessary to track Brownfields grant recipients' environmental progress at Brownfield...
Tipton, Harold F
The runaway growth of computer viruses and worms and the ongoing nuisance posed by malicious hackers and employees who exploit the security vulnerabilities of open network protocols make the tightness of an organization's security system an issue of prime importance. And information systems technology is advancing at a frenetic pace. Against this background, the challenges facing information security professionals are increasing rapidly.Information Security Management Handbook, Fourth Edition, Volume 2 is an essential reference for anyone involved in the security of information systems.
... Word Visual Art Historical Perspectives General Information Research Articles Books Primary Documents Images Sickle Cell on Instagram Sickle Cell Organizations State National International Newsletter NIH Report on Evidence- ...
Chowdhury, G G
Professor Gobinda Chowdhury BSc Hons, MSc, PhD, FCLIP is Professor in Information Science at iSchool@northumbria, and Head of the Department of Mathematics and Information Sciences at Northumbria University. Before joining Northumbria University he was a Professor and Director of the Centre for Information and Knowledge Management at the University of Technology Sydney, Australia. For over 25 years he has worked as an academic and researcher in information science in different parts of the world including Asia, Africa, Europe and Australia. For the past few years he has been actively involved
Today Information System became one of the strategic recourses of an enterprise. Every business as well as business function is influenced by the information system. Information system has tremendously changed the rules of the game. The advent of computing as well as communication technology has overpowered the way business activities are carried out today. The information systems have offered number of advantages in data collection, processing, presentation, communication, storage, retrieval and search etc. On one had it is catering to the smaller needs of smaller business such as an account
Sirintrapun, S Joseph; Artz, David R
This article provides surgical pathologists an overview of health information systems (HISs): what they are, what they do, and how such systems relate to the practice of surgical pathology. Much of this article is dedicated to the electronic medical record. Information, in how it is captured, transmitted, and conveyed, drives the effectiveness of such electronic medical record functionalities. So critical is information from pathology in integrated clinical care that surgical pathologists are becoming gatekeepers of not only tissue but also information. Better understanding of HISs can empower surgical pathologists to become stakeholders who have an impact on the future direction of quality integrated clinical care. PMID:26851670
Information is a precise concept that can be defined mathematically, but its relationship to what we call "knowledge" is not always made clear. Furthermore, the concepts "entropy" and "information", while deeply related, are distinct and must be used with care, something that is not always achieved in the literature. In this elementary introduction, the concepts of entropy and information are laid out one by one, explained intuitively, but defined rigorously. I argue that a proper understanding of information in terms of prediction is key to a number of disciplines beyond engineering, such as physics and biology.
The seminar took place on the Swedish ship for transportation of radioactive wastes, M/S Sigyn, which at summer time is used for exhibitions. The seminar treated items related to general information needs in society and questions related to radioactive waste, i.e. how knowledge about a waste repository should be passed on to future generations. Three contributions are contained in the report from the seminar and are indexed separately: 'Active preservation - otherwise no achieves'; 'The conservation and dissemination of information - A democratic issue'; and, 'Conservation and retrieval of information - Elements of a strategy to inform future societies about nuclear waste repositories'
Department of Transportation — The Airports Geographic Information System maintains the airport and aeronautical data required to meet the demands of the Next Generation National Airspace System....
Hartati Sulistyo Rini
Full Text Available Sebagai sistem ekonomi alternatif, keberadaan sektor informal mengundang pro dan kontra. Peranannya yang signifikan sebagai katup pengaman ekonomi nasional belum diimbangi dengan proteksi atau perlindungan dari pemerintah. Tujuan penelitian ini adalah membahas peran sektor informal dalam mengatasi masalah sosial ekonomi masyarakat dan dilema yang dialami oleh sektor informal dalam menjalankan perannya tersebut. Hasil penelitian ini menunjukkan terdapat peran sektor informal pada bidang ketenagakerjaan dan penyerapan angka pengangguran. Sektor formal dianggap tidak mampu menyediakan kesempatan kerja untuk seluruh lapisan masyarakat, apalagi mereka yang ada pada posisi marjinal. Pada beberapa kasus-khususnya yang berhubungan dengan sektor informal perkotaan perlakuan dan kebijakan negara menjadi sangat diskriminatif karena seringkali berhadapan dengan kebijakan negara yang bahkan berakhir dengan kekerasan.Â Perlindungan terhadap sektor informal salah satunya adalah pada pedagang kaki lima di Surakarta.Â Kota ini menjadi contoh representatif dalam pengorganisasian kepentinganÂ pemerintahÂ dan pedagang kaki lima. Ini dapat menjadi inspirasi positif bagi penanganan sektor informal di tempat yang lain untuk memperluas lapangan kerja bagi masyarakat dan meningkatkan kesejahteraan sosial. As an alternative economic system, the existence of informal sector invites pros and cons. The significant role of informal sector as a safety valve of the national economy has not been matched by government with the protection or support The objective of this study is to discuss the role of the informal sector in addressing social and economic issues, and the dilemma faced by the informal sector in carrying out this role. The results of this study shows that there is an important role of the informal sector in the field of employment and unemployment absorption. The formal sector is not considered able to provide job opportunities to all levels of society
Association du personnel
Our September information meetings have ended and we thank the many people who came. This will allow us to start an extremely useful dialogue that we will continue with the survey announced at these meetings, which is now available. We invite all CERN staff members to reply to this questionnaire to enable us to have an accurate picture of your expectations and wishes with respect to the evolution of social and employment policies.
This presentation covers recent developments in information management outlining ubiquitous computing, ubiquitous access to information, personalization, portals, information architecture, open access, search mechanisms and institutional repositories.
Full Text Available The article presents an overview of the research area of information behaviour. Information behaviour is defined as the behaviour of individuals in relation to information sources and channels, which results as a consequence of their information need, and encompasses passive and active searching of information, and its use. Theoretical foundations are presented, as well as some fundamental conceptual models of information behaviour and related concepts: information searching behaviour, which occurrs in active, purposeful searching for information, regardless of the information source used; and information seeking behaviour, which represents a micro-level of information searching behaviour, and is expressed by those individuals who interact with information retrieval systems.
Vetter, Richard C.
This booklet lists oceanography information sources in the first section under industries, laboratories and departments of oceanography, and other organizations which can provide free information and materials describing programs and activities. Publications listed in the second section include these educational materials: bibliographies, career…
Alterescu, S.; Hipkins, K. R.; Friedman, C. A.
On-line interactive information processing system easily and rapidly handles all aspects of data management related to patient care. General purpose system is flexible enough to be applied to other data management situations found in areas such as occupational safety data, judicial information, or personnel records.
Filman, Robert E.
I flew to Washington last week, a trip rich in distributed information management. Buying tickets, at the gate, in flight, landing and at the baggage claim, myriad messages about my reservation, the weather, our flight plans, gates, bags and so forth flew among a variety of travel agency, airline and Federal Aviation Administration (FAA) computers and personnel. By and large, each kind of information ran on a particular application, often specialized to own data formats and communications network. I went to Washington to attend an FAA meeting on System-Wide Information Management (SWIM) for the National Airspace System (NAS) (http://www.nasarchitecture.faa.gov/Tutorials/NAS101.cfm). NAS (and its information infrastructure, SWIM) is an attempt to bring greater regularity, efficiency and uniformity to the collection of stovepipe applications now used to manage air traffic. Current systems hold information about flight plans, flight trajectories, weather, air turbulence, current and forecast weather, radar summaries, hazardous condition warnings, airport and airspace capacity constraints, temporary flight restrictions, and so forth. Information moving among these stovepipe systems is usually mediated by people (for example, air traffic controllers) or single-purpose applications. People, whose intelligence is critical for difficult tasks and unusual circumstances, are not as efficient as computers for tasks that can be automated. Better information sharing can lead to higher system capacity, more efficient utilization and safer operations. Better information sharing through greater automation is possible though not necessarily easy.
The Chernobyl accident in 1986 uncovered serious information problems in many Western countries, and started a debate on crisis communication and information strategies in relation to radiation danger in society. The information problem focuses on four main perspectives. The first is related to information as a persuasion process in which an efficient strategy would influence both the public's knowledge of radiation danger, their attitude towards it and their behaviour. The second perspective calls attention to the importance of the different elements of the information process. How important are different characteristics of the information source; the message itself, and the receiver? The third perspective concentrates on different types of information. What is this issue all about, why is the situation as it is, and how should people behave to protect themselves? The fourth perspective points to the various phases of a crisis. The information needed is obviously not the same in the period before a crisis emerges when no one knows what is going to happen, in the warning period when one knows that something may happen, and during the crisis itself. (Author)
Furusawa, Akira [Department of Applied Physics, School of Engineering, The University of Tokyo (Japan)
I will briefly explain the definition and advantage of hybrid quantum information processing, which is hybridization of qubit and continuous-variable technologies. The final goal would be realization of universal gate sets both for qubit and continuous-variable quantum information processing with the hybrid technologies. For that purpose, qubit teleportation with a continuousvariable teleporter is one of the most important ingredients.
W.H.L.M. Pijls (Wim); A. de Bruin (Arie)
textabstractWell-known algorithms for the evaluation of the minimax function in game trees are alpha-beta and SSS*. An improved version of SSS* is SSS-2. All these algorithms don't use any heuristic information on the game tree. In this paper the use of heuristic information is introduced into the a
Bartlett, Stephen D.; Terno, Daniel R.
We show that quantum information can be encoded into entangled states of multiple indistinguishable particles in such a way that any inertial observer can prepare, manipulate, or measure the encoded state independent of their Lorentz reference frame. Such relativistically invariant quantum information is free of the difficulties associated with encoding into spin or other degrees of freedom in a relativistic context.
Lippi, Marco; Jaeger, Manfred; Frasconi, Paolo;
We introduce relational information gain, a refinement scoring function measuring the informativeness of newly introduced variables. The gain can be interpreted as a conditional entropy in a well-defined sense and can be efficiently approximately computed. In conjunction with simple greedy general...
Web information retrieval is a research area of its own.While some questions are the same as in „classic“ information retrieval, there are new questions concerning characteristics of the Web,which are discussed. The second part of the article gives an overview of the research literature published within the last two years.
Xiao, Yunlong; Jing, Naihuan; Li-Jost, Xianqing
In Hall's reformulation of the uncertainty principle, the entropic uncertainty relation occupies a core position and provides the first nontrivial bound for the information exclusion principle. Based upon recent developments on the uncertainty relation, we present new bounds for the information exclusion relation using majorization theory and combinatoric techniques, which reveal further characteristic properties of the overlap matrix between the measurements.
In the last 20 years, there has been a massive growth in the number of national laws giving individuals the right to access information held by public bodies (right to information or RTI laws). The number of countries with such laws has grown from 19 mostly Western democracies i
William C. Figg, Ph.D.
Full Text Available Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs and application security and transmission protocols are not consistently maintained. Health insurance needs and general financial opportunity has created an emerging market in medical identity theft. Medical offices have the perfect storm of information collection, personal, credit, banking, health, and insurance. Thieves have realized that medical facilities have as much economic value as banks and the security is much easier to crack. Mostly committed by insiders, medical identity theft is a well-hidden information crime. In spite of its covert nature, the catastrophic ramification to the victims is overt. This information crime involves stealing patients’ records to impersonate the patients in an effort of obtaining health care services or claiming Medicare on the patients’ behalf. Unlike financial identity theft, there is a lack of recourse for the victims to recover from damages. Medical identity theft undermines the quality of health care information systems and enervates the information security of electronic patient record.
Peek, Dennis; Helfrich, Donald Alan; Gorman, Susan
This document describes how the Environmental Geographic Information System (EGIS) was used, along with externally received data, to create maps for the Site-Wide Environmental Impact Statement (SWEIS) Source Document project. Data quality among the various classes of geographic information system (GIS) data is addressed. A complete listing of map layers used is provided.
Galanis, Nikolaos; Mayol Sarroca, Enric; Alier Forment, Marc; García Peñalvo, Francisco José
In this paper, we describe our PhD research proposal for the Education in the Knowledge Society program of the University of Salamanca. Our research centers on defining a framework for structuring and validating an individual's informal learning in order to be able to represent the competences gained through informal means, alongside their formal curriculum
A classic source for exploring the connections between information theory and physics, this text is geared toward upper-level undergraduates and graduate students. The author, a giant of 20th-century mathematics, applies the principles of information theory to a variety of issues, including Maxwell's demon, thermodynamics, and measurement problems. 1962 edition.
Christensen, Peter Ove; Qin, Zhenjiang
In an incomplete market with heterogeneous prior beliefs, we show public information can have a substantial impact on the ex ante cost of capital, trading volume, and investor welfare. The Pareto effcient public information system is the system enjoying the maximum ex ante cost of capital and the...
Do It Now Foundation, Phoenix, AZ.
The document presents a collection of articles about heroin. Article 1 provides general information on heroin identification, drug dependence, effects of abuse, cost, source of supply, and penalties for illegal heroin use. Article 2 gives statistical information on heroin-related deaths in the District of Columbia between 1971 and 1982. Article 3…
Full Text Available The rapid development of information technology has influenced informatics as an important role in business development and management. Manifestations of computerization in the current economy mostly reflect the application of information systems for planning and strategic different analysis, especially when making long-term decisions. These systems consist of several information systems and management control systems for decision support. The construction of these systems was originally a requirement for the strategic planning of top managers (the highest level of leadership having as a primary goal the easier access to important information, especially those that were classified as critical for success in business. Expert systems for example offered the possibility of linking information technology with other telecommunication channels which makes them possible to identify many problems. In this context, this paper will focus on presenting the great importance of information technology as a powerful tool to manage business problems precisely because information systems provide exceptional business value. Information Technology examines the reasons for the problems and offers solutions to manage and reduce them.
Proposes a framework for analyzing information portrayed in different media, for example, in text and in diagrams. The framework attaches information to propositions, then analyzes text and diagrams as being interpreted languages with the ability to refer to propositions. The approach is illustrated with Venn diagrams. (Author/LRW)
Millions of consumers get health information from magazines, TV or the Internet. Some of the information is reliable and up to date; some is not. ... a branch of the government, a university, a health organization, a hospital or a business? Focus on ...
García-Patrón, Raúl; Pirandola, Stefano; Lloyd, Seth; Shapiro, Jeffrey H.
In this Letter we define a family of entanglement distribution protocols assisted by feedback classical communication that gives an operational interpretation to reverse coherent information, i.e., the symmetric counterpart of the well-known coherent information. This leads to the definition of a new entanglement distribution capacity that exceeds the unassisted capacity for some interesting channels.
the teleological or goal-oriented nature of the behaviour of living organisms. Such a theory should define the essential characteristics in human information seeking, including a description of it cultural and social determinants. It should consider the costs and benefits of information seeking, and the social...
In this article is sketched a paradigm which permits to envisage nuclear information as an anthropologic problem. The author modelizes public information by a general theory of exchange. For him the most urgent problem is to refounding the circulation between the different components of social system. 3 figs,. 2 tabs,. 12 refs
Are the terms ―information organization‖ (IO), ―organization of information‖ (OI) and ―information architecture‖ (IA) synonyms for knowledge organization (KO)? This study uses bibliometric methods, among others, to determine some relations between these terms and their meanings. Apparently the data...
Nagelhout D; Sein AA; Duvoort GL
This "Informative document waste plastics" forms part of a series of "informative documents waste materials". These documents are conducted by RIVM on the indstruction of the Directorate General for the Environment, Waste Materials Directorate, in behalf of the program of acti
In 2012, more than a decade after the original Association of College and Research Libraries (ACRL) Information Literacy Competency Standards for Higher Education (hereafter the Standards) were institutionalized as the goal of academic library instruction, the Information Literacy Competency Standards Review Task Force convened by ACRL recommended…
Weiner, Sharon A.
There is increasing recognition that information literacy is essential for individual and community empowerment, workforce readiness, and global competitiveness. However, there is a history of difficulty in integrating information literacy with the postsecondary educational process. This paper posits that a greater understanding of the…
Horton, Forest Woody, Jr.; Keiser, Barbie E.
While much has been done to address the digital divide, awareness concerning the importance of information literacy (IL) has taken a back seat to a world that focuses on technology. This article traces the genesis of a global effort to address information literacy education and training beyond discussions taking place within the library and…
The paper describes the development in Tanzania, in terms of information and communication technologies and how these developments have influenced people's daily life.......The paper describes the development in Tanzania, in terms of information and communication technologies and how these developments have influenced people's daily life....
This paper discusses the management of library collections of electronic information resources within the classical theoretical framework of collection development and management. The first section provides an overview of electronic information resources, including bibliographic databases, electronic journals, journal aggregation services, and…
The Summary Information Report (SIR) provides summary data concerning NRC and its licensees for general use by the Chairman, other Commissioners and Commission staff offices, the Executive Director for Operations, and the Office Directors. SIR is published quarterly by the Management Information Branch (49-27834) of the Office of Resource Management
Lemmond, Tracy D; Hanley, William G; Guensche, Joseph Wendell; Perry, Nathan C; Nitao, John J; Kidwell, Paul Brandon; Boakye, Kofi Agyeman; Glaser, Ron E; Prenger, Ryan James
An information extraction system and methods of operating the system are provided. In particular, an information extraction system for performing meta-extraction of named entities of people, organizations, and locations as well as relationships and events from text documents are described herein.
John, Patricia La Caille
Describes the events that led to the creation of the Rural Information Center (RIC), a joint venture between the Extension Service and the National Agricultural Library to provide information to government officials involved in rural development. The databases accessed by RIC are described, and plans for a gateway system and network of all…
The fact that information is physical means that the laws of quantum mechanics can be used to process and transmit it in ways that are not possible with existing systems. Ever since its invention in the 1920s, quantum physics has given rise to countless discussions about its meaning and about how to interpret the theory correctly. These discussions focus on issues like the Einstein-Podolsky-Rosen paradox, quantum non-locality and the role of measurement in quantum physics. In recent years, however, research into the very foundations of quantum mechanics has also led to a new field quantum information technology. The use of quantum physics could revolutionize the way we communicate and process information. The important new observation is that information is not independent of the physical laws used to store and processes it (see Landauer in further reading). Although modern computers rely on quantum mechanics to operate, the information itself is still encoded classically. A new approach is to treat information as a quantum concept and to ask what new insights can be gained by encoding this information in individual quantum systems. In other words, what happens when both the transmission and processing of information are governed by quantum laws? (UK)
Taylor, Andy; Finch, Amanda; Sutton, David; Taylor, Andy
In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.
Kolm, Ann-Sofie; Larsen, Birthe
This paper develops a four-sector equilibrium search and matching model with informal sector employment opportunities and educational choice. We show that underground activities reduce educational attainments if informal employment opportunities mainly are available for low-educated workers. A more...
García-Patrón, Raúl; Pirandola, Stefano; Lloyd, Seth; Shapiro, Jeffrey H.
In this letter we define a family of entanglement distribution protocols assisted by feedback classical communication that gives an operational interpretation to reverse coherent information, i.e., the symmetric counterpart of the well known coherent information. This lead to the definition of a new entanglement distribution capacity that exceeds the unassisted capacity for some interesting channels.
MENU Return to Web version Health Information on the Web: Finding Reliable Information Health Information on the Web: Finding Reliable Information “Don’t believe everything you read.” It’s an ...
Molecular biology is based on two great discoveries: the first is that genes carry hereditary information in the form of linear sequences of nucleotides; the second is that in protein synthesis a sequence of nucleotides is translated into a sequence of amino acids, a process that amounts to a transfer of information from genes to proteins. These discoveries have shown that the information of genes and proteins is the specific linear order of their sequences. This is a clear definition of information and there is no doubt that it reflects an experimental reality. What is not clear, however, is the ontological status of information, and the result is that today we have two conflicting paradigms in biology. One is the 'chemical paradigm', the idea that 'life is chemistry', or, more precisely, that 'life is an extremely complex form of chemistry'. The other is the 'information paradigm', the view that chemistry is not enough, that 'life is chemistry plus information'. This implies that there is an ontological difference between information and chemistry, a difference which is often expressed by saying that information-based processes like heredity and natural selection simply do not exist in the world of chemistry. Against this conclusion, the supporters of the chemical paradigm have argued that the concept of information is only a linguistic metaphor, a word that summarizes the result of countless underlying chemical reactions. The supporters of the information paradigm insist that information is a real and fundamental component of the living world, but have not been able to prove this point. As a result, the chemical view has not been abandoned and the two paradigms both coexist today. Here, it is shown that a solution to the ontological problem of information does exist. It comes from the idea that life is artefact-making, that genes and proteins are molecular artefacts manufactured by molecular machines and that artefacts necessarily require sequences and coding
Vestergaard, Jacob Schack; Nielsen, Allan Aasbjerg
Canonical correlation analysis is an established multivariate statistical method in which correlation between linear combinations of multivariate sets of variables is maximized. In canonical information analysis introduced here, linear correlation as a measure of association between variables is...... replaced by the information theoretical, entropy based measure mutual information, which is a much more general measure of association. We make canonical information analysis feasible for large sample problems, including for example multispectral images, due to the use of a fast kernel density estimator...... for entropy estimation. Canonical information analysis is applied successfully to (1) simple simulated data to illustrate the basic idea and evaluate performance, (2) fusion of weather radar and optical geostationary satellite data in a situation with heavy precipitation, and (3) change detection in...
Ulslev Pedersen, Rasmus; Kühn Pedersen, Mogens
such as medical and manufacturing. These new sensor applications have implications for information systems (IS) and, the authors visualize this new class of information systems as fractals growing from an established class of systems; namely that of information systems (IS). The identified applications...... and implications are used as an empirical basis for creating a model for these small new information systems. Such sensor systems are called embedded systems in the technical sciences, and the authors want to couple it with general IS. They call the merger of these two important research areas (IS and...... embedded systems) for micro information systems (micro-IS). It is intended as a new research field within IS research. An initial framework model is established, which seeks to capture both the possibilities and constraints of this new paradigm, while looking simultaneously at the fundamental IS and ICT...
The Training and Information Division provides centralized direction and coordination for the training and information activities of the Center for Energy and Environment Research (formerly Puerto Rico Nuclear Center). The Division Head serves as Educational Officer, Technical Information Officer, and Public Information Officer. Training responsibilities include registering students; maintaining centralized records on training activities; preparing reports for ERDA; scheduling the utilization of training facilities; providing audiovisual equipment; assisting in the preparation of courses, seminars, symposia, and meetings; administering fellowship programs; and providing personal assistance to students in matters such as housing and immigration. The Division Head represents the Director on the Admissions Committee. Information responsibilities include preparation of manuscripts for ERDA patent clearance and publication release, maintenance of central files on all manuscripts and publications, preparation of the Annual Report, providing editorial and translation assistance, operation of a Technical Reading Room, operation of an ERDA Film Library, operation of a Reproduction Shop, providing copying services, and assisting visitors
This study was undertaken in order to plan an information strategy for possible future accidents involving radioactivity. Six health visitors and six farmers working in the districts of Norway which received the largest amounts of fallout from the Chernobyl accident, were interviewed. The questions were intended to give an indication of their knowledge about radioactivity and radiation, as well as their needs for information in case of a future accident. The results indicate a relatively low educational background in radiation physics and risk estimation. On the other hand the two groups showed a remarkable skill and interest in doing their own evaluation on the background of information that was linked to their daily life. It is suggested that planning of information in this field is done in close cooperation with the potential users of the information
The economics of information covers a wide range of topics such as insurance, stochastic equilibria, the theory of finance (e.g. option pricing), job search, etc. In this paper, we focus on an economic model in which traders are uncertain about the true characteristics of commodities and know only the probability distributions of those characteristics. The traders acquire information on those characteristics via the actual consumption in the past and are allowed to exchange the information among themselves prior to the forthcoming trade. Though optimal consumption at the preceding trade generally alters optimal consumption at the succeeding trade, it may happen that they both coincide. We call this particular type of optimal consumption an information stable equilibrium (ISE). At an ISE, the traders gain no additional information from consumption, which is significant enough to revise their optimal choice at the succeeding trade. .
The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory is a list of most Government offices and trade associations that are involved in energy matters. It does not include those DOE offices which do not deal with the public or public information.
The Integrated Information Portal (IIP) is a web-based information portal to support the needs of decision-makers responsible for nuclear safeguards. The emphasis of IIP is to provide a seamless interface for accessing multi-source information in a timely and intuitive manner. With proper access control, open source information can be integrated with internal confidential databases, through an open-architecture design. The paper discusses the open architecture approach from an information technology perspective. To demonstrate the concept, a prototype was created using Microsoft Net, AJAX enabled technologies and a customized ESRI ArcIMS web mapping solution in an n-tier client/server architecture. The benefits of implementing and using a solution orientated in this manner are presented. (author)
The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff as well as other Department of Energy (DOE) staff, in directing inquires to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory is a list of most Government offices and trade associations that are involved in energy matters. It does not include those DOE offices which do not deal with the public or public information
Landahl, A J
Quantum information science explores ways in which quantum physical laws can be harnessed to control the acquisition, transmission, protection, and processing of information. This field has seen explosive growth in the past several years from progress on both theoretical and experimental fronts. Essential to this endeavor are methods for controlling quantum information. In this thesis, I present three new approaches for controlling quantum information. First, I present a new protocol for continuously protecting unknown quantum states from noise. This protocol combines and expands ideas from the theories of quantum error correction and quantum feedback control. The result can outperform either approach by itself. I generalize this protocol to all known quantum stabilizer codes, and study its application to the three-qubit repetition code in detail via Monte Carlo simulations. Next, I present several new protocols for controlling quantum information that are fault-tolerant. These protocols require only local qu...
The Information Technology Resources Assessment (ITRA) is being published as a companion document to the Department of Energy (DOE) FY 1994--FY 1998 Information Resources Management Long-Range Plan. This document represents a collaborative effort between the Office of Information Resources Management and the Office of Energy Research that was undertaken to achieve, in part, the Technology Strategic Objective of IRM Vision 21. An integral part of this objective, technology forecasting provides an understanding of the information technology horizon and presents a perspective and focus on technologies of particular interest to DOE program activities. Specifically, this document provides site planners with an overview of the status and use of new information technology for their planning consideration.
This presentation addresses methodological issues of interactive information retrieval (IIR) evaluation in terms of what it entails to study users' use and interaction with IR systems, as well as their satisfaction with retrieved information. In particular, the presentation focuses on test design...... the habitat of the users to ensure a complete and realistic picture to enhance our understanding of IIR. The presentation also reflects on whether a re-thinking of the concept on an information need is necessary. One may ask whether it still makes sense to talk about types of information needs. Or...... should we rather study IIR from the perspective of search dedication and task load in order to also include everyday life information seeking? With this presentation, the IIR community is invited to an exchange of ideas and is encouraged to engage in collaborations with the solving of these (and other...
The Information Systems Analysis and Development (ISAD) Team of the Safeguards Systems Group at Los Alamos National Laboratory (LANL) has been developing web based information and knowledge management systems for sixteen years. Our vision is to rapidly and cost effectively provide knowledge management solutions in the form of interactive information systems that help customers organize, archive, post and retrieve nonproliferation and safeguards knowledge and information vital to their success. The team has developed several comprehensive information systems that assist users in the betterment and growth of their organizations and programs. Through our information systems, users are able to streamline operations, increase productivity, and share and access information from diverse geographic locations. The ISAD team is also producing interactive visual models. Interactive visual models provide many benefits to customers beyond the scope of traditional full-scale modeling. We have the ability to simulate a vision that a customer may propose, without the time constraints of traditional engineering modeling tools. Our interactive visual models can be used to access specialized training areas, controlled areas, and highly radioactive areas, as well as review site-specific training for complex facilities, and asset management. Like the information systems that the ISAD team develops, these models can be shared and accessed from any location with access to the internet. The purpose of this paper is to elaborate on the capabilities of information systems and interactive visual models as well as consider the possibility of combining the two capabilities to provide the next generation of infonnation systems. The collection, processing, and integration of data in new ways can contribute to the security of the nation by providing indicators and information for timely action to decrease the traditional and new nuclear threats. Modeling and simulation tied to comprehensive
Mônica Sena de Souza
Full Text Available Introduction: Discusses the role of information professionals in meeting the informational demands of people with disabilities in the information society. The librarian is crucial for the effectiveness and success in the informational inclusion of people with disabilities, considering also continuing education for their professional qualification.Objective: To provide reflections on the role of the librarian in serving users with disabilities, highlighting the need for improvement in information units, identified in the scientific literature with regard to accessibility.Methodology: Literature search, based on a review of literature in books and scientific papers, highlighting the main authors: Adams (2000, Mazzoni (2001 and Sassaki (1997, 2002, 2005.Results: The lack of informational access for people with disabilities hampers their social and political participation, hence, reduces its condition of citizenship.Conclusion: The librarian responsible for seeking continuing education, greater involvement in the events of the area and the constant search for job training, which will reflect on the best service the information needs of users with disabilities.
William C. Figg, Ph.D.
Full Text Available Modern medicine is facing a complex environment, not from medical technology but rather governmentregulations and information vulnerability. HIPPA is the government’s attempt to protect patient’sinformation yet this only addresses traditional record handling. The main threat is from the evolvingsecurity issues. Many medical offices and facilities have multiple areas of information security concerns.Physical security is often weak, office personnel are not always aware of security needs and applicationsecurity and transmission protocols are not consistently maintained.Health insurance needs and general financial opportunity has created an emerging market in medicalidentity theft. Medical offices have the perfect storm of information collection, personal, credit, banking,health, and insurance. Thieves have realized that medical facilities have as much economic value asbanks and the security is much easier to crack. Mostly committed by insiders, medical identity theft is awell-hidden information crime. In spite of its covert nature, the catastrophic ramification to the victims isovert. This information crime involves stealing patients’ records to impersonate the patients in an effort ofobtaining health care services or claiming Medicare on the patients’ behalf. Unlike financial identity theft,there is a lack of recourse for the victims to recover from damages. Medical identity theft undermines thequality of health care information systems and enervates the information security of electronic patientrecord.
Late in the 1980's the information system of Japanese corporation has been operated strategically to strengthen its competitive position in markets rather than to make corporate management efficient. Therefore, information-oriented policy in the corporation is making remarkable progress. This policy expands the intelligence activity in the corporation and also leads to the extension of the market in an information industry. In this environment closed corporate system is transformed into open one. For this system network and database are important managerial resources.
Electricity Information provides a comprehensive review of historical and current market trends in the OECD electricity sector, including 2011 preliminary data. An Introduction, notes, definitions and auxiliary information are provided in Part I. Part II of the publication provides an overview of the world electricity developments in 2010 covering world electricity and heat production, input fuel mix, supply and consumption, and electricity imports and exports. A greater focus is given to the 34 OECD countries with more detailed information covering production, installed capacity, input energy
Søe, Sille Obelitz
Indenfor især informationsfilosofi (Philosophy of Information) men også andre dele af filosofien og informationsvidenskab optræder en tredeling og distinktion mellem begreberne information, misinformation og disinformation. Det lader dog ikke til at disse begreber diskuteres i sammenhæng, men altid...... grundigt kig på Grice's begreb om mening, argumenteres der for at de tre begreber information, misinformation og disinformation bør diskuteres, analyseres og defineres i sammenhæng for at skabe et mere kongruent billede....
The Waste Policy Institute (WPI), through a cooperative agreement with the U.S. Department of Energy's (DOE) Office of Science and Technology (OST), conducted telephone interviews with people who requested OST publications to better understand why they wanted information from OST, how they used the information, and whether the information met their needs. Researchers selected 160 people who requested one of the two OST publications-either the Technology Summary Series (Rainbow Books) or the Initiatives newsletter. Of the 160 selected, interviewers spoke with 79 people nationwide representing six stakeholder audience categories
Quantum processing and communication is emerging as a challenging technique at the beginning of the new millennium. This is an up-to-date insight into the current research of quantum superposition, entanglement, and the quantum measurement process - the key ingredients of quantum information processing. The authors further address quantum protocols and algorithms. Complementary to similar programmes in other countries and at the European level, the German Research Foundation (DFG) started a focused research program on quantum information in 1999. The contributions - written by leading experts - bring together the latest results in quantum information as well as addressing all the relevant questions
Information architecture has changed dramatically since the mid-1990s and earlier conceptions of the world and the internet being different and separate have given way to a much more complex scenario in the present day. In the post-digital world that we now inhabit the digital and the physical blend easily and our activities and usage of information takes place through multiple contexts and via multiple devices and unstable, emergent choreographies. Information architecture now is steadily growing into a channel- or medium-specific multi-disciplinary framework, with contributions coming from a
Full text: Overall, the aim of this paper is to provide the background and the broader vision in which the various information related presentations and posters proposed by the Department find their place, exploring solutions to the challenges faced. At a time when the Agency is expected to be a reference for the assessment of nuclear proliferation threats, providing the international community with independent, impartial, timely and credible conclusions that no declared nuclear material is diverted to non-peaceful purposes and that no undeclared nuclear material or activities exist in States, it has to address major challenges with regard to information. Drawing credible conclusions assumes that all relevant information is accessible and put into relevant context. Because of the legal constraints under which it operates, the limitation of resources for collecting existing but difficult to reach details and simply because of the overwhelming quantity of the information needed to properly evaluate proliferation issues, the Agency has to continually improve the way it collects, processes and internally disseminates safeguards relevant information. Developing a coherent picture of a State's nuclear capability is a complex process based on many experts' assessments and fusion of information. The search for better, broader and deeper information through dedicated collection processes is an ongoing effort aimed at filling the gaps of such pictures. Implementing well selected information collection tools is a sine qua non to render effective the Agency's detection capabilities. Beyond collection, another prerequisite to ensuring that the available information is accessible to those who need to know is the establishment of a proper information system architecture and an efficient set of standard business processes. At the same time, that information must be sufficiently protected by appropriate security measures, particularly at a time when private hacking has become a
The information technology service works out the choices concerning the information technology systems of general use in the laboratory: computers, network, peripherals, workstations, software. It intervenes at the same time in the definition of the procedures and equipment specific to the research groups. The entire data acquisition is centralized by the service. The personnel is sharing the following two large directions of activities: - management of information technology park (setup, configuration and maintenance of the materials and soft ensemble, training and assistance afforded to users); - participation in software projects either in elaboration of applications or in realization and maintenance of specific tools
The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech
Stojmenovic, Ivan; Choi, Min; Xhafa, Fatos; FutureTech 2013
Future technology information technology stands for all of continuously evolving and converging information technologies, including digital convergence, multimedia convergence, intelligent applications, embedded systems, mobile and wireless communications, bio-inspired computing, grid and cloud computing, semantic web, user experience and HCI, security and trust computing and so on, for satisfying our ever-changing needs. In past twenty five years or so, Information Technology (IT) influenced and changed every aspect of our lives and our cultures. These proceedings foster the dissemination of state-of-the-art research in all future IT areas, including their models, services, and novel applications associated with their utilization.
The Nordic project on overriding information issues focus on why an information project, how to inform about a difficult subject in a modern society, how to provide advance information, how to inform when the accident has occurred and how to inform about NKS and projects. (au)
The Nordic project on overriding information issues focus on why an information project, how to inform about a difficult subject in a modern society, how to provide advance information, how to inform when the accident has occurred and how to inform about NKS and projects. (au)
U.S. Environmental Protection Agency — The Office of Emergency Management compiles a wide variety of information in support of Emergency Preparedness, including certain elements of the System for Risk...
Full Text Available ... Research & Statistics Technical Reports Injury Statistics NEISS Injury Data Consumer Opinion Surveys Business & Manufacturing Business Education Small ... Newsroom News Releases Videos Public Calendar FOIA CPSC Data Press Statements About CPSC Chairman Commissioners Contact Information ...
This is an ongoing review on my conjecture that information processing at causal horizons is the key ingredient of all physics. Assuming that information is fundamental and the information propagates with finite velocity, one can find that main physical laws such as Newton's second law and Einstein equation simply describe the energy-information relation (dE=TdS) for matter or space time crossing a causal horizon with temperature T for observers. Quantum mechanics arises from ignorance of the observers about matter crossing the horizon, which explains why superluminal communication is impossible even with quantum entanglement. This approach also explains the origin of Jacobson's thermodynamic formalism of Einstein gravity and Verlinde's entropic gravity. When applied to a cosmic causal horizon, the conjecture reproduces the observed dark energy and demands the zero cosmological constant.
... Twitter Google+ Pinterest Contact Us Basic Information about Mercury On this page: What is mercury? Emissions of ... Consumer products that traditionally contain mercury What is Mercury? Mercury is a naturally-occurring chemical element found ...
Full Text Available ... Chairman Commissioners Contact Information Agency Reports Legislative Affairs Job Opportunities Inspector General Safety Guides Safety Education Centers OnSafety Blog Neighborhood Safety Network Community Outreach ...
National Pesticide Information Center firstname.lastname@example.org 1.800.858.7378 Index A B C D E F ... Your Pest Control Your Pest Integrated Pest Management Pesticide Ingredients Active Ingredients Other/Inert Ingredients Pesticide Products ...
Genova, F; Bienaymé, O; Bonnarel, F; Dubois, P; Fernique, P; Jasniewicz, G; Lesteven, S; Monier, R; Ochsenbein, F; Wenger, M; Genova, Francoise; Egret, Daniel; Bienayme, Olivier; Bonnarel, Francois; Dubois, Pascal; Fernique, Pierre; Jasniewicz, Gerard; Lesteven, Soizick; Monier, Richard; Ochsenbein, Francois; Wenger, Marc
The Centre de Donnees astronomiques de Strasbourg (CDS) provides homogeneousaccess to heterogeneous information of various origins: information aboutastronomical objects in Simbad; catalogs and observation logs in VizieR and inthe catalogue service; reference images and overlays in Aladin; nomenclature inthe Dictionary of Nomenclature; Yellow Page services; the AstroGLU resourcediscovery tool; mirror copies of other reference services; and documentation.With the implementation of links between the CDS services, and with otheron--line reference information, CDS has become a major hub in the rapidlyevolving world of information retrieval in astronomy, developing efficienttools to help astronomers to navigate in the world-wide `Virtual Observatory'under construction, from data in the observatory archives to results publishedin journals. The WWW interface to the CDS services is available at:http://cdsweb.u-strasbg.fr/
... Awards Enhancing Diversity Find People About NINDS NINDS Sleep Apnea Information Page Table of Contents (click to ... en Español Additional resources from MedlinePlus What is Sleep Apnea? Sleep apnea is a common sleep disorder ...
Berg, R. F.; Holcomb, J. E.; Kelroy, E. A.; Levine, D. A.; Mee, C., III
Generalized information storage and retrieval system capable of generating and maintaining a file, gathering statistics, sorting output, and generating final reports for output is reviewed. File generation and file maintenance programs written for the system are general purpose routines.
Gustavo Sandoval Betancour
Full Text Available The article examines the main causes of labor informality in order to verify the validity of classical theories that explain unemployment in market economies and its relationship to informality. Methodologically, the project was based, in the empirical part, on international statistics, comparing the evolution of labor market structure in a combined sample of highly industrialized countries and other less industrialized ones. Empirical evidence supports the conclusion that the classical economic theory of Marxist origin is inefficient to explain the causes of unemployment in contemporary market economies, as well as it fails to satisfactorily explain informality. On the contrary, we conclude that the theory in question is more relevant to explain informality in centrally planned economies where this phenomenon has been present even more significantly than in free market economies.
Highly useful text studies logarithmic measures of information and their application to testing statistical hypotheses. Includes numerous worked examples and problems. References. Glossary. Appendix. 1968 2nd, revised edition.
U.S. Environmental Protection Agency — This asset includes all types of information regarding Brownfields grant programs that subsidize/support Brownfield cleanup. This includes EPA's Brownfields Program...
This proceedings volume provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art in information strategies and technologies of convergence security. The intended readership are researchers in academia, industry, and other research institutes focusing on ...
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to measuring leakage of confidential information could be applied to substantial, real-world programs. This is mostly due to the high complexity of computing precise leakage quantities. In this paper, we introduce a technique which makes it possible to decide if a program conforms to a quantitative policy which scales to large state-spaces with the help of bounded model checking. Our technique is applied to a number of officially reported information leak vulnerabilities in the Linux Kernel. Additionally, we also analysed authentication routines in the Secure Remote Password suite and of a Internet Message Support Protocol implementation. Our technique shows when there is unacceptable leakage; the same technique is also used to verify, for the first time, that the applied software patches indeed plug the information leaks. This is the f...
We inform you that the Individual Dosimetry Service will be exceptionally closed on April 13 and 14 (Tuesday and Wednesday). Only the very urgent cases will be handled during the days mentioned above.
... Awards Enhancing Diversity Find People About NINDS NINDS Alzheimer's Disease Information Page Table of Contents (click to ... en Español Additional resources from MedlinePlus What is Alzheimer's Disease? Alzheimer's disease (AD) is an age-related, ...
Full Text Available ... Safety Education Centers OnSafety Blog Neighborhood Safety Network Community Outreach Resource Center CO Poster Contest Toy Recall ... of the external site as its information collection practices may differ from ours. Linking to this external ...
The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are: (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory lists most Government offices and trade associations that are involved in energy matters.
Department of Transportation — EIS is an automated management information system that tracks the FAA’s enforcement actions on a nationwide basis. EIS is the FAA’s primary database for tracking...
U.S. Environmental Protection Agency — This asset includes the Office of Land and Emergency Management (OLEM) Calendar Information, which comprises three OLEM Calendars: the OLEM Calendar, the OLEM...
Federal Communications Commission — The FCC Geographic Information Systems site gives you the tools to create, view, query and print customized maps showing FCC licensing data, regulated towers and...
Volkenstein, Mikhail V
The book "Entropy and Information" deals with the thermodynamical concept of entropy and its relationship to information theory. It is successful in explaining the universality of the term "Entropy" not only as a physical phenomenon, but reveals its existence also in other domains. E.g., Volkenstein discusses the "meaning" of entropy in a biological context and shows how entropy is related to artistic activities. Written by the renowned Russian bio-physicist Mikhail V. Volkenstein, this book on "Entropy and Information" surely serves as a timely introduction to understand entropy from a thermodynamic perspective and is definitely an inspiring and thought-provoking book that should be read by every physicist, information-theorist, biologist, and even artist.
Full Text Available ... Guidance Civil and Criminal Penalties Federal Court Orders & Decisions Newsroom News Releases Videos Public Calendar FOIA CPSC Data Press Statements About CPSC Chairman Commissioners Contact Information Agency Reports Legislative Affairs Job Opportunities Inspector General Safety Guides Safety ...
Goldburg, W I
A message of any sort can be regarded as a source of information. Claude. E. Shannon showed in the last century that information ("what we don't already know") is equivalent to the entropy as defined in statistical mechanics. A string of experimental observations is like a succession of words; they both convey information and can be characterized by their entropy. For the fluid flow measurements and simulations to be discussed here (pipe and soap film flow, GOY model), the entropy depends on controllable parameters such as the Reynolds number. The information theory approach is applicable to measurements of any type including those governed by intractable equations or systems where the governing equations are not known. This contribution is dedicated to the memory of Leo Kadanoff, an inspiring teacher and one of the most important scientific leaders of the last half century.
Full Text Available ... Home / Safety Education / Safety Education Centers En Español Carbon Monoxide Information Center The Invisible Killer Carbon monoxide, also known as CO, is called the "Invisible ...
U.S. Environmental Protection Agency — This asset includes a number of individual data sets related to site-specific information for Superfund, which is governed under the Comprehensive Environmental...
U.S. Environmental Protection Agency — The Office of Emergency Management retains records of all incident responses in which it participates. This data asset includes three major sources of information:...
U.S. Department of Health & Human Services — This dataset contains the locations of Article 28, Article 36 and Article 40 health care facilities and programs from the Health Facilities Information System...
One of the most important goals of information management (IM) is supporting the knowledge workers in performing their works. In this paper we examine issues of relevance, linkage and provenance of information, as accessed and used by the knowledge workers. These are usually not adequately addressed in most of the IT based solutions for IM. Here we propose a non-conventional approach for building information systems for supporting the knowledge workers which addresses these issues. The approach leads to the ideas of building Information Warehouses (IW) and Knowledge work Support Systems (KwSS). Such systems can open up potential for building innovative applications of significant impact, including those capable of helping organizations in implementing processes for double-loop learning.
Pratheepa, Maria; Jalali, Sushil Kumar; Arokiaraj, Robinson Silvester; Venkatesan, Thiruvengadam; Nagesh, Mandadi; Panda, Madhusmita; Pattar, Sharath
Insect Barcode Information System called as Insect Barcode Informática (IBIn) is an online database resource developed by the National Bureau of Agriculturally Important Insects, Bangalore. This database provides acquisition, storage, analysis and publication of DNA barcode records of agriculturally important insects, for researchers specifically in India and other countries. It bridges a gap in bioinformatics by integrating molecular, morphological and distribution details of agriculturally important insects. IBIn was developed using PHP/My SQL by using relational database management concept. This database is based on the client– server architecture, where many clients can access data simultaneously. IBIn is freely available on-line and is user-friendly. IBIn allows the registered users to input new information, search and view information related to DNA barcode of agriculturally important insects.This paper provides a current status of insect barcode in India and brief introduction about the database IBIn. Availability http://www.nabg-nbaii.res.in/barcode PMID:24616562
Fainman, Y; Ikeda, K; Abashin, M; Tan, D, E-mail: email@example.com [Department of Electrical and computer Engineering, University of California, San Diego, 9500 Gilman Drive, La Jolla, California 92093-0407 (United States)
The field of photonics finds applications in information technology, health care, lighting, and sensing. This paper explores the role of nanotechnology with focus on nanophotonics in dielectric and inhomogeneous metamaterials.
This short document contains a list of more than 200 US sources of information (Name, address, phone number, and sometimes contact) related to the use of alternative fuels in automobiles and trucks. Electric-powered cars are also included.
US Agency for International Development — USAID/OIG has initiated its new Audit Information Management System (AIMS) to track OIG's audit recommendations and USAID's management decisions. OIG's in-house...
Bazavan, Ioana V
While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...
Briggs, Andrew; Ferry, David; Stoneham, Marshall
Microelectronics and the classical information technologies transformed the physics of semiconductors. Photonics has given optical materials a new direction. Quantum information technologies, we believe, will have immense impact on condensed matter physics. The novel systems of quantum information processing need to be designed and made. Their behaviours must be manipulated in ways that are intrinsically quantal and generally nanoscale. Both in this special issue and in previous issues (see e.g., Spiller T P and Munro W J 2006 J. Phys.: Condens. Matter 18 V1-10) we see the emergence of new ideas that link the fundamentals of science to the pragmatism of market-led industry. We hope these papers will be followed by many others on quantum information processing in the Journal of Physics: Condensed Matter.
Full Text Available The article deals with main tends of scientific research activities of Department of Control and Information Systems at the Faculty of Electrical Engineering of University of Zilina and its perspectives in this area.
Glahn, Christian; Börner, Dirk
Glahn, C., & Börner, D. (2009). Mobile Informal Learning. Presented at Mobile Learning in Context Symposium at the Open University of the Netherlands. September, 11, 2009, Heerlen, The Netherlands: Open University of the Netherlands.
Ma, Yan; International Conference on Information Engineering and Applications (IEA) 2011
The International Conference on Information Engineering and Applications (IEA) 2011 will be held on October 21-24, 2011, in Chongqing, China. It is organized by Chongqing Normal University, Chongqing University, Shanghai Jiao Tong University, Nanyang Technological University, the University of Michigan, Chongqing University of Arts and Sciences, and sponsored by the National Natural Science Foundation of China. The objective of IEA 2011 is to facilitate an exchange of information on best practices for the latest research advances in the area of information engineering and intelligence applications, which mainly includes computer science and engineering, informatics, communications and control, electrical engineering, information computing, business intelligence and management. IEA 2011 will provide a forum for engineers and scientists in academia, industry, and government to address the most innovative research and development including technical challenges, social and economic issues, and to present and disc...
Full Text Available ... as CO, is called the "Invisible Killer" because it's a colorless, odorless, poisonous gas. According to the ... Working CO alarms matter. Install one and check its batteries regularly. View Information About CO Alarms Other ...
... of Arthritis and Musculoskeletal and Skin Diseases Top Back Pain Back Pain Information Page National Institute of Neurological Disorders and Stroke Low Back Pain Fact Sheet National Institute of Neurological Disorders and ...
TB Elimination Tuberculosis: General Information What is TB? Tuberculosis (TB) is a disease caused by germs that are spread from person ... Viral Hepatitis, STD, and TB Prevention Division of Tuberculosis Elimination CS227840_A What Does a Positive Test ...
The purpose of this paper is to provide the background and broader vision in which the various presentations and posters on information related matters, prepared by staff of the Department of Safeguards, find their place, exploring solutions to the challenges faced. At a time when the IAEA is expected to be a reference for the assessment of nuclear proliferation issues, it faces major challenges with regard to the information needed to provide the international community with independent, impartial, timely and soundly based conclusions regarding the non-diversion of declared nuclear material and the absence of undeclared nuclear material or activities in States. The drawing of such conclusions assumes that all relevant information is accessible and has been put in the relevant context. Unfortunately, because of legal constraints under which it operates, or because of limitations on resources available for collecting existing but difficult to reach facts, or simply because of the overwhelming aspect of the information needed to properly evaluate proliferation issues, the IAEA needs to enhance the way it collects, processes, analyses, evaluates and disseminates safeguards relevant information. The search for better, broader and deeper information through dedicated collection means is an ongoing effort aimed at filling the gaps that constrain the development of the coherent picture that analysts need to be comfortable with the results of complex analyses. Implementation of well-selected information collection tools is sine qua non for effective IAEA verification capabilities. Beyond collection, the establishment of a proper information architecture and documented business processes is a prerequisite for ensuring that the available information is accessible to those with a need to know. At the same time, information must be sufficiently protected by appropriate security measures, particularly when hacking has become an intellectual sport and institutional security
Bernard Sinclair-Desgagné; Marie-Cécile Fagart
We first point out that, using any of the current criteria for comparing information systems in principal-agent models with moral hazard (such as Kim (1994)'s criterion), it is often impossible to contrast the value of information obtained from different policies of contingent audits that bear the same cost. Given two such policies A and B where, say, the lower cumulated frequencies of audits are always larger under B than under A, we show, however, that the likelihood ratio distribution asso...
New Automated Management Information Center (AMIC) employs innovative microcomputer techniques to create color charts, viewgraphs, or other data displays in a fraction of the time formerly required. Developed under Kennedy Space Center's contract by Boeing Services International Inc., Seattle, WA, AMIC can produce an entirely new informational chart in 30 minutes, or an updated chart in only five minutes. AMIC also has considerable potential as a management system for business firms.
Informality, often referred to as the informal sector, is crudely defined as all unregistered economic activity. To be a bit more specific it may be defined as the value-added from all unobserved economic activity that is not included in the calculation of the gross domestic product (GDP). This definition captures the production of households, self-employed and unregistered small-scale enterprises that create value added to the economy. In developing countries this phenomenon makes up a large...
Spiwoks, Markus; Bizer, Kilian; Hein, Oliver
Experimental research found contradictory results regarding the occurrence of informational cascades. Whereas Anderson and Holt (1997) confirmed the model of Banerjee (1992), and Bikhchandani et al. (1992) through lab tests, Huck and Oechssler (2000) came to contradictory results on crucial issues. This article presents experimental evidence supporting further doubts concerning "Bayesian" informational cascades: Just under two thirds of all decisions are characterized by an excessive orientat...
Ekaande Mbole, Emmanuel
This work involves the development of an Employees’ Information Management Application for Cameroon Development Corporation (CDC). CDC is an agro-industrial corporation with vast plantations and factories in the south west of Cameroon. With its huge labor force its human resources department formerly had a flat file system for handling employee information. This wasn’t quite good as it couldn’t meet up with the ever changing needs of the corporation. The aim of this project is to build a ...
Full Text Available A scientific research was carried out using a form, which was filled out by 335 businesses from Brasov County, through which we wanted to determine the awareness degree in regard to some information system notions. To analyse the data the SPSS software was used. The research reached the conclusion that the employees of businesses from Brasov County know very little about information systems.
Frieden, B. Roy; Hawkins, Raymond J.
We present an expression of the economic concept of asymmetric information with which it is possible to derive the dynamical laws of an economy. To illustrate the utility of this approach we show how the assumption of optimal information flow leads to a general class of investment strategies including the well-known Q theory of Tobin. Novel consequences of this formalism include a natural definition of market efficiency and an uncertainty principle relating capital stock and investment flow.
To survive, organisms must respond appropriately to a variety of challenges posed by a dynamic and uncertain environment. The mechanisms underlying such responses can in general be framed as input-output devices which map environment states (inputs) to associated responses (output. In this light, it is appealing to attempt to model these systems using information theory, a well developed mathematical framework to describe input-output systems. Under the information theoretical perspective,...
The main topic of this thesis concerns the study of how conflicting interests of software agents within an information ecosystem may cause cooperative behavior. Since such agents act on the behalf of their human owners, which often act in their own interest, this will sometimes result in malignant acts. Different types of models, often inspired by biological theories such as natural selection, will be used to describe various aspects of such information ecosystems. We begin by adopting a game...
Herb, Ulrich; Wahner, Ute
In der Psychologie bündeln das Sondersammelgebiet Psychologie der Saarländischen Universitäts- und Landesbibliothek (SULB ) und das Zentrum für Psychologische Information und Dokumentation (ZPID ) in einem von der Deutschen Forschungsgemeinschaft (DFG) geförderten Projekt ihre Aktivitäten im Bereich der digitalen Psychologieinformation. Die zentralen Ziele des DFG-Projekts "Digitale Psychologie-Information" sind 1) die Entwicklung und Propagierung eines Metadatenstandards für das Fach...
Abstract: Latest advances in the Information Technology (IT) opened up a new era, “The Digital Age”, in which every business had to adapt promptly to these advances or lose the competition. Education systems, lying in the heart of all businesses, must also be upgraded so as to supply the personnel demanded by the industry. Here, we discuss the influence of Information Technology (IT) and Instructional Technology on the current education system and the adaptation procedures to the future...
Xiao, Yunlong; Jing, Naihuan; Li-Jost, Xianqing
In Hall’s reformulation of the uncertainty principle, the entropic uncertainty relation occupies a core position and provides the first nontrivial bound for the information exclusion principle. Based upon recent developments on the uncertainty relation, we present new bounds for the information exclusion relation using majorization theory and combinatoric techniques, which reveal further characteristic properties of the overlap matrix between the measurements. PMID:27460975
The focus of the current issue 3/2014 of GMS Medizin - Bibliothek - Information is the annual conference 2014 of the German Medical Libraries Association in Mannheim. The motto of the conference was "Medical libraries: Information2". The authors in this issue are Michaele Adam (Bibliometrics 2.0 - Altmetrics in Medicine), Bruno Bauer (Open access cooperation in Austria: Open Access Network Austria and E-Infrastructures Austria - recent developments since 2012), Fabian Gail & Ulrich Korwitz (M...
Victor E. Tokman
The multiplicity of policies proposed to support the informal sector reflects the lack of a common definition. Although they may produce positive effects, these are limited and fail to constitute a comprehensive strategic approach. The different interpretations in the absence of a common definition as well as the strategies emerging from them are reviewed. The identification of informality with illegality and labour precariousness, although conceptually related, is often misleading. Lastly, i...
The Tank Waste Remediation System (TWRS) Information Systems Definition architecture evaluated information Management (IM) processes in several key organizations. The intent of the study is to identify improvements in TWRS IM processes that will enable better support to the TWRS mission, and accommodate changes in TWRS business environment. The ultimate goals of the study are to reduce IM costs, Manage the configuration of TWRS IM elements, and improve IM-related process performance.
This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The conclusion is about link between standards, which are related to security, and ITIL framework
Laura DIACONU (MAXIM); Cristian C. POPESCU
The formal and informal education has a significant impact on human capital accumulation, which is strongly influencing the growth and development of a country. While the formal education is acquired especially through the learning system, the informal one is correlated to the professional ex-perience at the workplace, both of them being considered a long-term investment. Because the educational effort is indirectly related to the preference rate in time and directly related to the school eff...
Kolm, Ann-Sofie; Larsen, Birthe
This paper develops a four sector equilibrium search and matching model with informal sector employment opportunities and educational choice. We show that underground activities reduce educational at- tainments if informal employment opportunities mainly are available to low educated workers. More zealous enforcement policy will in this case improve educational incentives as it reduces the attractiveness of remaining a low educated worker. Characterizing the optimal enforce-...
Klievink, A.J.; Aldewereld, H.M.; Knol, A.; Tan, Y. H.
The Extended Single Window (ESW) project aims to support goods flows by Information and Communication Technology (ICT). Specifically, the project takes the concept of Single Windows (often used in the sense that governments offer a single portal or interface to which businesses can submit information, supporting re-ruse by multiple agencies and coordination of government activities) and includes the business side; creating an Extended Single Window. An Extended Single Window includes business...
Emin M. Dinlersoz; Mehmet Yorukoglu
This paper develops a model of industry dynamics where firms compete to acquire customers over time by disseminating information about themselves in the presence of random shocks to their efficiency. The properties of the model's stationary equilibrium are related to empirical regularities on firm and industry dynamics. As an application of the model, the effects of a decline in the cost of information dissemination on firm and industry dynamics are explored. (JEL D11, D83, L11, L81, M37)
The Summary Information Report (SIR) provides summary data concerning NRC and its licensees for general use by the Chairman, other Commissioners and Commission staff offices, the Executive Director for Operations, and the Office Directors. SIR is published quarterly by the Management Information Branch (49-27834) of the Office of Resource Management. This branch was formerly part of the Office of Management and Program Analysis
A recent paper by Hartle [Phys. Rev. D 51, 1800 (1995)] proposes a definition of "spacetime information" - the information available about a quantum system's boundary conditions in the various sets of decohering histories it may display - and investigates its properties. We note here that Hartle's analysis contains errors which invalidate several of the conclusions. In particular, the proof that the proposed definition agrees with the standard definition for ordinary quantum mechanics is inva...
Vitányi, P.M.B.; Balbach, F.J.; Cilibrasi, R.L.; M. Li
The normalized information distance is a universal distance measure for objects of all kinds. It is based on Kolmogorov complexity and thus uncomputable, but there are ways to utilize it. First, compression algorithms can be used to approximate the Kolmogorov complexity if the objects have a string representation. Second, for names and abstract concepts, page count statistics from the World Wide Web can be used. These practical realizations of the normalized information distance can then be a...
Nice : IEEE, 2007, s. 41-44. ISBN 978-1-4244-1397-3. [IEEE International Symposium on Information Theory 2007. Nice (FR), 24.06.2007-29.06.2007] R&D Projects: GA AV ČR IAA100750603; GA ČR GA201/04/0393 Institutional research plan: CEZ:AV0Z10750506 Keywords : information inequality * entropy function * matroid * polymatroid * cones Subject RIV: BA - General Mathematics
Quinn, Christopher J.; Kiyavash, Negar; Coleman, Todd P.
We propose a graphical model for representing networks of stochastic processes, the minimal generative model graph. It is based on reduced factorizations of the joint distribution over time. We show that under appropriate conditions, it is unique and consistent with another type of graphical model, the directed information graph, which is based on a generalization of Granger causality. We demonstrate how directed information quantifies Granger causality in a particular sequential prediction s...
Pratheepa, Maria; Jalali, Sushil Kumar; Arokiaraj, Robinson Silvester; Venkatesan, Thiruvengadam; Nagesh, Mandadi; Panda, Madhusmita; Pattar, Sharath
Insect Barcode Information System called as Insect Barcode Informática (IBIn) is an online database resource developed by the National Bureau of Agriculturally Important Insects, Bangalore. This database provides acquisition, storage, analysis and publication of DNA barcode records of agriculturally important insects, for researchers specifically in India and other countries. It bridges a gap in bioinformatics by integrating molecular, morphological and distribution details of agriculturally ...
Siegel, S. [National Library of Medicine, Bethesda, MD (United States)
An increased level of mathematical sophistication will be needed in the future to be able to handle the spectrum of information as it comes from a broad array of biological systems and other sources. Classification will be an increasingly complex and difficult issue. Several projects that are discussed are being developed by the US Department of Health and Human Services (DHHS), including a directory of risk assessment projects and a directory of exposure information resources.
Information security standards, best practices and literature all identify the need for Training & Awareness, the theory is clear. The surveys studied show that in the real world the situation is different: the focus of businesses is still on technical information security controls aimed at the external attacker. And although threats and vulnerabilities point out that personnel security becomes more important, the attitude of managers and employees does not reflect tha...
The recording of information on triple plus polio and rubella immunizations is reviewed and immunization rates determined for patients in a single-handed practice. Rates of triple plus polio immunizations are satisfactory but rates for rubella immunization are very poor. Immunization information is not exchanged between different sections of the Health Service in Stoke-on-Trent and so the general practitioner has no reliable immunization record for his patients.
Khadka, Ganesh Bahadur
This thesis is a part of investigation to explain the relationship between information technology and innovation. MORSA ,Mobile Optimized Restaurant Service Application, was developed as a means of information technology by upgrading with new features comparing with currently existing online application service for restaurant businesses. With the help of MORSA,this research was conducted by examining its potentiaily to explain the relationship with different types of innovations. Moreover,...
Allen, Karin; DiJohn, Joseph; Misek, Shamus
The Transportation Information Clearinghouse (TIC) Project was the result of collaboration among the Regional Transportation Authority, the Workforce Boards of Metropolitan Chicago and the Urban Transportation Center (UTC) at the University of Illinois at Chicago (UIC). The primary objective of the project was to identify privatelyprovided, employer-based, non-traditional transportation services in operation as well as specific information about these services in order for employers, Workforc...
Healthcare executives facing the challenges of delivering quality care and controlling costs must consider the role information technology systems can play in meeting those challenges. To make the best use of information system expenditures, organizations must carefully plan how to finance system acquisitions. Some options that should be considered are paying cash, financing, financing "soft" costs, leasing, credit warehousing and early acceptance financing, and tax-exempt and conduit financing. PMID:10154097
En este Trabajo de Fin de Grado se ha procedido a la elaboración de un informe social sobre una situación de una persona con discapacidad física. El trabajo está estructurado en diferentes apartados. Incluye un contexto determinado donde se enmarca el trabajo, la legislación vigente aplicable a este caso, el propio informe social con los apartados correspondientes y finalmente la bibliografía consultada.
@@ Previously founded as CCPITMachinery and Electronics Sub-council and CCOIC Machinery and Electronics Chamber of Corn-merce in June, 1988, CCPIT Electronics Sub-Council and CCOIC Electronics Chamber of Commerce were established in May, 1993, and then renamed as CCPIT Electronics and Information Industry Sub-council and CCOIC Electronics and Infor-mation Industry Chamber of Commerce (CCPITECC) in September 1999.
M. Paul Gough
Full Text Available LandauerÃ¢Â€Â™s principle is applied to information in the universe. Once stars began forming there was a constant information energy density as the increasing proportion of matter at high stellar temperatures exactly compensated for the expanding universe. The information equation of state was close to the dark energy value, w = -1, for a wide range of redshifts, 10 > z > 0.8, over one half of cosmic time. A reasonable universe information bit content of only 1087 bits is sufficient for information energy to account for all dark energy. A time varying equation of state with a direct link between dark energy and matter, and linked to star formation in particular, is clearly relevant to the cosmic coincidence problem. In answering the Ã¢Â€Â˜Why now?Ã¢Â€Â™ question we wonder Ã¢Â€Â˜What next?Ã¢Â€Â™ as we expect the information equation of state to tend towards w = 0 in the future.c
BNF is the UK nuclear industry's representative organisation and its membership is inclusive of the entire civil nuclear industry in the Britain. BNF members include Britain's two nuclear electricity generating companies, Nuclear Electric and Scottish Nuclear, who between them manage the seventeen nuclear power stations which provide approximately 20% of the country's generating capacity. An important role of the Forum is to act as the information centre for the industry as a whole and during 1992, the Forum has strengthened its information service with the setting up of an extensive, computer-based network. The network has been established to provide an effective way of managing UK domestic nuclear-related issues and for maximising the news value of our industry's achievements. Equally important is the service's role as an international source of information - particularly when nuclear incidents occur outside the UK. The Forum also acts as an international exchange centre, disseminating technical information, for example, and by promptly providing accurate and comprehensive information to minimise the potential damage to public confidence in nuclear power generation which may be caused by any reported nuclear incidents. Recent examples of the successful operation of the BNF information service and its communications network have been the Leningradskya incident in March 1992 and the hurricane Andrew situation which developed at the end of August 1992
Elements of Quantum Information introduces the reader to the fascinating field of quantum information processing, which lives on the interface between computer science, physics, mathematics, and engineering. This interdisciplinary branch of science thrives on the use of quantum mechanics as a resource for high potential modern applications. With its wide coverage of experiments, applications, and specialized topics - all written by renowned experts - Elements of Quantum Information provides and indispensable, up-to-date account of the state of the art of this rapidly advancing field and takes the reader straight up to the frontiers of current research. The articles have first appeared as a special issue of the journal 'Fortschritte der Physik / Progress of Physics'. Since then, they have been carefully updated. The book will be an inspiring source of information and insight for anyone researching and specializing in experiments and theory of quantum information. Topics addressed in Elements of Quantum Information include - Cavity Quantum Electrodynamics - Segmented Paul Traps - Cold Atoms and Bose-Einstein Condensates in Microtraps, Optical Lattices, and on Atom Chips - Rydberg Gases - Factorization of Numbers with Physical Systems - Entanglement of Continuous Variables - NMR and Solid State Quantum Computation - Quantum Algorithms and Quantum Machines - Complexity Theory - Quantum Crytography. (orig.)
Loken, S.C. [ed.
The emphasis in Information Technology (IT) development has shifted from technology management to information management, and the tools of information management are increasingly at the disposal of end-users, people who deal with information. Moreover, the interactive capabilities of technologies such as hypertext, scientific visualization, virtual reality, video conferencing, and even database management systems have placed in the hands of users a significant amount of discretion over how these resources will be used. The emergence of high-performance networks, as well as network operating systems, improved interoperability, and platform independence of applications will eliminate technical barriers to the use of data, increase the power and range of resources that can be used cooperatively, and open up a wealth of possibilities for new applications. The very scope of these prospects for the immediate future is a problem for the IT planner or administrator. Technology procurement and implementation, integration of new technologies into the existing infrastructure, cost recovery and usage of networks and networked resources, training issues, and security concerns such as data protection and access to experiments are just some of the issues that need to be considered in the emerging IT environment. As managers we must use technology to improve competitiveness. When procuring new systems, we must take advantage of scalable resources. New resources such as distributed file systems can improve access to and efficiency of existing operating systems. In addition, we must assess opportunities to improve information worker productivity and information management through tedmologies such as distributed computational visualization and teleseminar applications.
The Public Information Plan is intended to be used in conjunction with the DOE-UMTRA Project ''Public Participation Plan'' to describe the Department of Energy's plan for involving the public in the decision-making process related to the Uranium Mill Tailings Remedial Action (UMTRA) Project. This project was authorized by Congress in the Uranium Mill Tailings Radiation Control of Act of 1978, PL95-604. The Act provides for a cooperative effort with affected states and Indian tribes for the cleanup of designated abandoned or inactive uranium mill tailings sites. The objective of the Public Information Plan of the UMTRA Project is timely and sufficient dissemination of factual information to promote understanding of the project by federal, state, and local officials, the media, special interest groups, and the general public; and thereby to encourage informed participation in the project by the public and government officials. The Uranium Mill Tailings Radiation Control Act provides for public involvement in remedial action planning, with special consideration given to landowners, Indian tribes, and the states. According to the Act, the Secretary of Energy shall hold public hearings in the states where processing sites, vicinity properties, and disposal sites are located. Public participation in the UMTRA Project will not, however, be limited to those mechanisms formally required by law. The public may also be involved informally through informational meetings, workshops, and local citizens' task forces. 12 refs., 2 figs., 1 tab
Parmalee, J C; Scholomiti, T O; Whitman, P; Sees, M; Smith, D; Gardner, E; Bastian, C
Despite the problems we encountered, which are not uncommon with the development and implementation of any data system, we are confident that our success in achieving our goals is due to the following: establishing a reliable information database connecting several related departments; interfacing with registration and billing systems to avoid duplication of data and chance for error; appointing a qualified Systems Manager devoted to the project; developing superusers to include intensive training in the operating system (UNIX), parameters of the information system, and the report writer. We achieved what we set out to accomplish: the development of a reliable database and reports on which to base a variety of hospital decisions; improved hospital utilization; reliable clinical data for reimbursement, quality management, and credentialing; enhanced communication and collaboration among departments; and an increased profile of the departments and staff. Data quality specialists, Utilization Management and Quality Management coordinators, and the Medical Staff Credentialing Supervisor and their managers are relied upon by physicians and administrators to provide timely information. The staff are recognized for their knowledge and expertise in their department-specific information. The most significant reward is the potential for innovation. Users are no longer restricted to narrow information corridors. UNIX programming encourages creativity without demanding a degree in computer science. The capability to reach and use diverse hospital database information is no longer a dream. PMID:10139109
Pindyck, J P; Barber, B; Miller, L J; Lammers, S E; Merton, V; Hubbard, J B; Mauer, A M; Taswell, H F; Surgenor, D M
Informed consent from a cytapheresis donor is the culmination of a complex decision making process during which the blood collecting agency presents sufficient information to enable the donor to make a free choice whether or not to donate. The institution bears the responsibility for providing all information relevant to the donor's decision, whether favorable or unfavorable. At no other stage of its contact with the donor can a collecting agency discharge its public trust more meaningfully. Thus, informed consent is not only the greatest altruistic expression from the unrelated volunteer donor, or the expression of deepest commitment to the family for the related donor, it is also the fullest expression of the value which the institute places on the autonomy of the donor. The foundation upon which the concept of informed consent rests has been laid by law, medicine, government, ethics, and religion. Although the procedures accompanying the informed consent process appear bureaucratic, they should be viewed as the components of a remarkable, dynamic process. The consent of a donor to undergo cytapheresis is an eloquent statement of the value he or she places on the importance of another human being's life. PMID:6546055
Belew, W.W.; Wood, B.L.; Marie, T.L.; Reinhardt, C.L.
The results of a series of telephone interviews with groups of users of information on photovoltaics (PV) are described. These results, part of a larger study on many different solar technologies, identify types of information each group needed and the best ways to get information to each group. The report is 1 of 10 discussing study results. The overall study provides baseline data about information needs in the solar community. It covers these technological areas: photovoltaics, passive solar heating and cooling, active solar heating and cooling, biomass energy, solar thermal electric power, solar industrial and agricultural process heat, wind energy, ocean energy, and advanced energy storage. An earlier study identified the information user groups in the solar community and the priority (to accelerate solar energy commercialization) of getting information to each group. In the current study only high-priority groups were examined. Results from seven PV groups respondents are analyzed in this report: DOE-Funded Researchers, Non-DOE-Funded Researchers, Researchers Working for Manufacturers, Representatives of Other Manufacturers, Representatives of Utilities, Electric Power Engineers, and Educators.
Elmore, Ralph B.
As the overall manager and integrator of International Space Station (ISS) science payloads, the Payload Operations Integration Center (POIC) at Marshall Space Flight Center has a critical need to provide an information management system for exchange and control of ISS payload files as well as to coordinate ISS payload related operational changes. The POIC's information management system has a fundamental requirement to provide secure operational access not only to users physically located at the POIC, but also to remote experimenters and International Partners physically located in different parts of the world. The Payload Information Management System (PIMS) is a ground-based electronic document configuration management and collaborative workflow system that was built to service the POIC's information management needs. This paper discusses the application components that comprise the PIMS system, the challenges that influenced its design and architecture, and the selected technologies it employs. This paper will also touch on the advantages of the architecture, details of the user interface, and lessons learned along the way to a successful deployment. With PIMS, a sophisticated software solution has been built that is not only universally accessible for POIC customer s information management needs, but also universally adaptable in implementation and application as a generalized information management system.
The strengthening of safeguards should not be limited to the verification of explicit declarations made by the States. Additional information should guide the IAEA to set priorities for further investigations. Not only all aspects of the State's nuclear programme, including the application of safe, secure and transparent nuclear management, but also the level of compliance with other verifiable treaties, political motivation, economic capabilities, international relations and ties, co-operative attitude to safeguards, and general openness and transparency should be included. The evaluation of the diverse forms of information from different sources requires new reliable processes that will result in a high credibility and detection probability. The IAEA uses the physical model for the evaluation of the technical information, and proposed also Fuzzy Logic, or Calculation with Words, to handle the information. But for the evaluation it is questioned whether fuzziness could lead to a crisp judgement. In this paper an objective method of information evaluation is proposed, which allows to integrate different kinds of information and to include calibration and tests in the establishment of the evaluation process. This method, Delta, uses elicitation of a syndicate of experienced inspectors to integrate obvious indicators together with apparently innocent indicators, into a database that forms the core of the evaluation process. Nominal or ordinal scales could be applied to come to an objective and quantifiable result. Experience with this method can in the course of time result in predictive conclusions. 9 refs
Full Text Available This paper has set the objective of researching how education is influenced by the information society. The first step was to define more precisely the information space. The second step was to identify how information space intersects with the family space and institutional space educational levels represented by pre-school / school and pre-university (kindergarten, at elementary / middle school / high school. Interrelationship between the above mentioned areas was another objective of the research. All these elements have been investigated through the original intention to identify how the information space can become an educational tool to support the family space, education and institutional space. Also, the aim of this research is to offer some solutions in this regard. Often the educational efforts appear to be blocked by the existence of this space. But this paper demonstrates that Informational space can be an enemy of the educational system or can support systems if we knew the internal structure and mechanisms. We can make the Informational Space to work in order to accomplish the educational scope.
This article is a chapter from the paper, Elements for the description of an environmental information system, which was written by the author as a requirement for the degree of specialist on environment and Geoinformatics at the school of engineering. Universidad de Antioquia. The original paper attempted a description of the context and development of a particular environmental information system, built at the eastern region of Antioquia by CORNARE (a regional autonomous corporation for the environment and the natural resources). This article refers to the Colombian institutional context for environmental information. With particular emphasis laid on the strategic character that must be conceded to the administration of information. Towards the construction of equitable and sustainable development models under autonomous orientation an efficient and transparent environmental administration as is needed by such models is only attainable through the design and application of environmental information systems committed to the pursuit of collective interests. Here a balance is sought between accomplishments and failures reached during the long standing discussion held in Colombia around the formulation of public policies that acknowledge and strengthen the role of information as a cornerstone of environmental administration, and a contribution towards the goal of human sustainable development
Many concepts of information have been proposed and discussed in library and information science. These concepts of information can be broadly categorized as empirical and situational information. Unlike nomenclatures in many sciences, however, the concept of information in library and information science does not bear a generally accepted…
different underlying concepts: Information Management 1: information management at institutional level. Information Management 2: contentoriented information management, rooted in information science and Information Management 3: technologyoriented information management, rooted in information systems. A......This paper addresses the need for a coherent conceptual framework for information management. The paper discusses the field of information management as represented by existing analyses of author affiliations, and a distinction is introduced between information management at institutional level and...... information management at conceptual level. Conceptual frameworks should be founded on concepts. One of the challenges of developing a framework is to delimit the area of inquiry. Is information management a discipline in its own right, or is information management several disciplines? Little research has...
Nakajima, K.; Haruna, T.
Recently, the permutation-information theoretic approach has been used in a broad range of research fields. In particular, in the study of high-dimensional dynamical systems, it has been shown that this approach can be effective in characterizing global properties, including the complexity of their spatiotemporal dynamics. Here, we show that this approach can also be applied to reveal local spatiotemporal profiles of distributed computations existing at each spatiotemporal point in the system. J. T. Lizier et al. have recently introduced the concept of local information dynamics, which consists of information storage, transfer, and modification. This concept has been intensively studied with regard to cellular automata, and has provided quantitative evidence of several characteristic behaviors observed in the system. In this paper, by focusing on the local information transfer, we demonstrate that the application of the permutation-information theoretic approach, which introduces natural symbolization methods, makes the concept easily extendible to systems that have continuous states. We propose measures called symbolic local transfer entropies, and apply these measures to two test models, the coupled map lattice (CML) system and the Bak-Sneppen model (BS-model), to show their relevance to spatiotemporal systems that have continuous states. In the CML, we demonstrate that it can be successfully used as a spatiotemporal filter to stress a coherent structure buried in the system. In particular, we show that the approach can clearly stress out defect turbulences or Brownian motion of defects from the background, which gives quantitative evidence suggesting that these moving patterns are the information transfer substrate in the spatiotemporal system. We then show that these measures reveal qualitatively different properties from the conventional approach using the sliding window method, and are also robust against external noise. In the BS-model, we demonstrate that
The Nuclear Regulatory Authority of the Slovak Republic (UJD) is around to serve the public. This is a regulatory institution that furnishes truthful and independent information on nuclear safety of nuclear installations, including information on management of radioactive wastes, spent fuel, nuclear materials, control and record-keeping thereof, as well as information on other fuel cycle phases. UJD seeks to provide information in an orderly, accurate and comprehensible manner in such a way that it cannot be disclaimed, as the public has the right to know the truth. In formulating information, regularity, consistency and openness are of high importance, because information presented cannot serve a controversy. UJD furnishes information independently and separately from that issued by nuclear power plant operators. As a central administration authority, UJD provides on request, within the field of its responsibility, in particular the information on safety of nuclear energy installations independently from nuclear programme implementers, allowing the public and the media to check up the data and information thereon. A significant element of the information is the demonstration that the area of nuclear energy uses in the Slovak Republic has its binding rules and the compliance therewith is controlled by the state through an independent institution - UJD. As early as in 1995 the foundations laid were at UJD for the concept for broad public information on UJD activity and on safety of nuclear installations by opening UJD Information Centre. This Centre provides communication with the public and the media, thereby contributing to fashioning among the public a favourable image of the independent state supervision over nuclear safety. The Information Centre was extended in 2000. In 2000, 76 contributions on domestic and foreign UJD activities were sent in to Slovak press agencies, dailies and electronic media. UJD is together with the SUJB the publisher of the journal
Full Text Available The papers in this Special Issue of Informing Science highlight research areas in the interdisciplinary field of Information Science. Key research problems for Information Science include: (1 how to model and effectively support human information behaviors, including information seeking and use behaviors, and interaction with information retrieval (IR technologies, (2 how information should be organized intellectually in IR technologies for more effective human information retrieval, and (3 the organizational, social and policy implications for the information society of human information behaviors. Information Scientists are concerned with how people's information problems can be resolved. In this way, information science is an important part of the "informing sciences". Information Science has largely borrowed theories and approaches from other disciplines - but is now attracting attention from other disciplines as a generator of theory and models that delineate key areas of human information-related endeavors. As humans struggle to seek and use information within the plethora of information sources increasingly available via the Web, Information Science research is taking center stage. Each paper in this special issue is written by an expert in their area of Information Science research.
Givens, Cherie L
...; ] DEPARTMENT OF AGRICULTURE Forest Service Information Collection; Financial Information Security Request Form... Information Security Request Form. DATES: Comments must be received in writing on or before July 23, 2010 to... INFORMATION: Title: Financial Information Security Request Form. OMB Number: 0596-0204. Expiration Date...
Full Text Available Electromagnetic leakage will happen in working information equipments; it could lead to information leakage. In order to discover the nature of information in electromagnetic leakage, this paper combined electromagnetic theory with information theory as an innovative research method. It outlines a systematic model of electromagnetic information leakage, which theoretically describes the process of information leakage, intercept and reproduction based on electromagnetic radiation, and analyzes amount of leakage information with formulas.
Brukner, Caslav; Zeilinger, Anton
The violation of local realism is today a well established experimental fact. From it follows that either locality or realism or both cannot provide a foundational basis of Nature. Relaxing the locality condition would essentially not change the epistemological structure of classical physics but only extend its limits. Abandonment of reality, however, would require a radical revision of the conceptual background of all our theories so far. Is a novel conceptual basis of quantum theory feasible, in which the impossibility of defining external reality independent and prior to observation naturally emerges? We suggest the finiteness of information content of a quantum system as providing such basis. Any realistic theory that could arrive at an accurate prediction of a particular event would require the system to carry information as to which specific result will be observed for all possible future measurements. Because the system cannot carry more information than is in principle available, there must exist measurements for which individual events contain an element of irreducible randomness. Quantum entanglement arises from the possibility that information in a composite system resides more in the correlations than in properties of individuals. In the talk we will report on recent efforts towards providing derivations of the elements of the Hilbert space structure from the quantization of information.
In this paper author deals with the different form of storage of nuclear information and their senescence. So much expert information is being destroyed or exists only in the heads of an aging population. How is that to be preserved for the younger generation? In summary, there are at least four problems: (a) Understanding that information did not begin with the web-there is prior knowledge, (b) Preserving the expertise and knowledge of those who will shortly not be available to the industry, (c) Preserving information presently in many forms in physical storage, and (d) Funding this work -it is not negligible. The first part of the solution is to make the problem known. Administrators must be persuaded that the issue is important and that money needs to be allocated to preserving your nuclear heritage. The second part of the solution is to make sure that the young generation has access to older information and knows how to use it. A third part of the solution is to include this subject - as a matter of international importance - in technical conferences, to raise the profile of the issue. (author)
The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, state, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are: (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory lists some of the Government offices and trade associations that are involved in energy matters. It includes those DOE offices which deal with the public or public information. For the purposes of this publication, each entry has been given a numeric identification symbol. The index found in the back of this publication uses these identification numbers to refer the reader to relevant entries.
Information management is a key element for success for any planned activity. The same gains more importance in managing unplanned or off-normal activity. Availability of timely information is therefore a definite pre-requisite to success in handling the emergency/off-normal situations (mock or real). To meet this requirement of effectively managing various information being received during such conditions, Health Physics Unit at RAPS-5 and 6 has conceived, designed, developed and implemented a comprehensive integrated network based system, named Emergency Information Management System (ElMS). The system is highly scalable in terms of number of users and client systems. In addition, it may be extended to a decision support system which will assist the advisory groups in taking decision in light of incoming inputs/data. This system is highly helpful in organizing, presenting and displaying information in an orderly manner so as to help in handling, re-evaluation and reinforcing steps to mitigate the consequences and ensure optimum utilization of resources. The need of such a system has always been felt and its usage during recent wide scale Off-site emergency exercise at Rawatbhata Rajasthan Site has proven its advantages
Kish, Laszlo B
Does information have mass? This question has been asked many times and there are many answers even on the Internet, including on Yahoo Answers. Usually the answer is "no". Attempts have been made to assess the physical mass of information by estimating the mass of electrons feeding the power-guzzling computers and devices making up the Internet, the result being around 50 gram. Other efforts to calculate the mass of information have assumed that each electron involved in signal transfer carries one bit of information, which makes the corresponding mass to be about 10^-5 gram. We address the fundamental question of minimum mass related to a bit of information from the angles of quantum physics and special relativity. Our results indicate that there are different answers depending on the physical situation, and sometimes the mass can even be negative. We tend to be skeptical about the earlier mass estimations, mentioned above, because our results indicate that the electron's mass does not play a role in any on...
Fogle, T. [American Society for Nondestructive Testing, Columbus, OH (United States)
The demand for increased accessibility, more timely delivery of results, and international coverage of standards, technology, and business has made the information center look for more effective ways to serve its members. The current trend to meet demand in many technical settings is with a virtual library. While the definition may vary from library to library, a virtual library universally implies electronic integration of new services with traditional library services. Today, fax machines, on-line information systems, electronic bulletin boards, CD-ROM products, World Wide Web sites, and E-mail are vital in providing members cost and time saving services in their pursuit of quality and excellence. The purpose of this paper is to provide a clear vision of the information center and its integration of conventional and on-line services. The NDT database which was purchased from the Atomic Energy Commission located in the United Kingdom, maintains thousands of NDT related articles dating from 1967 to the present. It is searchable and can be accessed by subject, author, and title. Thanks to this informational tool one can now access information in minutes, disseminate it, and get it to the patron the same day requested. And while traditional printed materials such as textbooks, directories, and indexes are still consulted, with today`s technology even they can be disseminated faster.
Our current understanding of mental processes in health and disease is limited by the absence of a practical model describing the physiology of the mind as an informational system. The mind is described here as a physical system with four functional dimensions that can be interrelated mathematically on the basis of information theory. These variables describe the information processing activities of the mind, and include: a) a state function (g), which is the number of potential states that the system can occupy at a given time and relates to the complexity and activity of the brain; b) a power function (P), the number of state changes per unit time; c) time (t); and d) the relative entropy of the system (R), which describes the ordering of mental states in time. Using these variables, the evolution of states of mind can be described as a trajectory in a multidimensional phase space representing all possible mental states. Ego functions constrain the field of brain states within this space, thereby giving rise to the information content of consciousness and to the individual psyche. Functional mental disorders, as disorders of the psyche, are dysfunctions in the ordering processes that give rise to conscious information. PMID:8501460
Recently, quantum information theory has been developing through a fusion of results from various research fields. This requires that understanding of basic results on diverse topics, and derived from different disciplinary perspectives, is required for appreciating the overall picture. Intended to merge key topics from both the information-theoretic and quantum- mechanical viewpoints, this graduate-level textbook provides a unified viewpoint of quantum information theory and lucid explanations of those basic results, so that the reader fundamentally grasps advances and challenges. For example, advanced topics in quantum communication such as quantum teleportation, superdense coding, quantum state transmission (quantum error-correction), and quantum encryption especially benefit from this unified approach. Unlike earlier treatments, the text requires knowledge of only linear algebra, probability theory, and quantum mechanics, while it treats the topics of quantum hypothesis testing and the discrimination of q...
Full Text Available In precarious environments, such as squatter settlements, sustainability can be achieved as an economic resource. It is important, however, to start with assuring a sense of belonging in the members of the communities. Through observation in squatter settlements and conversations with their inhabitants, this paper presents a view on informal sustainability through participativeprocesses. We argue that if we begin by looking at cultural sustainability, people’s sense of belonging becomes a key factor in taking care of the environment. We aim to demonstrate that even if squatter settlements are regarded as areas of conflict in terms of pollution, occupation of the land, and waste disposal, through informal processes people can achieve a degree of awareness that will not only result in sustainable practices, but that can also propose new creative ways to achieve them, witheconomical considerations in mind.Keywords: Cultural sustainability, informality, human development, squatter settlements, identity
Luciano Floridi develops an original ethical framework for dealing with the new challenges posed by Information and Communication Technologies (ICTs). ICTs have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, health care, industrial production and business, social relations, and conflicts. They have had a radical and widespread impact on our moral lives and on contemporary ethical debates. Privacy, ownership, freedom of speech, responsibility, technological determinism, the digital divide, and pornography online are only some of the pressing issues that characterise the ethical discourse in the information society. They are the subject of Information Ethics (IE), the new philosophical area of research that investigates the ethical impact of ICTs on human life and society. Since the seventies, IE has been a standard topic in many curricula. In recent years, there has been a flourishing of new university courses, international conferences, workshop...
Kwok, Chung T.; Weld, D.S. [Univ. of Washington, Seattle, WA (United States)
We describe Occam, a query planning algorithm that determines the best way to integrate data from different sources. As input, Occam takes a library of site descriptions and a user query. As output, Occam automatically generates one or more plans that encode alternative ways to gather the requested information. Occam has several important features: (1) it integrates both legacy systems and full relational databases with an efficient, domain-independent, query-planning algorithm, (2) it reasons about the capabilities of different information sources, (3) it handles partial goal satisfaction i.e., gathers as much data as possible when it can`t gather exactly all that the user requested, (4) it is both sound and complete, and (5) it is efficient. We present empirical results demonstrating Occam`s performance on a variety of information gathering tasks.
This edited book presents scientific results of the 15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016) which was held on June 26– 29 in Okayama, Japan. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 12 of the conference’s most promising...
Kawa, Jacek; Wieclawek, Wojciech
New computerized approaches to various problems have become critically important in healthcare. Computer assisted diagnosis has been extended towards a support of the clinical treatment. Mathematical information analysis, computer applications have become standard tools underpinning the current rapid progress with developing Computational Intelligence. A computerized support in the analysis of patient information and implementation of a computer aided diagnosis and treatment systems, increases the objectivity of the analysis and speeds up the response to pathological changes. This book presents a variety of state-of-the-art information technology and its applications to the networked environment to allow robust computerized approaches to be introduced throughout the healthcare enterprise. Image analysis and its application is the traditional part that deals with the problem of data processing, recognition and classification. Bioinformatics has become a dynamically developed field of computer assisted biologic...
Hockett, P; Wollenhaupt, M; Baumert, T
Photoelectron interferograms, manifested in photoelectron angular distributions (PADs), are a high-information, coherent observable. In order to obtain the maximum information from angle-resolved photoionization experiments it is desirable to record the full, 3D, photoelectron momentum distribution. Here we apply tomographic reconstruction techniques to obtain such 3D distributions from multiphoton ionization of potassium atoms, and fully analyse the energy and angular content of the 3D data. The PADs obtained as a function of energy indicate good agreement with previous 2D data and detailed analysis [Hockett et. al., Phys. Rev. Lett. 112, 223001 (2014)] over the main spectral features, but also indicate unexpected symmetry-breaking in certain regions of momentum space, thus revealing additional continuum interferences which cannot otherwise be observed. These observations reflect the presence of additional ionization pathways and, most generally, illustrate the power of maximum information measurements of th...
The information portal will provide IAEA staff with a computer interface to access data world wide based on queries for information by geographic areas, such as a country or location in a country. Internal IAEA sources could also be accessed. An open architecture is proposed that could utilise existing and future applications and tools. The proposed approach also would be able to integrate with the IAEA ISIS Re-engineering Project (IRP). The first phase of the 'Integrated Information Portal' (IIP) was presented at the last INMM meeting in Phoenix. The system utilizes state-of-the-art geospatial tools, ESRI ArcIMS Web Services and GeoTango GlobeView for the development of the IIP. The user requirements, system design, and the initial prototype were presented. This project is one of the initiatives sponsored by Canadian Safeguards Support Program in support of the International Atomic Energy Agency (IAEA). The goal is to develop an easy-to-use, effective on-line tool to support timely decision making. This paper presents the development of a prototype of the IIP concept using ArcIMS/ArcGIS/ArcWeb Services. The prototype includes several case studies using open-source information readily available from the Web to illustrate the simplicity in navigational tools which would be useful for decision makers. It has been envisaged that available open-source information on the Web could be a valuable source of information for the IAEA as many of the data sources are generally reliable, up-to-date, public, and cost-free or at nominal cost. The IIP is designed as a global and web-based information portal to support timely and informed decisions by using multi-source information access; however, with proper access control, link to protected confidential databases including those of the IAEA can be readily incorporated in its open-architecture design. In this prototype, GIS users would search for geographic information and connect to the portal for information access. The search
Enemark, Stig; McLaren, Robin
. This is directly linked to citizen participation in the process of land use control. Decentralisation should aim to combine responsibility for decision making with accountability for financial, social, and environmental consequences. Decentralisation requires access to appropriate quality of land......The issue of informal development was discussed in details at the joint FIG Com 3 and UNECE/WPLA workshop in Sounio, Greece, March 2007. Emphasis was given to the scale of the problem in Southern and Eastern Europe and to means of legalising such informal urban development. This paper, instead......, addresses the main issue of how to prevent informal urban development, especially through the use of adequate and sustainable means of land use control and good governance. Three key means are addressed: Decentralisation: There is a need to separate central policy/regulation making and local decision making...
INFORM’ACTION Commission ! It’s all in the title ! At a time when one of the keywords is COMMUNICATE, the Staff Association has a duty to take it seriously. This is why, among other reasons, the youngest of the Staff Association internal commissions was created in 20005. As its name indicates, this commission is responsible for INFORMING, TRAINING (FORMER) and organizing ACTIONs. INFORMING : The members of this commission endeavour to work using all imaginable and known channels of information: articles, emails, alerts, posters, web site, organizing meetings, distributing flyers, banners, videos, etc. In 2009 a new web site (http://cern.ch/association) was put on line. Since then this site has been continually updated to provide information regarding the latest news in the social domain (Pension Fund, CHIS, 5YR), and also special offers for our members, club news, and social and cultural activities. In 2009 and 2010, the Staff Association notice boards were ...
The hospital materials management function--ensuring that goods and services get from a source to an end user--encompasses many areas of the hospital and can significantly affect hospital costs. Performing this function in a manner that will keep costs down and ensure adequate cash flow requires effective management of a large amount of information from a variety of sources. To effectively coordinate such information, most hospitals have implemented some form of materials management information system (MMIS). These systems can be used to automate or facilitate functions such as purchasing, accounting, inventory management, and patient supply charges. In this study, we evaluated seven MMISs from seven vendors, focusing on the functional capabilities of each system and the quality of the service and support provided by the vendor. This Evaluation is intended to (1) assist hospitals purchasing an MMIS by educating materials managers about the capabilities, benefits, and limitations of MMISs and (2) educate clinical engineers and information system managers about the scope of materials management within a healthcare facility. Because software products cannot be evaluated in the same manner as most devices typically included in Health Devices Evaluations, our standard Evaluation protocol was not applicable for this technology. Instead, we based our ratings on our observations (e.g., during site visits), interviews we conducted with current users of each system, and information provided by the vendor (e.g., in response to a request for information [RFI]). We divided the Evaluation into the following sections: Section 1. Responsibilities and Information Requirements of Materials Management: Provides an overview of typical materials management functions and describes the capabilities, benefits, and limitations of MMISs. Also includes the supplementary article, "Inventory Cost and Reimbursement Issues" and the glossary, "Materials Management Terminology." Section 2. The
Zhou, Hong; Chan, Syin; Lai, Kok-Fung
In this paper, we present an approach in implementing intelligent information retrieval systems. We have constructed a multilingual information system which combines both image and text retrieval. We have developed an English/Chinese text retrieval tool on the WWW, and later incorporated an image retrieval tool based on associated multilingual captions. The system allows the general public to locate and keep abreast of information about Singapore. It has a novel user interface which accepts queries that are expressed in English, Chinese and mixed text into its database. The titles, summaries, URLs and the matching scores of retrieved documents will then be returned, and a thumbnail will be displayed as well if an image document is retrieved.
The paper presents a conceptual understanding in the areas of Cadastre, Land Administration, and Land Management as a basis for building adequate land information policies. To develop this understanding the paper looks at each area as a system or an infrastructure designed for handling specific...... measurement science, spatial information, management, and land management. (2) To establish national professional associations which accommodate a modern interdisciplinary profile. (3) To assess the capacity needs in land administration and to develop the capacity needed at societal, institutional and...... personal level. (4) To establish appropriate institutional and organisational infrastructures to manage the integration of topographic mapping and cadastral information into a coherent land administration system for sustainable development. The paper aims to establish the basic understanding for dealing...
The paper introduces the research area of interactive information retrieval (IIR) from a historical point of view. Further, the focus here is on evaluation, because much research in IR deals with IR evaluation methodology due to the core research interest in IR performance, system interaction and...... satisfaction with retrieved information. In order to position IIR evaluation, the Cranfield model and the series of tests that led to the Cranfield model are outlined. Three iconic user-oriented studies and projects that all have contributed to how IIR is perceived and understood today are presented: The....... As a response to this call the ‘IIR evaluation model’ by Borlund (e.g., 2003a) is introduced. The objective of the IIR evaluation model is to facilitate IIR evaluation as close as possible to actual information searching and IR processes, though still in a relatively controlled evaluation environment...
Zyablitsev, S. V.; Novoselskaya, V. V.; Chernobrivtsev, P. A.
Determined the importance of the implementation of laboratory information system in the laboratory, the main principles of information on the characteristics of the laboratory information system «URANIUM».
... GENERAL SERVICES ADMINISTRATION NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Information Collection; Information Regarding Responsibility Matters AGENCY: Department of Defense (DOD), General Services... public comments regarding an existing OMB information clearance. SUMMARY: Under the provisions of...
Coal Information (1997 edition) is the latest edition of a publication that has been produced annually by the IEA since 1983. The report is intended to provide both Member countries of the OECD and those employed in all sectors of the coal industry with information on current world coal market trends and long-term prospects. It includes information on coal prices, demand, trade, supply, production capacity, transport, environmental issues (including emission standards for coal-fired boilers), coal ports, coal-fired power stations and coal used in non -OECD countries. Part I of the publication contains a wide ranging review of world coal market developments in 1996 and current prospects to 2010. The review is based on historical data of OECD energy supply and demand, data on other world regions, projections of OECD coal supply, demand and trade and information provided by the CIAB. Part II provides, in tabular and graphical form, a more detailed and comprehensive statistical picture of coal developments and future prospects for coal in the OECD, by region and for individual Member countries. Readers interested in projections are strongly advised to read the notes for individual countries in Principles and Definitions in Part II. Coal statistics for non-OECD countries are presented in Part III of the book. Summary data are available on hard coal supply and end-use statistics for about 40 countries and regions world-wide. Data are based on official national submissions to the United Nations in Geneva and New York, national energy publications, information provided to the IEA Secretariat by national statistical offices as well as other unofficial Secretariat sources. Further information on coal used in non-OECD countries is published annually by the IEA in Energy Statistics and Balances of Non-OECD Countries. Also included in Part III are the Survey of Coal Ports world-wide and the Survey of Coal-fired Power Stations in coal-importing countries
Perkins, Walton A., III
This paper describes a computer-oriented representation for sentence information. Whereas many Artificial Intelligence (AI) natural language systems start with a syntactic parse of a sentence into the linguist's components: noun, verb, adjective, preposition, etc., we argue that it is better to parse the input sentence into 'meaning' components: attribute, attribute value, object class, object instance, and relation. AI systems need a representation that will allow rapid storage and retrieval of information and convenient reasoning with that information. The attribute-of-object representation has proven useful for handling information in relational databases (which are well known for their efficiency in storage and retrieval) and for reasoning in knowledge- based systems. On the other hand, the linguist's syntactic representation of the works in sentences has not been shown to be useful for information handling and reasoning. We think it is an unnecessary and misleading intermediate form. Our sentence representation is semantic based in terms of attribute, attribute value, object class, object instance, and relation. Every sentence is segmented into one or more components with the form: 'attribute' of 'object' 'relation' 'attribute value'. Using only one format for all information gives the system simplicity and good performance as a RISC architecture does for hardware. The attribute-of-object representation is not new; it is used extensively in relational databases and knowledge-based systems. However, we will show that it can be used as a meaning representation for natural language sentences with minor extensions. In this paper we describe how a computer system can parse English sentences into this representation and generate English sentences from this representation. Much of this has been tested with computer implementation.
Quantifying cooperation among random variables in predicting a single target random variable is an important problem in many biological systems with 10s to 1000s of co-dependent variables. We review the prior literature of information theoretical measures of synergy and introduce a novel synergy measure, entitled *synergistic mutual information* and compare it against the three existing measures of cooperation. We apply all four measures against a suite of binary circuits to demonstrate our measure alone quantifies the intuitive concept of synergy across all examples.
Havn, Erling; Bansler, Jørgen P.
The production of application software is rapidly being industrialized. Computer manufacturers and software houses produce a rapidly growing number of generic software applications and systems, and more and more user companies choose to build their computer-based information systems with such...... generic products, instead of custom made software. We discuss how the move away from traditional in-house development and the increasing use of generic software is likely to transform IS development in the near future. We conclude that these developments will make new demands on the information systems...
Case, Donald O.
This is a history of the various concepts and technologies of a public information utility. The first “wave” existed from about 1900 to 1945, and was centered on the idea of microfilm as an access mechanism to the world’s information. The advocates included Paul Otlet (1934) of Belgium, Englishman H.G. Wells’ vision of a “World Brain” (1938), and American Vanevar Bush and his “Memex” device (1945). The second wave consisted of the development of computers and their networks, which eventual...
New uranium enrichment capacity is being built worldwide in response to perceived shortfalls in future supply. To meet increasing safeguards responsibilities with limited resources, the nonproliferation community is exploring next-generation concepts to increase the effectiveness and efficiency of safeguards, such as advanced technologies to enable unattended monitoring of nuclear material. These include attribute measurement technologies, data authentication tools, and transmission and security methods. However, there are several conceptual issues with how such data would be used to improve the ability of a safeguards inspectorate such as the International Atomic Energy Agency (IAEA) to reach better safeguards conclusions regarding the activities of a State. The IAEA is pursuing the implementation of information-driven safeguards, whereby all available sources of information are used to make the application of safeguards more effective and efficient. Data from continuous, unattended monitoring systems can be used to optimize on-site inspection scheduling and activities at declared facilities, resulting in fewer, better inspections. Such information-driven inspections are the logical evolution of inspection planning - making use of all available information to enhance scheduled and randomized inspections. Data collection and analysis approaches for unattended monitoring systems can be designed to protect sensitive information while enabling information-driven inspections. A number of such inspections within a predetermined range could reduce inspection frequency while providing an equal or greater level of deterrence against illicit activity, all while meeting operator and technology holder requirements and reducing inspector and operator burden. Three options for using unattended monitoring data to determine an information-driven inspection schedule are to (1) send all unattended monitoring data off-site, which will require advances in data analysis techniques to
Dan Constantin Tofan
Full Text Available The use of standards is unanimously accepted and gives the possibility of comparing a personal security system with a given frame of reference adopted at an international level. A good example is the ISO 9000 set of standards regarding the quality management system, which is a common reference regardless of the industry in which a certain company activates. Just like quality control standards for other industrial processes such as manufacturing and customer service, information security standards demonstrate in a methodical and certifiable manner that an organization conforms to industry best practices and procedures. This article offers a review of the world’s most used information security standards.
The AS-DB and AS-SU groups within the Administrative Support division now offer a central entry point to the computer based Information Services under their responsibilities: the AIS Web site at http://ais.cern.ch.It features comprehensive search and navigation facilities as well as an activity based business map to guide AIS users to the information they want. Users will be able to launch any AIS WEB application from its desktop.Enjoy a visit of the site, we value your feedback at firstname.lastname@example.org!AS-DB/AS-SU
The focus of the current issue 3/2014 of GMS Medizin – Bibliothek – Information is the annual conference 2014 of the German Medical Libraries Association in Mannheim. The motto of the conference was “Medical libraries: Information2”. The authors in this issue are Michaele Adam (Bibliometrics 2.0 – Altmetrics in Medicine), Bruno Bauer (Open access cooperation in Austria: Open Access Network Austria and E-Infrastructures Austria – recent developments since 2012), Fabian Gail & Ulrich Korwitz (M...
Full Text Available This paper present Profile Based information retrieval system(PBIR. This system provide the user to register with it and based on the users registered areas of interest the system searches the related and efficient information form the world wide web using the technique of web text mining and arranges the unstructured data into structured format and present it to the user. This system also stores the previously searched data and based on users areas of interest and rating awarded to the interest by the user his profile will be updated at particular scheduled time.
Blackley, John A; Peltier, Justin
Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply thes
Edelson, Burton I.; Pelton, Joseph N.; Bostian, Charles W.; Brandon, William T.; Chan, Vincent W. S.; Hager, E. Paul; Helm, Neil R.; Jennings, Raymond D.; Kwan, Robert K.; Mahle, Christoph E.
NASA and the National Science Foundation (NSF) commissioned a panel of U.S. experts to study the international status of satellite communications systems and technology. The study covers emerging systems concepts, applications, services, and the attendant technologies. The panel members traveled to Europe, Japan, and Russia to gather information firsthand. They visited 17 sites in Europe, 20 in Japan, and 4 in Russia. These included major manufacturers, government organizations, service providers, and associated research and development facilities. The panel's report was reviewed by the sites visited, by the panel, and by representatives of U.S. industry. The report details the information collected and compares it to U.S. activities.
Hoitash, Rani; Kogan, Alexander; Srivastava, Rajendra P.
Many companies have recently digitized a substantial number of their business processes. It is often the case that some companies store their data on a digital medium and that this data is can be captured and stored in real-time or in a batch process. Measuring the time it takes a system to traverse and process information is of the utmost importance to internal and external stakeholders of the organization. However, it is often difficult for companies to identify information flow and process...
Campbell, W. J.
Information and activities are provided to: (1) enhance the ability to distinguish between a Geographic Information System (GIS) and a data management system; (2) develop understanding of spatial data handling by conventional methods versus the automated approach; (3) promote awareness of GIS design and capabilities; (4) foster understanding of the concepts and problems of data base development and management; (5) facilitate recognition of how a computerized GIS can model conditions in the present "real world" to project conditions in the future; and (6) appreciate the utility of integrating LANDSAT and other remotely sensed data into the GIS.