• Title/Summary/Keyword: Internet resources

Search Result 1,478, Processing Time 0.034 seconds

Internet Access and Use among Students of Physical Education: A Study of Kurukshetra University, Kurukshetra

  • Kumar, Rajender
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.2
    • /
    • pp.59-68
    • /
    • 2014
  • This paper depicts a study conducted on the behavior of physical education students towards Internet usage at Kurukshetra University, Kurukshetra. Specially, the study aims to know the purposes for use of Internet resources and services, frequency of use, places and means of use, student's satisfaction level toward the Internet, and problems faced while using the Internet. A survey was carried out with a sample of 100 physical education students of Kurukshetra University and the response rate was 88%. A well-designed questionnaire was distributed to the students' sample. Amazingly, the results of the study reveal that usage of the Internet in research and education was not favored, whereas email, chatting, and sports websites were commonly used among students. The study also found that too much information on the Internet, slow access speeds, and finding relevant information were the main problems in using the Internet.

Information Networking and its Application in the Digital Era with Illustration from the University of Port Harcourt Library

  • Umeozor, Susan Nnadozie
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.9 no.2
    • /
    • pp.33-44
    • /
    • 2019
  • This paper discussed the factors that necessitated information networking, types of networks, benefits of information networking, library information networking and the University of Port 0Harcourt library network initiatives. Information networking is a process of communication, exchange of ideas, resource sharing and collaboration between individuals, organizations, institutions and libraries and it is facilitated by ICTs and the internet for improved accessibility. It has been brought about by information explosion, rapid advancement in information communication technologies, inadequate funding and increased demand for quality information. Networks can be classified into local, national, regional, and international networks and are formed to serve different categories of user communities. Benefits of information networking include resource sharing, on-line conferences and participation in programmes at distant centers, collaboration among scholars in different countries. Communication flow through the internet, social media, and electronic mail. Library information networking started with the interlibrary loan which has metamorphosed into library consortia in which groups of libraries partner to coordinate activities, share resources and combine expertise. The University of Port Harcourt Library network initiatives started with an e-granary (a CD ROM) and the establishment of a local area network. The library subscribes to more than 10 electronic databases. Information networking has greatly improved the sharing of resources in acquisition and dissemination of information resources since no single institution can acquire the overwhelming number of information resources in their various formats.

Bad Faith Intent in Internet Address Resources Act (인터넷주소자원에 관한 법률 제12조에 규정된 부정한 목적의 해석 : 대법원 2013. 4. 26. 선고 2011다64836 판결을 중심으로)

  • Park, Young-Gyu
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.129-148
    • /
    • 2014
  • Generally, the Internet Address Resources Act is intended to protect the public from acts of Internet "cybersquatting", a term used to describe the bad faith, abusive registration of Internet domain names. In determining whether a person has a bad faith intent, a court may consider factors such as, (1) the trademark or other intellectual property rights of the person, if any, in the domain name, (2) the extent to which the domain name consists of the legal name of the person or a name that is otherwise commonly used to identify that person, (3) the person's prior use, if any, of the domain name in connection with the bona fide offering of any goods or services, (4) the person's bona fide noncommercial or fair use of the mark in a site accessible under the domain name, (5) the person's intent to divert consumers from the mark owner's online location to a site accessible under the domain name that could harm the goodwill represented by the mark, either for commercial gain or with the intent to tarnish or disparage the mark, by creating a likelihood of confusion as to the source, sponsorship, affiliation, or endorsement of the site, (6) the person's offer to transfer, sell, or otherwise assign the domain name to the mark owner or any third party for financial gain without having used, or having an intent to use, the domain name in the bona fide offering of any goods or services, or the person's prior conduct indicating a pattern of such conduct.

Availability, Use and Constraints to Use of Electronic Information Resources by Postgraduates Students at the University of Ibadan

  • Adeleke, Dare Samuel;Nwalo, Kenneth Ivo Ngozi
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.7 no.4
    • /
    • pp.51-69
    • /
    • 2017
  • Availability, awareness and use of electronic resources provide access to authoritative, reliable, accurate and timely access to information. The use of electronic information resources (EIRs) can enable innovation in teaching and increase timeliness in research of postgraduate students which will eventual result into encouragement of the expected research-led enquiry in this digital age. The study adopted a descriptive survey design. Samples of 300 of postgraduate students within seven out 13 Faculties were randomly selected. Data were collected using questionnaire designed to elicit response from respondents and data were analyzed using descriptive statistics methods percentages, mean, and standard deviation. Results indicated that internet was ranked most available and used in the university. Low level of usage of electronic resources, in particular, full texts data bases is linked to a number of constraints: Interrupted power supply was ranked highest among other factors as speed and capacity of computers, retrieval of records with high recall and low precision, retrieving records relevant to information need, lack of knowledge of search techniques to retrieve information effectively, non possession of requisite IT skills and problems accessing the internet. The study recommended that usage of electronic resources be made compulsory, intensifying awareness campaigns concerning the availability, training on use of electronic resources and the problem of power outage be addressed.

PAS: Personalized Research Agent System using Modified Spreading Neural Network

  • Cho, Young-Im
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.146.1-146
    • /
    • 2001
  • The researches of science and engineering need the latest information from internet resources. But searching and filtering processes of appropriate web documents from huge internet resources are very complex as well as having some repeated procedures. In this paper, I propose a Personalized Agent System(PAS), which can filter World Wide Web Documents that the user is interested, such as papers. To do this, PAS uses a modified spreading activation neural network which 1 propose here. PAS observes the user´s local paper database to analyze, adapt and learn the user interests, and the then constructs the user-specified neural network model by the analyzed interests ...

  • PDF

The Effect of Internet Use on the Changes in Family Systems

  • Lee Hyunah;Lee Kiyoung
    • International Journal of Human Ecology
    • /
    • v.5 no.2
    • /
    • pp.61-80
    • /
    • 2004
  • The introduction of the Internet in homes had an effect on family systems. The purpose of this study is to investigate the changes in family systems due to Internet use in South Korea. This study classified the types of changes in the family systems and analyzes the characteristics of each type. Systems approach provides the theoretical framework for this study. First, the cluster analysis demonstrated the three types of the changes in the family subsystems due to housewives' Internet use: 'positive changes', 'negative changes', and 'no changes'. Second, there are different characteristics among the types of changes according to demographic, Internet-related, and intra-system dynamic factors. These results suggest several implications for public policy. To utilize the Internet as a useful tool to improve the quality of family life, housewives must have the ability to control the Internet use and to manage their resources. In order to enhance their abilities of using the Internet, it may be necessary for the government to provide public educational programs for housewives.

Deep Learning Based Security Model for Cloud based Task Scheduling

  • Devi, Karuppiah;Paulraj, D.;Muthusenthil, Balasubramanian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3663-3679
    • /
    • 2020
  • Scheduling plays a dynamic role in cloud computing in generating as well as in efficient distribution of the resources of each task. The principle goal of scheduling is to limit resource starvation and to guarantee fairness among the parties using the resources. The demand for resources fluctuates dynamically hence the prearranging of resources is a challenging task. Many task-scheduling approaches have been used in the cloud-computing environment. Security in cloud computing environment is one of the core issue in distributed computing. We have designed a deep learning-based security model for scheduling tasks in cloud computing and it has been implemented using CloudSim 3.0 simulator written in Java and verification of the results from different perspectives, such as response time with and without security factors, makespan, cost, CPU utilization, I/O utilization, Memory utilization, and execution time is compared with Round Robin (RR) and Waited Round Robin (WRR) algorithms.

A Study on the APA Style to Cite and Document Electronic Resources (APA 형식을 적용한 전자정보원의 참고문헌작성)

    • Journal of Korean Library and Information Science Society
    • /
    • v.30 no.3
    • /
    • pp.233-254
    • /
    • 1999
  • The forth edition of the Publication Manual of the American Psychological Association (1994) provides documentation advice for writers in the social sciences. This style of citation briefly identifies the source for readers and enables them to locate the source of information in the alphabetical reference list at the end of an article. Although the APA publication manual gives recommendations for citing some kinds of electronic resources, it acknowledges that at the time of writing this edition, a standard had not yet emerged for referencing on-line information. Because the manual was published before the development of the Internet as we know it, it does not have guidelines for citing www sites, web discussion forum posting, and other Internet resources,. Therefore this study aims to extend the principles and conventions of APA citation style to electronic resources.

  • PDF

IoT Device Testing for Efficient IoT Device Framework

  • Gong, Dong-Hwan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.77-82
    • /
    • 2020
  • IoT devices frequently require input resources to communicate with various sensors or IoT platforms. IoT device wastes a lot of time as idle time or waiting time to check the data of the input resource and use the input resource. In addition, IoT devices use various input resources. We compares and analyzes input idle time and input waiting time generated from hardware serial input resource, software serial input resource, digital port input resource, and analog port input resource using Arduino widely used as IoT device. In order to design the IoT device framework, it is necessary to understand the characteristics of input resources and to design them to minimize unnecessary input idle time and input waiting time. The analog input wait time has a much larger input wait time than the digital input wait time, so it must be designed to receive analog information periodically at the appropriate timing. The characteristics of the input resources analyzed in this way help to design an efficient IoT device.

A Heuristic Time Sharing Policy for Backup Resources in Cloud System

  • Li, Xinyi;Qi, Yong;Chen, Pengfei;Zhang, Xiaohui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3026-3049
    • /
    • 2016
  • Cloud computing promises high performance and cost-efficiency. However, most cloud infrastructures operate at a low utilization, which greatly adheres cost effectiveness. Previous works focus on seeking efficient virtual machine (VM) consolidation strategies to increase the utilization of virtual resources in production environment, but overlook the under-utilization of backup virtual resources. We propose a heuristic time sharing policy of backup VMs derived from the restless multi-armed bandit problem. The proposed policy achieves increasing backup virtual resources utilization and providing high availability. Both the results in simulation and prototype system experiments show that the traditional 1:1 backup provision can be extended to 1:M (M≫1) between the backup VMs and the service VMs, and the utilization of backup VMs can be enhanced significantly.