978 resultados para Digital Document Workbench


Relevância:

100.00% 100.00%

Publicador:

Resumo:

During the MEMORIAL project time an international consortium has developed a software solution called DDW (Digital Document Workbench). It provides a set of tools to support the process of digitisation of documents from the scanning up to the retrievable presentation of the content. The attention is focused to machine typed archival documents. One of the important features is the evaluation of quality in each step of the process. The workbench consists of automatic parts as well as of parts which request human activity. The measurable improvement of 20% shows the approach is successful.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Pós-graduação em Ciência da Informação - FFC

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This article analyzes the main aspects related to digital preservation in Higher Education Institution (HEI). Discusses the problems and challenges to be facing in this context and presents the main aspects and strategies involving digital preservation in this institution type, focusing on three: the organizational aspects, the legal aspects and the technical aspects. The methodological procedures involved the literature analysis on the subject area. As a result shows a digital preservation policy that includes 15 (fifteen) essential elements, distributed in three segments (aspects), and the importance of each element to the deployment of a digital preservation policy.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This thesis proposes a new document model, according to which any document can be segmented in some independent components and transformed in a pattern-based projection, that only uses a very small set of objects and composition rules. The point is that such a normalized document expresses the same fundamental information of the original one, in a simple, clear and unambiguous way. The central part of my work consists of discussing that model, investigating how a digital document can be segmented, and how a segmented version can be used to implement advanced tools of conversion. I present seven patterns which are versatile enough to capture the most relevant documents’ structures, and whose minimality and rigour make that implementation possible. The abstract model is then instantiated into an actual markup language, called IML. IML is a general and extensible language, which basically adopts an XHTML syntax, able to capture a posteriori the only content of a digital document. It is compared with other languages and proposals, in order to clarify its role and objectives. Finally, I present some systems built upon these ideas. These applications are evaluated in terms of users’ advantages, workflow improvements and impact over the overall quality of the output. In particular, they cover heterogeneous content management processes: from web editing to collaboration (IsaWiki and WikiFactory), from e-learning (IsaLearning) to professional printing (IsaPress).

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. ^ This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document. ^

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A strongly progressive surveying and mapping industry depends on a shared understanding of the industry as it exists, some shared vision or imagination of what the industry might become, and some shared action plan capable of bringing about a realisation of that vision. The emphasis on sharing implies a need for consensus reached through widespread discussion and mutual understanding. Unless this occurs, concerted action is unlikely. A more likely outcome is that industry representatives will negate each other's efforts in their separate bids for progress. The process of bringing about consensual viewpoints is essentially one of establishing an industry identity. Establishing the industry's identity and purpose is a prerequisite for rational development of the industry's education and training, its promotion and marketing, and operational research that can deal .with industry potential and efficiency. This paper interprets evolutionary developments occurring within Queensland's surveying and mapping industry within a framework that sets out logical requirements for a viable industry.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

These notes were compiled from several authorities to be used for teaching and learning purposes here at QUT, with the focus on first and second year landscape architecture design studio units.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

These notes were compiled from several authorities to be used for teaching and learning purposes here at QUT, with the focus on first and second year landscape architecture design studio units.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

O presente estudo tem como objetivo compreender a valoração de uma mensagem de correio eletrónico em ambiente corporativo, e respetiva integração no arquivo empresarial. Objetivamos, nos primeiros capítulos, descrever o modelo metodológico aplicado. Seguidamente, apresentamos uma revisão bibliográfica assente em literatura inerente à temática dos circuitos informacionais na empresa, e documentação eletrónica resultante dos mesmos, com ênfase nas mensagens de correio eletrónico. A investigação empírica teve por base a aplicação de um inquérito por questionário, tendo por amostra um grupo profissional pré-selecionado, com acesso regular a um sistema de correio eletrónico. Os resultados obtidos através da análise do material empírico permitem-nos observar uma utilização preferencial do correio eletrónico face a outros suportes comunicacionais, constituindo-se as mensagens eletrónicas no documento produzido em maior escala, em ambiente profissional. Foram igualmente verificados casos de ausência de regulamentação para criação, gestão ou arquivo de mensagens, ou mesmo de um sistema de gestão documental que permita integração das mesmas. Com base na análise empírica, e em associação com a revisão bibliográfica explanada, concluímos que estas, e outras questões enunciadas ao longo do estudo, poderão constituir-se num sério obstáculo à gestão, preservação, recuperação e integridade da informação registada por meio de mensagens de correio eletrónico, caso não sejam criados e aplicados procedimentos e sistemas de gestão orientados para a documentação eletrónica, de forma a garantir o acesso a informação de fulcral importância para empresa, enquanto evidência e memória dos processos e atividades organizacionais.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

À paraître en décembre 2007.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Information and communication technologies are the tools that underpin the emerging “Knowledge Society”. Exchange of information or knowledge between people and through networks of people has always taken place. But the ICT has radically changed the magnitude of this exchange, and thus factors such as timeliness of information and information dissemination patterns have become more important than ever.Since information and knowledge are so vital for the all round human development, libraries and institutions that manage these resources are indeed invaluable. So, the Library and Information Centres have a key role in the acquisition, processing, preservation and dissemination of information and knowledge. ln the modern context, library is providing service based on different types of documents such as manuscripts, printed, digital, etc. At the same time, acquisition, access, process, service etc. of these resources have become complicated now than ever before. The lCT made instrumental to extend libraries beyond the physical walls of a building and providing assistance in navigating and analyzing tremendous amounts of knowledge with a variety of digital tools. Thus, modern libraries are increasingly being re-defined as places to get unrestricted access to information in many formats and from many sources.The research was conducted in the university libraries in Kerala State, India. lt was identified that even though the information resources are flooding world over and several technologies have emerged to manage the situation for providing effective services to its clientele, most of the university libraries in Kerala were unable to exploit these technologies at maximum level. Though the libraries have automated many of their functions, wide gap prevails between the possible services and provided services. There are many good examples world over in the application of lCTs in libraries for the maximization of services and many such libraries have adopted the principles of reengineering and re-defining as a management strategy. Hence this study was targeted to look into how effectively adopted the modern lCTs in our libraries for maximizing the efficiency of operations and services and whether the principles of re-engineering and- redefining can be applied towards this.Data‘ was collected from library users, viz; student as well as faculty users; library ,professionals and university librarians, using structured questionnaires. This has been .supplemented by-observation of working of the libraries, discussions and interviews with the different types of users and staff, review of literature, etc. Personal observation of the organization set up, management practices, functions, facilities, resources, utilization of information resources and facilities by the users, etc. of the university libraries in Kerala have been made. Statistical techniques like percentage, mean, weighted mean, standard deviation, correlation, trend analysis, etc. have been used to analyse data.All the libraries could exploit only a very few possibilities of modern lCTs and hence they could not achieve effective Universal Bibliographic Control and desired efficiency and effectiveness in services. Because of this, the users as well as professionals are dissatisfied. Functional effectiveness in acquisition, access and process of information resources in various formats, development and maintenance of OPAC and WebOPAC, digital document delivery to remote users, Web based clearing of library counter services and resources, development of full-text databases, digital libraries and institutional repositories, consortia based operations for e-journals and databases, user education and information literacy, professional development with stress on lCTs, network administration and website maintenance, marketing of information, etc. are major areas need special attention to improve the situation. Finance, knowledge level on ICTs among library staff, professional dynamism and leadership, vision and support of the administrators and policy makers, prevailing educational set up and social environment in the state, etc. are some of the major hurdles in reaping the maximum possibilities of lCTs by the university libraries in Kerala. The principles of Business Process Re-engineering are found suitable to effectively apply to re-structure and redefine the operations and service system of the libraries. Most of the conventional departments or divisions prevailing in the university libraries were functioning as watertight compartments and their existing management system was more rigid to adopt the principles of change management. Hence, a thorough re-structuring of the divisions was indicated. Consortia based activities and pooling and sharing of information resources was advocated to meet the varied needs of the users in the main campuses and off campuses of the universities, affiliated colleges and remote stations. A uniform staff policy similar to that prevailing in CSIR, DRDO, ISRO, etc. has been proposed by the study not only in the university libraries in kerala but for the entire country.Restructuring of Lis education,integrated and Planned development of school,college,research and public library systems,etc.were also justified for reaping maximum benefits of the modern ICTs.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In Piva et al's watermarking scheme for electronic copyright management system (ECMS), authors were considered trusted potentially, so a dishonest author could authorize more than one distributor to sell her one document, named "One Document to Multi-distributor" problem, which would damage the benefit of the distributors. To resolve the problem, in this paper, we propose an enhanced watermarking protocol based on Piva et al's scheme by introducing document nature code (DNC) and register records table. In addition, our protocol offers the distributor an efficient means to verify his right to an authorized digital document.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Keane, Prohm and Manning organised performative process for collecting and assembling materials for a publication. The event/process focused on work related to and inspired by the work of Arakawa and Madeline Gins. the festival will be held over 4 days at the Glasshouse in Brooklyn (4-7 June, 12-5pm). The publication, planned for release in 2015/16, is being imagined as a print + digital document an/archiving this moment of movement around – and going forward with – the work of Arakawa and Madeline Gins. This book will be dedicated to Arakawa and Madeline, with special tribute to Madeline, whose own last book, "Alive forerever, not if but when", will be coming out in 2015/6.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The purpose of this thesis is to enhance the functionalities of GAFFE, a flexible, interactive and user-friendly application for editing metadata in office documents by supporting different ontologies stored inside and outside of the digital document, by adding new views and forms and by improving its ease of use.