Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Nebraska - Lincoln (22)
- University of Georgia School of Law (5)
- City University of New York (CUNY) (2)
- Purdue University (2)
- SIT Graduate Institute/SIT Study Abroad (2)
-
- Syracuse University (2)
- University of New Haven (2)
- Embry-Riddle Aeronautical University (1)
- Florida International University (1)
- Old Dominion University (1)
- Singapore Management University (1)
- University of Kentucky (1)
- University of Pennsylvania Carey Law School (1)
- University of South Carolina (1)
- Keyword
-
- Artificial Intelligence (4)
- Bibliometric Analysis (4)
- Artificial intelligence (3)
- Audit (3)
- Bibliometric analysis (2)
-
- Bibliometric survey (2)
- Data mining (2)
- Dataset (2)
- Deep learning (2)
- Information (2)
- Internet of Things (2)
- Machine learning (2)
- Social Media (2)
- Tech policy (2)
- Technology (2)
- Usability (2)
- 5G (1)
- Academic library (1)
- Adaptive large neighborhood search (1)
- Advanced Encryption Standard (1)
- Advanced wireless communications (1)
- Adversarial machine learning (1)
- Alexa (1)
- Algorithms (1)
- Alma-Summon integration (1)
- Analysis (1)
- And Library in East Java (1)
- And University (1)
- And VOSViewer (1)
- Anomalies (1)
- Publication
-
- Library Philosophy and Practice (e-journal) (21)
- Articles, Chapters and Online Publications (3)
- Electrical & Computer Engineering and Computer Science Faculty Publications (2)
- English Language Institute (2)
- Faculty Publications (2)
-
- Independent Study Project (ISP) Collection (2)
- Open Educational Resources (2)
- Presentations (2)
- Publications (2)
- All Faculty Scholarship (1)
- Engineering Technology Faculty Publications (1)
- Information Science Faculty Publications (1)
- Research Collection School Of Computing and Information Systems (1)
- University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches (1)
- Works of the FIU Libraries (1)
Articles 1 - 30 of 44
Full-Text Articles in Social and Behavioral Sciences
A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl
A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl
Library Philosophy and Practice (e-journal)
Due to a pandemic situation arising from the past few decades and the covid -19 patients are increasing at the rapid rate. Looking in the near future an IOT model is build which can be useful for people in coming years and allows rapid testing and efficient testing methodologies using various sensors such as Temperature, Respiration, RFID etc which takes various parameters. The study focuses around 412 scientific documents such as Journals, articles, book chapters and Patents in various papers. These documents are extracted from the scopus databases after querying with the keywords related to covid patients and IOT. The …
Bibliometric Analysis Of The Literature In The Field Of Information Technology Relatedness, Ilham M, Anis Eliyana, Praptini Yulianti
Bibliometric Analysis Of The Literature In The Field Of Information Technology Relatedness, Ilham M, Anis Eliyana, Praptini Yulianti
Library Philosophy and Practice (e-journal)
This bibliometric describe Information Technology Relateness is defined as the use of information technology infrastructure and information technology management processes betweeWas this submission previously published in a journal? Bepress will automatically create an OpenURL for published articles. Learn more about OpenURLsn business units together. There is not much research on Information Technology Relateness by providing a big picture that is visualized from year to year. This study aims to map research in the field of Information Technology Relateness with data from all international research publications. This study performs a bibliometric method and analyzes research data using the Services Analyze …
Software Development With Scrum: A Bibliometric Analysis And Profile, Peter Kokol, Sašo Zagoranski, Marko Kokol
Software Development With Scrum: A Bibliometric Analysis And Profile, Peter Kokol, Sašo Zagoranski, Marko Kokol
Library Philosophy and Practice (e-journal)
Introduction of the Scrum approach into software engineering has changed the way software is being developed. The Scrum approach emphasizes the active end-user involvement, embracing of change, and /iterative delivery of products. Our study showed that Scrum has different variants or is used in combination with different methods. Some tools not normally used in the conventional software approaches, like gamification, content analysis and grounded theory are also employed. However, Scrum like other software development approach focuses on improvement of software process, software quality, business value, performance, usability and efficiency and at the same time to reduce cost, risk and uncertainty. …
Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof.
Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof.
Library Philosophy and Practice (e-journal)
Wireless Sensor Network is a network of wireless sensor nodes that are capable of sensing information from their surroundings and transmit the sensed information to data collection point known as a base station. Applications of wireless sensor networks are large in number and forest fire detection, landslide monitoring, etc. are few applications to note. The research challenges in wireless sensor networks is the transmission of data from the sensor node to the base station in an energy-efficient manner and network life prolongation. Cluster-based routing techniques are extensively adopted to address this research challenge. Researchers have used different metaheuristic and soft …
The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman
The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman
Library Philosophy and Practice (e-journal)
This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to manage …
Network Effects In Action, Christopher S. Yoo
Network Effects In Action, Christopher S. Yoo
All Faculty Scholarship
This Chapter begins by examining and exploring the theoretical and empirical limits of the possible bases of network effects, paying particular attention to the most commonly cited framework known as Metcalfe’s Law. It continues by exploring the concept of network externalities, defined as the positive external consumption benefits that the decision to join a network creates for the other members of the network, which is more ambiguous than commonly realized. It then reviews the structural factors needed for models based on network effects to have anticompetitive effects and identifies other factors that can dissipate those effects. Finally, it identifies alternative …
A Bibliometric Survey Of Fashion Analysis Using Artificial Intelligence, Seema Wazarkar, Shruti Patil, Satish Kumar
A Bibliometric Survey Of Fashion Analysis Using Artificial Intelligence, Seema Wazarkar, Shruti Patil, Satish Kumar
Library Philosophy and Practice (e-journal)
In the 21st century, clothing fashion has become an inevitable part of every individual human as it is considered a way to express their personality to the outside world. Currently the traditional fashion business models are experiencing a paradigm shift from being an experience-based business strategy implementation to a data driven intelligent business improvisation. Artificial Intelligence is acting as a catalyst to achieve the infusion of data intelligence into the fashion industry which aims at fostering all the business brackets such as supply chain management, trend analysis, fashion recommendation, sales forecasting, digitized shopping experience etc. The field of “Fashion …
Content Modelling For Unbiased Information Analysis, Milind Gayakwad, Suhas Patil Dr
Content Modelling For Unbiased Information Analysis, Milind Gayakwad, Suhas Patil Dr
Library Philosophy and Practice (e-journal)
Content is the form through which the information is conveyed as per the requirement of user. A volume of content is huge and expected to grow exponentially hence classification of useful data and not useful data is a very tedious task. Interface between content and user is Search engine. Therefore, the contents are designed considering search engine's perspective. Content designed by the organization, utilizes user’s data for promoting their products and services. This is done mostly using inorganic ways utilized to influence the quality measures of a content, this may mislead the information. There is no correct mechanism available to …
Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade
Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade
Library Philosophy and Practice (e-journal)
Authentication is an essential step for giving access to resources to authorized individuals and prevent leakage of confidential information. The traditional authentication systems like a pin, card, a password could not differentiate among the authorized users and fakers who have an illegal access to the system. Traditional authentication technique never alerts about the unwanted access to the system. The device that allows the automatic identification of an individual is known as a biometric system. It is not required to remember a password, card, and pin code in the Bio-metric system. Numerous biometric characteristics like the fingerprint, iris, palm print, face …
A Bibliometric Analysis Of Face Anti Spoofing, Swapnil Ramesh Shinde, Shraddha Phansalkar, Sudeep D. Thepade
A Bibliometric Analysis Of Face Anti Spoofing, Swapnil Ramesh Shinde, Shraddha Phansalkar, Sudeep D. Thepade
Library Philosophy and Practice (e-journal)
Face Recognition Systems are used widely in all areas as a medium of authentication, the ease of implementation and accuracy provides it with a broader scope. The face recognition systems are vulnerable to some extent and are attacked by performing different types of attacks using a variety of techniques. The term used to describe the measures taken to prevent these types of attacks is known as face anti spoofing. Research has been carried on since decades to design systems that are robust against these attacks. The focus of the work in this paper is to explore the area of face …
A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud
A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud
Information Science Faculty Publications
The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In many such cases, bystanders’ privacy is not a concern, and as a result, audio and video of bystanders are often captured without their consent. We present results from a user study in which 21 participants were asked to use a wearable system called …
A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha
A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha
Library Philosophy and Practice (e-journal)
The Internet has become an essential part of modern communication. People are sharing ideas, thoughts, and beliefs easily, using social media. This sharing of ideas has raised a big problem like the spread of the radicalized extremist ideas. The various extremist organizations use the social media as a propaganda tool. The extremist organizations actively radicalize and recruit youths by sharing inciting material on social media. Extremist organizations use social media to influence people to carry out lone-wolf attacks. Social media platforms employ various strategies to identify and remove the extremist content. But due to the sheer amount of data and …
The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman
The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman
Library Philosophy and Practice (e-journal)
This study current technological developments have entered almost into the lines of people's lives. Currently, many public library have grown even bigger. And this development does not escape the good management of information technology governance. To maximize management to a better level, public library need information technology governance audits. The information technology audit used in this study uses the COBIT 5 framework which focuses on the APO04 and DSS01 domains. This study aims to improve the quality of services owned and to increase its competitiveness. The results of this study refer to the vision and mission of the public library …
Analysis Effect Of Audit Information Technology : Green Technology, Smart System And Innovation Behavior Working For Improving Business Services University In Indonesia, Merlin Apriliyanti, Ilham M, Tanti Handriana, Indrianawati Usman
Analysis Effect Of Audit Information Technology : Green Technology, Smart System And Innovation Behavior Working For Improving Business Services University In Indonesia, Merlin Apriliyanti, Ilham M, Tanti Handriana, Indrianawati Usman
Library Philosophy and Practice (e-journal)
This study was conducted to determine the effectiveness and efficiency of the use of technology and integrated information systems and recommend the development of new systems at PTKIN (UIN Sunan Ampel Surabaya and UIN Maulana Malik Ibrahim Malang). The study of information technology management in tertiary institutions aims to measure the extent to which the application of information technology is able to support the activities of the Tri Dharma College in order to achieve world class universities. In measuring the results of the audit of information technology management the tertiary institution will conduct evaluation, monitoring and further development of information …
Memory Foreshadow: Memory Forensics Of Hardware Cryptocurrency Wallets – A Tool And Visualization Framework, Tyler Thomas, Mathew Piscitelli, Ilya Shavrov, Ibrahim Baggili
Memory Foreshadow: Memory Forensics Of Hardware Cryptocurrency Wallets – A Tool And Visualization Framework, Tyler Thomas, Mathew Piscitelli, Ilya Shavrov, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
We present Memory FORESHADOW: Memory FOREnSics of HArDware cryptOcurrency Wallets. To the best of our knowledge, this is the primary account of cryptocurrency hardware wallet client memory forensics. Our exploratory analysis revealed forensically relevant data in memory including transaction history, extended public keys, passphrases, and unique device identifiers. Data extracted with FORESHADOW can be used to associate a hardware wallet with a computer and allow an observer to deanonymize all past and future transactions due to hierarchical deterministic wallet address derivation. Additionally, our novel visualization framework enabled us to measure both the persistence and integrity of artifacts produced by the …
Exploring The Learning Efficacy Of Digital Forensics Concepts And Bagging & Tagging Of Digital Devices In Immersive Virtual Reality, Courtney Hassenfeldt, Jillian Jacques, Ibrahim Baggili
Exploring The Learning Efficacy Of Digital Forensics Concepts And Bagging & Tagging Of Digital Devices In Immersive Virtual Reality, Courtney Hassenfeldt, Jillian Jacques, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
This work presents the first account of evaluating learning inside a VR experience created to teach Digital Forensics (DF) concepts, and a hands-on laboratory exercise in Bagging & Tagging a crime scene with digital devices. First, we designed and developed an immersive VR experience which included a lecture and a lab. Next, we tested it with (n = 57) participants in a controlled experiment where they were randomly assigned to a VR group or a physical group. Both groups were subjected to the same lecture and lab, but one was in VR and the other was in the real world. …
Back To The Future With Higher Ed: A Sample Of Drupal Sites At Uga, Rachel S. Evans, Deborah Stanley, Delmaries I. Gray, Lauren Blais
Back To The Future With Higher Ed: A Sample Of Drupal Sites At Uga, Rachel S. Evans, Deborah Stanley, Delmaries I. Gray, Lauren Blais
Presentations
Consisting of a show and tell of a selection of large and small site installations from various departments, schools and colleges at the University of Georgia, panelists including back end and front end developers, public relations experts, librarians, and web coordinators will share their ship's timeline with Drupal versions and examples from the past, present and future. A moderator will then ask questions of panelists including: the biggest challenges they have faced with migrations and upgrades, the issues or blessings of more cohesive branding initiatives over the last few years, and their visions, concerns, and hopes for the future. In …
Cyber Social Threats 2020 Workshop Meta-Report: Covid-19, Challenges, Methodological And Ethical Considerations, Ugur Kursuncu, Yelena Mejova, Jeremy Blackburn, Amit Sheth
Cyber Social Threats 2020 Workshop Meta-Report: Covid-19, Challenges, Methodological And Ethical Considerations, Ugur Kursuncu, Yelena Mejova, Jeremy Blackburn, Amit Sheth
Publications
Online platforms have been increasingly misused by ill-intentioned actors, affecting our society, often leading to real-world events of social significance. On the other hand, recog-nizing the narratives related to harmful behaviors is challeng-ing due to its complex and sensitive nature. The Cyber SocialThreats Workshop 2020 aimed to stimulate research for thechallenges on methodological and ethical considerations indeveloping novel approaches to analyze online harmful con-versations, concerning social, cultural, emotional, commu-nicative, and linguistic aspects. It provided a forum to bringtogether researchers and practitioners from both academiaand industry in the areas of computational social sciences, so-cial network analysis and mining, natural language process-ing, …
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.
A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman
A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman
Library Philosophy and Practice (e-journal)
Data mining is characterized as searching for useful information through very large data sets. Some of the key and most common techniques for data mining are association rules, classification, clustering, prediction, and sequential models. For a wide range of applications, data mining techniques are used. Data mining plays a significant role in disease detection in the health care industry. The patient should be needed to detect a number of tests for the disease. However, the number of tests should be reduced by using data mining techniques. In time and performance, this reduced test plays an important role. Heart disease is …
How Can 5g Make Our Lives Better?, Firas Slewa Dawod
How Can 5g Make Our Lives Better?, Firas Slewa Dawod
English Language Institute
Our lives will be significantly improved with the advent of the new cellular wireless technology due to all its new features and applications. This Poster discusses the main features and application of 5G technology and its positive impact on society, in particular facilitating interactive and smart communities.
Indonesian Library User Behaviour During Covid 19 Pandemic On Digital Library Platform, Irhamni
Indonesian Library User Behaviour During Covid 19 Pandemic On Digital Library Platform, Irhamni
English Language Institute
COVID-19 pandemic has significantly changed library user behavior, workplaces, and some public areas including in the library. During the COVID 19 pandemics, the digital library with a mobile app like ipusnas has facilitated to accessing library resources. The ipusnas has increased people's accessibility to library materials. This research focuses on the use of the digital library has a significant impact on library users behavior; it can influence how they read, access the library, and their interaction with the library resources.
The Role Of Information And Communication Technology (Ict) In Securing Books In Irish Academic Libraries., Emmanuel Oguche
The Role Of Information And Communication Technology (Ict) In Securing Books In Irish Academic Libraries., Emmanuel Oguche
Library Philosophy and Practice (e-journal)
This study examined how effective the ICT gadgets are used in securing books in academic libraries and what technological approach the libraries will adopt in the future to ensure books are secured from mutilation and theft. The study was also to understand why students steal or mutilate books. A semi-structured interview was the qualitative research design used to collect data from six librarians. It was discovered that the libraries had adopted the use of ICT security gadgets like Radio-Frequency Identification (RFID) technology, surveillance cameras, self-service machine, magnetic strips. The combined use of these gadgets led to the drastic reduction of …
Born-Digital Preservation: The Art Of Archiving Photos With Script And Batch Processing, Rachel S. Evans, Leslie Grove, Sharon Bradley
Born-Digital Preservation: The Art Of Archiving Photos With Script And Batch Processing, Rachel S. Evans, Leslie Grove, Sharon Bradley
Articles, Chapters and Online Publications
With our IT department preparing to upgrade the University of Georgia’s Alexander Campbell King Law Library (UGA Law Library) website from Drupal 7 to 8 this fall, a web developer, an archivist, and a librarian teamed up a year ago to make plans for preserving thousands of born-digital images. We wanted to harvest photographs housed only in web-based photo galleries on the law school website and import them into our repository’s collection. The problem? There were five types of online photo galleries, and our current repository did not include appropriate categories for all of the photographs. The solution? Expand our …
Adaptive Large Neighborhood Search For Vehicle Routing Problem With Cross-Docking, Aldy Gunawan, Audrey Tedja Widjaja, Pieter Vansteenwegen, Vincent F. Yu
Adaptive Large Neighborhood Search For Vehicle Routing Problem With Cross-Docking, Aldy Gunawan, Audrey Tedja Widjaja, Pieter Vansteenwegen, Vincent F. Yu
Research Collection School Of Computing and Information Systems
Cross-docking is considered as a method to manage and control the inventory flow, which is essential in the context of supply chain management. This paper studies the integration of the vehicle routing problem with cross-docking, namely VRPCD which has been extensively studied due to its ability to reducethe overall costs occurring in a supply chain network. Given a fleet of homogeneous vehicles for delivering a single type of product from suppliers to customers through a cross-dock facility, the objective of VRPCD is to determine the number of vehicles used and the corresponding vehicle routes, such that the vehicleoperational and transportation …
Conference Roundup: Smart Cataloging - Beginning The Move From Batch Processing To Automated Classification, Rachel S. Evans
Conference Roundup: Smart Cataloging - Beginning The Move From Batch Processing To Automated Classification, Rachel S. Evans
Articles, Chapters and Online Publications
This article reviewed the Amigos Online Conference titled “Work Smarter, Not Harder: Innovating Technical Services Workflows” keynote session delivered by Dr. Terry Reese on February 13, 2020. Excerpt:
"As the developer of MarcEdit, a popular metadata suite used widely across the library community, Reese’s current work is focused on the ways in which libraries might leverage semantic web techniques in order to transform legacy library metadata into something new. So many sessions related to using new technologies in libraries or academia, although exciting, are not practical enough to put into everyday use by most librarians. Reese’s keynote, titled Smart Cataloging: …
Curriculum Development For Robotics Technology Program, Sanjeevi Chitikeshi, Shirshak K. Dhali, Betsey Odell, Vukica Jovanovic, Cheng Y. Lin
Curriculum Development For Robotics Technology Program, Sanjeevi Chitikeshi, Shirshak K. Dhali, Betsey Odell, Vukica Jovanovic, Cheng Y. Lin
Engineering Technology Faculty Publications
With a growing need for a more skilled workforce, providing industry-driven and employment centric training services is an important national priority. Over 3.4 million manufacturing jobs will need to be filled across the United Sates over the next decade. The skills gap is becoming greater based on the statistics provided by the Global Robotics Technology Market: Forecast, 2014-2020 published by Research and Markets, reporting that the worldwide robotics market is forecast to grow from the 2015 level of $26.98B to $82.78B in 2020. This 11 % compounded average growth in the next five years is unprecedented. Given the anticipated growth …
Alexa, Ask My Library: How Do I Build A Custom Skill To Extend Reference Services?, Christopher M. Jimenez
Alexa, Ask My Library: How Do I Build A Custom Skill To Extend Reference Services?, Christopher M. Jimenez
Works of the FIU Libraries
The Reference Technology team at Florida International University recently published an Alexa Skill that incorporates the LibAnswers API into the device’s answer bank. We have several Echo Show devices at our public service desks to meet the demands of extended hours while also enhancing public service presence beyond the reference desk.
The Green Library at FIU’s Modesto Maidique Campus now operates on a 24/5 schedule, allowing students to access library facilities at any time during the week. In addition, both the Hubert Library and the Engineering Library Service Center stay open past times when personal reference assistance is available. This …
Bibliometric Survey On Impact Of Sound Therapy On Blood Pressure And Covid-19., Vaishali Rajput, Preeti Mulay
Bibliometric Survey On Impact Of Sound Therapy On Blood Pressure And Covid-19., Vaishali Rajput, Preeti Mulay
Library Philosophy and Practice (e-journal)
The current situation of spread of Corona Virus is really worth to worry and critical. As we are moving from stage 2 to stage 3, it is really our duty and right to prevent its spread effectually, as its threat to life of every individual. As per the expert opinion from Health Organizations, the elder people are most at risk of Corona infection. But if the people with high blood pressure or high cholesterol fail to take their prescribed medication, then they are also prone to various infections, due to low immunity levels. Along with regular medication, Sound Therapy is …