Google Scholar is a favorite starting point for searching, so the linking to the subscribed full-text journals by the Library will benefit the University of Johannesburg researchers and students.
This document discusses sources of IoT including popular IoT development boards, the role of RFID, and wireless sensor networks. RFID enables tracking and inventory control through identification. Wireless sensor networks allow sensors to monitor physical conditions from remote locations through wireless communication. Each wireless sensor node can perform computations and wireless networking to connect sensors autonomously in a wireless sensor network.
What is it about?
-How to easily describe your solutions using a pre-defined template compliant with ADMS-AP;
-How to automatically transform your solutions’ descriptions into machine readable language, i.e., RDF;
-How to get your interoperability solutions ready to be shared on Joinup.
The document discusses the internet of things (IoT) and how it connects physical devices to the internet through sensors, software and network connectivity. It provides examples of various smart IoT devices like a smart fork, water bottle, toothbrush and more. It then discusses some of the key concepts and technologies behind IoT like MQTT, a lightweight messaging protocol commonly used for IoT. It also outlines the history and growth of IoT from its origins in the late 2000s to the projected 50 billion connected devices by 2020.
- The document discusses market basket analysis and association rule mining, which are techniques used to analyze purchasing patterns in transactional data.
- It provides an example of an association rule discovered from store transaction data: "If a basket contains beer, it is likely to also contain diapers." Knowing this, the store changed its layout to place diapers and beer next to each other, increasing sales of both products.
- The key measures for evaluating association rules are support, confidence and lift, which indicate how often items are purchased together versus by chance alone. Market basket analysis can help businesses promote complementary products and increase overall revenue.
Introduction to the Reference Model for an Open Archival Information System (...Michael Day
Slides from a lecture given at the University of Liverpool on the course: Archives and Records Management: HIST 564 Applied Communication and IT Skills, Liverpool, UK, 3 December 2007
PREMIS in METS: Die beiden Datenmodelle Matterhorn METS und ArchivematicaTobias Wildi
Vergleich zwischen den beiden Datenmodellen Matterhorn METS und Archivematica. Beide Modelle basieren auf METS / PREMIS, unterscheiden sich aber in der Syntax.
Information retrieval 13 alternative set theoretic modelsVaibhav Khanna
Alternative Set Theoretic Models
Fuzzy Set Model :a set theoretic model of document retrieval based on fuzzy theory.
Extended Boolean Model:a set theoretic model of document retrieval based on an extension of the classic Boolean model. The idea is to interpret partial matches as Euclidean distances represented in a vectorial space of index terms.
This document discusses sources of IoT including popular IoT development boards, the role of RFID, and wireless sensor networks. RFID enables tracking and inventory control through identification. Wireless sensor networks allow sensors to monitor physical conditions from remote locations through wireless communication. Each wireless sensor node can perform computations and wireless networking to connect sensors autonomously in a wireless sensor network.
What is it about?
-How to easily describe your solutions using a pre-defined template compliant with ADMS-AP;
-How to automatically transform your solutions’ descriptions into machine readable language, i.e., RDF;
-How to get your interoperability solutions ready to be shared on Joinup.
The document discusses the internet of things (IoT) and how it connects physical devices to the internet through sensors, software and network connectivity. It provides examples of various smart IoT devices like a smart fork, water bottle, toothbrush and more. It then discusses some of the key concepts and technologies behind IoT like MQTT, a lightweight messaging protocol commonly used for IoT. It also outlines the history and growth of IoT from its origins in the late 2000s to the projected 50 billion connected devices by 2020.
- The document discusses market basket analysis and association rule mining, which are techniques used to analyze purchasing patterns in transactional data.
- It provides an example of an association rule discovered from store transaction data: "If a basket contains beer, it is likely to also contain diapers." Knowing this, the store changed its layout to place diapers and beer next to each other, increasing sales of both products.
- The key measures for evaluating association rules are support, confidence and lift, which indicate how often items are purchased together versus by chance alone. Market basket analysis can help businesses promote complementary products and increase overall revenue.
Introduction to the Reference Model for an Open Archival Information System (...Michael Day
Slides from a lecture given at the University of Liverpool on the course: Archives and Records Management: HIST 564 Applied Communication and IT Skills, Liverpool, UK, 3 December 2007
PREMIS in METS: Die beiden Datenmodelle Matterhorn METS und ArchivematicaTobias Wildi
Vergleich zwischen den beiden Datenmodellen Matterhorn METS und Archivematica. Beide Modelle basieren auf METS / PREMIS, unterscheiden sich aber in der Syntax.
Information retrieval 13 alternative set theoretic modelsVaibhav Khanna
Alternative Set Theoretic Models
Fuzzy Set Model :a set theoretic model of document retrieval based on fuzzy theory.
Extended Boolean Model:a set theoretic model of document retrieval based on an extension of the classic Boolean model. The idea is to interpret partial matches as Euclidean distances represented in a vectorial space of index terms.
This document discusses web usage mining and the associated processes. It introduces web usage mining as the automatic discovery of patterns in clickstream data and user interactions with websites. The goal is to analyze user behavioral patterns and profiles. Key aspects covered include preprocessing log data, identifying user sessions, integrating e-commerce events, and applying data mining techniques. Web usage mining is used to gain insights into user behaviors and personalize websites.
Information retrieval 15 alternative algebraic modelsVaibhav Khanna
The document discusses alternative algebraic models for information retrieval, including the generalized vector model. The generalized vector model allows for index terms to be non-orthogonal, representing correlations between terms. It models term dependencies through "minterms" - binary patterns of term occurrence. While allowing representation of term correlations, the model has higher computational costs than the standard vector model and it is unclear when it performs better.
The document discusses association rule mining and the Apriori and FP-Growth algorithms. It provides the following information:
- Association rule mining discovers interesting relationships between variables in large databases. It expresses relationships between frequently co-occurring items as association rules.
- The Apriori algorithm uses frequent itemsets to generate association rules. It employs an iterative approach and pruning to reduce candidate sets.
- FP-Growth improves upon Apriori by compressing transaction data into a frequent-pattern tree structure and scanning the database twice instead of multiple times. This improves mining efficiency over Apriori.
Data mining to predict academic performance. Ranjith Gowda
This document proposes using data warehousing and data mining techniques to predict student academic performance in schools. It describes collecting student data like scores, attendance, discipline, and assignments into a data warehouse. Data mining methods are then used to analyze the student data and identify relationships between variables to predict performance, such as whether students are progressing, being retained, or conditionally progressing. The results could help schools identify students at risk of failing and take actions to help them succeed.
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
The document introduces ontology and describes what it is from both philosophical and computer science perspectives. An ontology in computers consists of a vocabulary to describe a domain, specifications of the meaning of terms, and constraints capturing additional knowledge about the domain. It then provides an example ontology and discusses applications of ontologies such as for the semantic web. It also discusses important considerations for building ontologies such as collaboration, versioning, and ease of use.
** Machine Learning Training with Python: https://www.edureka.co/python **
This Edureka tutorial will provide you with a detailed and comprehensive knowledge of the Naive Bayes Classifier Algorithm in python. At the end of the video, you will learn from a demo example on Naive Bayes. Below are the topics covered in this tutorial:
1. What is Naive Bayes?
2. Bayes Theorem and its use
3. Mathematical Working of Naive Bayes
4. Step by step Programming in Naive Bayes
5. Prediction Using Naive Bayes
Check out our playlist for more videos: http://bit.ly/2taym8X
I have conducted a workshop on Tensorflow2.0 at Facebook Dev CIrcle. This mostly covers the importance of TensorFlow to implement deep neural networks.
You can check the related demo at:
https://github.com/rayyan17/Introduction-To-Tensor-Flow.git
The World Wide Web (Web) is a popular and interactive medium to disseminate information today.
The Web is huge, diverse, and dynamic and thus raises the scalability, multi-media data, and temporal issues respectively.
Cassandra is a free and open-source distributed NoSQL database management system designed to handle large amounts of data across many commodity servers, providing high availability with no single point of failure. The slides explain the details of data modeling in Cassandra.
1. The document defines key terms related to information retrieval systems such as information, retrieval, system, and discusses the basic components and functions of IRS.
2. It explains that the role of users is to formulate queries, and the role of librarians is to assist users in meeting their information needs.
3. The document contrasts older IRS that retrieved entire documents with modern IRS that allow storage, organization, and access to text and multimedia information through techniques like keyword searching and hyperlinks.
This document provides an introduction to association rule mining. It begins with an overview of association rule mining and its application to market basket analysis. It then discusses key concepts like support, confidence and interestingness of rules. The document introduces the Apriori algorithm for mining association rules, which works in two steps: 1) generating frequent itemsets and 2) generating rules from frequent itemsets. It provides examples of how Apriori works and discusses challenges in association rule mining like multiple database scans and candidate generation.
Advances in Learning Analytics and Educational Data Mining MehrnooshV
This presentation is about the state-of-the-art of Learning Analytics and Edicational Data Mining. It is presented by Mehrnoosh Vahdat as the introductory tutorial of Special Session 'Advances in Learning Analytics and Educational Data Mining' at ESANN 2015 conference.
Session 8 - Creating Data Processing Services | Train the Trainers ProgramFIWARE
This technical session for Local Experts in Data Sharing (LEBDs), this session will explain how to create data processing services that are key to i4Trust.
This presentation gives details on technologies and approaches towards exploiting Linked Data by building LD applications. In particular, it gives an overview of popular existing applications and introduces the main technologies that support implementation and development. Furthermore, it illustrates how data exposed through common Web APIs can be integrated with Linked Data in order to create mashups.
Linked Open Data Principles, Technologies and ExamplesOpen Data Support
Theoretical and practical introducton to linked data, focusing both on the value proposition, the theory/foundations, and on practical examples. The material is tailored to the context of the EU institutions.
This document discusses key enabling technologies for the Internet of Things (IoT), including wireless sensor networks, embedded systems, cloud computing, communication protocols, and big data analytics. It provides examples of how these technologies are used in various IoT applications and systems. It also outlines some characteristics of big data generated by IoT systems and describes the basic components of embedded systems and communication protocols used in IoT.
Lect7 Association analysis to correlation analysishktripathy
Association rule mining aims to discover interesting relationships between items in large datasets. The document discusses key concepts in association rule mining including support, confidence, and correlation. Support measures how frequently an itemset occurs, while confidence measures the conditional probability of an itemset given another itemset. Correlation evaluates statistical dependence between itemsets and can be used to measure lift. Various measures are proposed to evaluate interestingness and redundancy of discovered rules.
The Pursuit of International Recognition (Indonesian Scholar Forum, ISIC PPI ...Bening Tirta Muhammad
This presentation comprises the ideas I put on my essay that was selected for Indonesian Scholars International Convention held by PPI (Perhimpunan Pelajar Indonesia) UK in collaboration with PPI Oxford and PPI London.
Sciences Librarian Training, Biochemistry 1B, 2010 : How to find information ...Pavlinka Kovatcheva
This document provides steps for finding information for a scientific report. It outlines:
1) Getting started with your project by thinking of keywords and finding resources beyond Google through the library website and subject portals.
2) A 5-step process for online searching including identifying keywords, locating resources through the library or internet, and using Boolean operators.
3) An overview of how to write a report, focusing on the typical structure including a title, abstract, introduction, etc.
4) Details on locating journal articles, books and reference works through library databases, Google Scholar, and subject-specific sources. It emphasizes identifying scholarly sources and proper citing of references.
This document discusses web usage mining and the associated processes. It introduces web usage mining as the automatic discovery of patterns in clickstream data and user interactions with websites. The goal is to analyze user behavioral patterns and profiles. Key aspects covered include preprocessing log data, identifying user sessions, integrating e-commerce events, and applying data mining techniques. Web usage mining is used to gain insights into user behaviors and personalize websites.
Information retrieval 15 alternative algebraic modelsVaibhav Khanna
The document discusses alternative algebraic models for information retrieval, including the generalized vector model. The generalized vector model allows for index terms to be non-orthogonal, representing correlations between terms. It models term dependencies through "minterms" - binary patterns of term occurrence. While allowing representation of term correlations, the model has higher computational costs than the standard vector model and it is unclear when it performs better.
The document discusses association rule mining and the Apriori and FP-Growth algorithms. It provides the following information:
- Association rule mining discovers interesting relationships between variables in large databases. It expresses relationships between frequently co-occurring items as association rules.
- The Apriori algorithm uses frequent itemsets to generate association rules. It employs an iterative approach and pruning to reduce candidate sets.
- FP-Growth improves upon Apriori by compressing transaction data into a frequent-pattern tree structure and scanning the database twice instead of multiple times. This improves mining efficiency over Apriori.
Data mining to predict academic performance. Ranjith Gowda
This document proposes using data warehousing and data mining techniques to predict student academic performance in schools. It describes collecting student data like scores, attendance, discipline, and assignments into a data warehouse. Data mining methods are then used to analyze the student data and identify relationships between variables to predict performance, such as whether students are progressing, being retained, or conditionally progressing. The results could help schools identify students at risk of failing and take actions to help them succeed.
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
The document introduces ontology and describes what it is from both philosophical and computer science perspectives. An ontology in computers consists of a vocabulary to describe a domain, specifications of the meaning of terms, and constraints capturing additional knowledge about the domain. It then provides an example ontology and discusses applications of ontologies such as for the semantic web. It also discusses important considerations for building ontologies such as collaboration, versioning, and ease of use.
** Machine Learning Training with Python: https://www.edureka.co/python **
This Edureka tutorial will provide you with a detailed and comprehensive knowledge of the Naive Bayes Classifier Algorithm in python. At the end of the video, you will learn from a demo example on Naive Bayes. Below are the topics covered in this tutorial:
1. What is Naive Bayes?
2. Bayes Theorem and its use
3. Mathematical Working of Naive Bayes
4. Step by step Programming in Naive Bayes
5. Prediction Using Naive Bayes
Check out our playlist for more videos: http://bit.ly/2taym8X
I have conducted a workshop on Tensorflow2.0 at Facebook Dev CIrcle. This mostly covers the importance of TensorFlow to implement deep neural networks.
You can check the related demo at:
https://github.com/rayyan17/Introduction-To-Tensor-Flow.git
The World Wide Web (Web) is a popular and interactive medium to disseminate information today.
The Web is huge, diverse, and dynamic and thus raises the scalability, multi-media data, and temporal issues respectively.
Cassandra is a free and open-source distributed NoSQL database management system designed to handle large amounts of data across many commodity servers, providing high availability with no single point of failure. The slides explain the details of data modeling in Cassandra.
1. The document defines key terms related to information retrieval systems such as information, retrieval, system, and discusses the basic components and functions of IRS.
2. It explains that the role of users is to formulate queries, and the role of librarians is to assist users in meeting their information needs.
3. The document contrasts older IRS that retrieved entire documents with modern IRS that allow storage, organization, and access to text and multimedia information through techniques like keyword searching and hyperlinks.
This document provides an introduction to association rule mining. It begins with an overview of association rule mining and its application to market basket analysis. It then discusses key concepts like support, confidence and interestingness of rules. The document introduces the Apriori algorithm for mining association rules, which works in two steps: 1) generating frequent itemsets and 2) generating rules from frequent itemsets. It provides examples of how Apriori works and discusses challenges in association rule mining like multiple database scans and candidate generation.
Advances in Learning Analytics and Educational Data Mining MehrnooshV
This presentation is about the state-of-the-art of Learning Analytics and Edicational Data Mining. It is presented by Mehrnoosh Vahdat as the introductory tutorial of Special Session 'Advances in Learning Analytics and Educational Data Mining' at ESANN 2015 conference.
Session 8 - Creating Data Processing Services | Train the Trainers ProgramFIWARE
This technical session for Local Experts in Data Sharing (LEBDs), this session will explain how to create data processing services that are key to i4Trust.
This presentation gives details on technologies and approaches towards exploiting Linked Data by building LD applications. In particular, it gives an overview of popular existing applications and introduces the main technologies that support implementation and development. Furthermore, it illustrates how data exposed through common Web APIs can be integrated with Linked Data in order to create mashups.
Linked Open Data Principles, Technologies and ExamplesOpen Data Support
Theoretical and practical introducton to linked data, focusing both on the value proposition, the theory/foundations, and on practical examples. The material is tailored to the context of the EU institutions.
This document discusses key enabling technologies for the Internet of Things (IoT), including wireless sensor networks, embedded systems, cloud computing, communication protocols, and big data analytics. It provides examples of how these technologies are used in various IoT applications and systems. It also outlines some characteristics of big data generated by IoT systems and describes the basic components of embedded systems and communication protocols used in IoT.
Lect7 Association analysis to correlation analysishktripathy
Association rule mining aims to discover interesting relationships between items in large datasets. The document discusses key concepts in association rule mining including support, confidence, and correlation. Support measures how frequently an itemset occurs, while confidence measures the conditional probability of an itemset given another itemset. Correlation evaluates statistical dependence between itemsets and can be used to measure lift. Various measures are proposed to evaluate interestingness and redundancy of discovered rules.
The Pursuit of International Recognition (Indonesian Scholar Forum, ISIC PPI ...Bening Tirta Muhammad
This presentation comprises the ideas I put on my essay that was selected for Indonesian Scholars International Convention held by PPI (Perhimpunan Pelajar Indonesia) UK in collaboration with PPI Oxford and PPI London.
Sciences Librarian Training, Biochemistry 1B, 2010 : How to find information ...Pavlinka Kovatcheva
This document provides steps for finding information for a scientific report. It outlines:
1) Getting started with your project by thinking of keywords and finding resources beyond Google through the library website and subject portals.
2) A 5-step process for online searching including identifying keywords, locating resources through the library or internet, and using Boolean operators.
3) An overview of how to write a report, focusing on the typical structure including a title, abstract, introduction, etc.
4) Details on locating journal articles, books and reference works through library databases, Google Scholar, and subject-specific sources. It emphasizes identifying scholarly sources and proper citing of references.
This document provides information for students on accessing library resources and conducting research at the University of Leicester. It outlines how to access electronic resources off-campus using a CFS username and password. It also explains how to search the library catalog and databases, evaluate websites, cite references, and seek help from the information librarian.
According to the Open Education Consortium, “sharing is probably the most basic characteristic of education: education is sharing knowledge, insights, and information with others, upon which new knowledge, skills, ideas, and understanding can be built." Whether they are purchased or freely acquired, librarians should be open to sharing their resources to everyone who wants to use them to enrich their lives through education. Open Education Resources (OER) include resources or tools that can be used and modified for free and without any legal or technical barriers, and when used properly can help foster a transparent culture of learning and engagement in our communities. In this webinar:
• Learn what Open Education Resources (OER) are and how they can be used to engender trust, generate rigorous learning opportunities, and potentially lead to smarter decision-making strategies.
• Discover a variety of OER and Open Access (OA) repositories to find accessible and authoritative resources, including textbooks, to use in curriculum.
• Acquire OER strategies for developing a variety of educational opportunities using a variety of formats.
•Understand various issues (e.g., GDPR) impacting OER in libraries.
This document outlines a project using blogs and wikis to support student writing. It found that students who wrote essays as blogs were more likely to meet deadlines, act on feedback, and read each other's work. Students liked getting quick feedback and building an online portfolio. The document provides advice on setting up blogs and wikis, including having the framework ready, teaching feedback skills, and using sites that alert teachers to new posts. Benefits included lighter paperwork, quicker assessment, and resources that can be reused. Wikis and blogs could also be used for extension activities, practice essays, and reflective blogs.
This document outlines a project using blogs and wikis to support student writing. It found that students who wrote essays as blogs were more likely to meet deadlines, act on feedback, and read each other's work. Students liked getting quick feedback and building an online portfolio. The document provides advice on setting up blogs and wikis, including having the framework ready, teaching feedback skills, and using sites that alert teachers to new posts. Benefits included lighter paperwork, quicker assessment, and resources that can be reused. Wikis and blogs could also be used for extension activities, practice essays, and reflective blogs.
This document discusses open access resources and how researchers can participate in open access publishing. It defines open access as providing online access to scientific information that is free of charge and most copyright and licensing restrictions. It outlines the gold route of publishing in open access journals which involves identifying reputable open access journals, submitting papers for peer review, and paying article processing charges if accepted. It also describes the green route of self-archiving papers in open repositories after acceptance from traditional journals. The document provides examples of open access journals, repositories, and other resources that can be used to make research openly accessible.
Improving University Rankings through Google Scholar ProfilesSteve McCarty
Presentation at the (Foreign Language Education) FLExICT Conference at the Ritsumeikan University Osaka Ibaraki Campus on September 9, 2016. It shows how optimizing Google Scholar Profiles can enhance the academic recognition of individual researchers while contributing to improving the international rankings of their university.
The document provides information on using information and communication technologies (ICT) in sociology. It discusses what research is and its relationship to the internet. It then outlines various ICT resources that can be used in sociology research, such as creating websites and blogs, online questionnaires, e-books, digital library software, e-journals, and academic social networking sites. Useful websites for sociology researchers are also listed, including databases, repositories, journals, and video resources.
Karen Veitch, Institutional Repository Support Assistant -
University of Strathclyde
As a member of the Scholarly Publications and Research Data team, I have worked collaboratively with colleagues in Research and Learning Support to integrate key concepts and information about developments within Open Research into an online Academic Library Skills course. I will speak about my experience of working on this project, which sits at the intersection of information literacy instruction and scholarly communications, bringing together aspects of librarianship which often remain distinct. The themes of the intersection of information literacy instruction and scholarly communications and collaborative working across teams are what I will focus on during this lightning talk
Value of Making Undergraduate Theses Available Open Accessboockm
This document summarizes the value of ScholarsArchive@OSU, an open access archive of undergraduate theses at Oregon State University. It began with the Honors College and departments of International Studies and Bioresource Research. Challenges included training people and establishing workflows for submissions. For the library, it achieves open access goals and provides content. For the university, it shows student research quality and engagement and can help with recruiting. Students benefit from permanent URLs and examples of other student work. Faculty see student mentoring demonstrated and satisfaction of research grant requirements. The archive raises the importance and visibility of undergraduate work globally online.
Libraries and Social Software: City University 2009Jane Secker
1) The document discusses how libraries are adopting and experimenting with various Web 2.0 technologies like social networking, blogging, RSS feeds, and social bookmarking.
2) It provides examples of how several libraries are using technologies like Facebook, blogs, delicious, and YouTube to engage users and share information.
3) The author argues that libraries need to embrace these new technologies to stay relevant and meet evolving user expectations, though ensuring staff training and addressing privacy/security issues remains important.
We could be Heroes: Optimize your University for Global RankingsSteve McCarty
Recommendations according to the criteria of international university ranking organizations and the sources they use such as Google Scholar and open online research repositories.
Integrating UW Libraries Tools into Online CoursesLauren Ray
This document discusses how UW Libraries tools and resources can be integrated into online courses to better serve students taking classes through Educational Outreach. It provides examples of research guides, LibGuides, a chat widget for 24/7 research help, and online tutorials that can be embedded directly into online courses. The purpose is to give students easy access to library resources from within their learning environment.
Student Voice & Choice with Library and Makerspace Centers by Collette J.Collette J.
My presentation for the PA School Librarians Association 2018 Annual Conference in Hershey, PA.
During the session, I showed physical copies of each library center with all of the materials I use at them, as well as how I'm using Google Classroom to manage each of the 3 types of library centers that I offer to students in 3rd, 4th, and 5th grades: Research Centers, Reading and Language Centers, and Makerspace Centers.
Download to view the presenter notes, which include links to resources, freebies, and products for teachers, elementary teacher-librarians, and library media specialists who are interested in library centers and the maker movement.
The original presentation can be viewed at: http://bit.ly/LibraryCentersMrsJ.
The document discusses using Web 2.0 tools to cultivate information literacy in students through personal learning environments. It describes projects using tools like Google Custom Search, Pageflakes, and a library blog to provide resources to medical ethics and law students. While students found some tools useful, they did not significantly change work habits or build an online community. Moving forward, the library aims to better integrate resources and promote a culture change to develop information literacy as a core skill.
Engaging Students Through Social Media, Beth McGough, Internet Librarian 2013ProQuest
The document discusses engaging students through social media. It finds that students use social media to collaborate and obtain information from peers. While they may not currently interact with libraries on social media, students are open to doing so. The document recommends that libraries establish a presence on Facebook and Twitter, follow relevant accounts, and provide tools for organizing research and citations through social media. It also suggests training students on using social media for research and connecting with librarians and researchers in their fields through social platforms.
Computers in Libraries 2014: Engaging Students Through Social MediaProQuest
This presentation looks a recent study on how undergraduate and graduate students use social media for research and study. The presentation also incorporates ideas from recent literature on the topic.
Similar to How to link Google Scholar to the UJ Full-Text Online Articles (20)
The document discusses the role of librarians in supporting open access. It defines open access as research outputs being distributed online free of cost. It outlines the benefits of open access and initiatives like Plan S which require scientists to publish open access by 2021. The document also discusses the University of Johannesburg (UJ) Library's support for open access through maintaining an institutional repository, open journal system, developing an open access policy and guide, and assisting with article processing charges and publishing options. UJ librarians can provide help with finding reliable open access journals and understanding open science concepts like research data management.
The document discusses developments at the UJ Library to better support postgraduate research. This includes the construction of a new learning mall with research commons areas for postgraduates to collaborate. It also outlines library resources like databases, online journals and books, research tools, and theses/dissertations. The role of the subject librarian in providing research support and training on tools is described. Finally, the document discusses using social media to create a digital profile, connect with other researchers, collaborate on projects, and establish an online identity as a researcher.
The Library and 1st year Science Students: Collaboration in Teaching Informat...Pavlinka Kovatcheva
The document summarizes Pavlinka Kovatcheva's presentation on information literacy training provided to first year science students at the University of Johannesburg in 2012. It describes orientation sessions, library tours, subject-specific training sessions, one-on-one consultations, online resources and tutorials provided to help students develop skills in finding and evaluating academic information. It also discusses collaborations with academic staff to integrate literacy instruction and assessments into coursework. Feedback was largely positive and recommendations were made to strengthen partnerships between librarians and faculty.
Open Access for Research: The Librarian Overview of Opportunities & Trends Pavlinka Kovatcheva
This document provides an overview of opportunities and trends in open access for research. It outlines the librarian's presentation topics including open access for research, institutional repositories, open access journals, social media and research, and librarian support for researchers. The presentation aims to inform researchers about maximizing access to research findings and increasing research impact through open access.
The Embedded Librarian: Using Technology in Service DeliveryPavlinka Kovatcheva
The document discusses embedded librarianship and provides examples from the University of Johannesburg Sciences Librarian. It defines embedded librarianship as librarians becoming integral parts of the units and groups they work with. The UJ Sciences Librarian discusses establishing partnerships within the Sciences Faculty and departments, providing instruction in classrooms and online, and using social media and mobile technologies to connect with students and faculty. The librarian provides practical tips and examples of activities like attending department events, collaborating on curriculum support, and maintaining a presence on the learning management system and social media.
New Roles & Skills for the New Normal: The multi skilling academic librarian ...Pavlinka Kovatcheva
The document summarizes the changing roles of academic librarians in adapting to new technologies and user needs. It discusses how librarians have transitioned from traditional roles in the 1980s to taking on social networking, mobile, and embedded roles in recent decades. This includes using technologies like blogs, wikis, social media, and mobile apps to engage users. The document also describes an example of an embedded science librarian partnership at the University of Johannesburg to provide instruction and research support to faculty and students.
The Technologically Challenged Academic Librarian: What has changed in the pr...Pavlinka Kovatcheva
The document summarizes the changing information environment in South African academic libraries, using the University of Johannesburg Zoology Department and library as an example. It discusses the growth of online resources, social media, and mobile technologies. The librarian describes transforming her role from traditional to more technologically-focused, using tools like blogs, wikis, social bookmarking and networking to better serve patrons.
The Academic Librarian on the Move: The Use of Mobile Technologies in Support...Pavlinka Kovatcheva
The document discusses trends in mobile technology and how academic librarians can use mobile devices to support teaching, learning, and research. It outlines how librarians can develop mobile applications and websites, use social media and QR codes, and provide access to databases and ebooks through mobile interfaces. The document encourages librarians to explore all opportunities to connect with users through their mobile devices and promote available library services and resources.
The document discusses how academic libraries can use social networking to communicate with users, promote resources and services, and network with other librarians. It defines social networking and explains how libraries can create presences on platforms like Facebook, Twitter, LinkedIn, blogs, Delicious, YouTube and mobile apps. The document provides examples of how the sciences library at the University of Johannesburg uses these tools and argues that a coordinated social media strategy can help libraries connect with users and each other in new ways.
Right to Research Subscription-based vs Open Access JournalsPavlinka Kovatcheva
This document summarizes a presentation about open access journals and institutional repositories. It discusses the benefits of open access in maximizing research impact and visibility. It provides an overview of subscription-based databases and resources, as well as South African and international open access journal collections and repositories. Commercial publishers are increasingly adopting hybrid open access models. Universities should promote open access through mandates, institutional repositories, and collaboration on new open access journals and resources.
This presentation discusses open access and how it promotes the free sharing of scholarly research. It defines open access and notes that only a fraction of research is accessible currently due to limited journal subscriptions. The presentation outlines the benefits of open access in increasing research visibility, usage, impact, and progress. It provides examples of open access journal collections and repositories, and how researchers can publish and fund open access. It also discusses the University of Johannesburg's initiatives to promote open access through its institutional repository and open access awareness events.
Raising Awareness in Library 2.0 way: The UJ Sciences Librarian Virtual Exper...Pavlinka Kovatcheva
1) The document discusses ways for academic librarians to raise awareness of library resources and services using traditional methods as well as Library 2.0 tools like blogs, social networking, RSS feeds, and wikis.
2) It provides examples of implementing various Library 2.0 technologies like creating library blogs on Blogspot and Wordpress, using Facebook and Twitter for outreach, and developing a wiki portal for subject guides.
3) The author argues that librarians should utilize both traditional methods and Library 2.0 tools to effectively reach a diverse user community, from disadvantaged learners to researchers.
Metamorphosis in the Academic Library: the virtual life of a science librarian Pavlinka Kovatcheva
The document discusses the evolution of the science librarian's role from traditional to virtual and use of Web 2.0 technologies. It describes the traditional roles of the 1980s and transitional roles of the 1990s. The 21st century role integrates virtual services, Web 2.0 technologies, and face-to-face support. Services now include blogs, social networking, instant messaging, podcasts, and virtual research portals to better serve users both online and in-person. The modern science librarian role effectively blends traditional and virtual methods to provide comprehensive support.
Social Software in Libraries: Powerful Marketing Tools for cutting-edge Libra...Pavlinka Kovatcheva
The document discusses using social software tools for marketing library resources and services. It provides examples of how a librarian used blogs, social bookmarking sites, photo sharing, Twitter, and other tools to raise awareness of library collections and events. Statistics showed these social media marketing efforts were successful at driving traffic to the librarian's portal and blog. The conclusion encourages librarians to coordinate marketing using both traditional and web 2.0 channels tailored to their library's needs and resources.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to link Google Scholar to the UJ Full-Text Online Articles
1. How to link Google Scholar to the UJ Full-Text Online Articles
Pavlinka Kovatcheva, Faculty Librarian: Science
University of Johannesburg
June 2017; E-mail: pkovatcheva@uj.ac.za
2. 2
How to link Google Scholar to the UJ full-text articles
Step 1: Access Google Scholar
https://scholar.google.co.za/
3. 3
How to link Google Scholar to the UJ full-text articles
Step 2: Select “Library Links” from the Menu
https://scholar.google.co.za/
4. 4
How to link Google Scholar to the UJ full-text articles
Step 3: Type “University of Johannesburg” and search
https://scholar.google.co.za/
5. 5
How to link Google Scholar to the UJ full-text articles
Step 4: Select the options with full-text @UJ and “Save”
https://scholar.google.co.za/
6. 6
How to link Google Scholar to the UJ full-text articles
Step 5: Search Google Scholar and Click on the Link - full-text @UJ
https://scholar.google.co.za/
7. 7
How to link Google Scholar to the UJ full-text articles
Step 6: Linking to the UJ Database with full-text access
https://scholar.google.co.za/
8. 8
When searching Google Scholar:
• The linking to the FULL-TEXT articles will work only for UJ affiliated users
• The linking works only for articles available in ONLINE format
• The linking to some content may not work. Please, follow up the reference through
the Library Resources (Journal title search via UJ: Library Catalogue or A-to-Z
Journals)
Recommended access to UJ Science Library Resources:
• Science Library LibGuides
• Science – Faculty LibGuide – as a starting point
Science LibGuides: http://uj.ac.za.libguides.com/science UJ Library: https://www.uj.ac.za/library
In Conclusion