The real challenge in the modern world is not producing information or storing information,
but apt and proper use of information by people. Since volume of information is growing in leaps
and bounds, the information needs of users are becoming more and more diverse and complex. In
this changing context information providers are facing a lot of challenges to capture, process, store
and disseminate the available information for actual users. The user studies provide a clear
understanding of the actual information needs of the user in order to readjust the existing
information systems or chose new ones. Various models of information needs and informationseeking behaviour have been discussed. Each modelrepresents a different but an overlapping or
similar approach to information seeking behavior of users. In order to satisfy the information need,the user actively undergoes the information seeking processes. Some factors like physiological,emotional, learning and demographic, etc. also deeply influence information seeking behaviour i.e.
some people have to face some obstacles. These barriers may be economic, social, environmental,
time related or geographical.Effectiveness of a professional depends upon dissemination and use of right information at
right time. Information and communication technologies have changed the way in which thelibraries provide their services. Users study provide deeperunderstanding of access to their
collections and services .The need and behavior of their users and satisfaction ratio of users are
new assessment techniques of libraries. Therefore an effort has been made to how determineinformation need and information seeking behavior of users.
Classifying web users in a personalised search setup is cumbersome due the very nature of dynamism in
user browsing history. This fluctuating nature of user behaviour and user interest shall be well interpreted
within a fuzzy setting. Prior to analysing user behaviour, nature of user interests has to be collected. This
work proposes a fuzzy based user classification model to suit a personalised web search environment. The
user browsing data is collected using an established customised browser designed to suit personalisation.
The data are fuzzified and fuzzy rules are generated by applying decision trees. Using fuzzy rules, the
search pages are labelled to aid grouping of user search interests. Evaluation of the proposed approach
proves to be better when compared with Bayesian classifier.
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...ijdmtaiir
-In this study a comprehensive evaluation of two
supervised feature selection methods for dimensionality
reduction is performed - Latent Semantic Indexing (LSI) and
Principal Component Analysis (PCA). This is gauged against
unsupervised techniques like fuzzy feature clustering using
hard fuzzy C-means (FCM) . The main objective of the study is
to estimate the relative efficiency of two supervised techniques
against unsupervised fuzzy techniques while reducing the
feature space. It is found that clustering using FCM leads to
better accuracy in classifying documents in the face of
evolutionary algorithms like LSI and PCA. Results show that
the clustering of features improves the accuracy of document
classification
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...ijcsa
Recommender systems are utilized to predict and recommend relevant items to system users. Item could be
in any forms such as documents, location, movie and articles. The mechanism of recommender system is
based on examination which includes users’ behaviors, item ratings, various logs (e.g. user’s history log)
and, social connections. The main objective of the examination is to predict items which have great potential to be liked by users. Although, traditional recommender systems have been very successful to predict what user might like, they did not take into consideration contextual information such as users’
location. In this paper, we propose a new framework with the aim of enhancing accuracy of recommendations in user-based collaborative filtering by considering about users’ locations.
IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATI...ijcsa
As the information proliferates, searching for relevant information has become a primary task. Searching
or Information retrieval (IR) aims to help the users in organising as well as retrieving those documents
from the documentary collection which are most likely to satisfy information needs of the user. An optimal
Information Retrieval System (IRS) is one which retrieves only those documents from the document
database which are pertinent to user's information needs, while excluding documents that are not relevant.
Genetic Algorithm is described by higher likelihood of finding good solutions to large and complex
problems of IR optimisation. The performance of Genetic Algorithm depends upon the decision of
underlying operators used namely selection, crossover and mutation. A GA-based algorithm IRIGA
(Information Retrieval Improvement using Genetic Algorithm) is developed to improve the performance of
Information Retrieval System. This paper presents a comparison of performance of IRIGA when different
selection methods are used. The results are analysed by conducting experiments keeping the rest of the GA
parameters as constant and varying only the selection strategy.
Influence User Involvement On The Quality Of Accounting Information SystemArnol Awal
Background of this study was based on the argument that there were correlation between user involvement and quality of accounting information system. This study aims to examine: the influence of user involvement on the quality of the information system
Classifying web users in a personalised search setup is cumbersome due the very nature of dynamism in
user browsing history. This fluctuating nature of user behaviour and user interest shall be well interpreted
within a fuzzy setting. Prior to analysing user behaviour, nature of user interests has to be collected. This
work proposes a fuzzy based user classification model to suit a personalised web search environment. The
user browsing data is collected using an established customised browser designed to suit personalisation.
The data are fuzzified and fuzzy rules are generated by applying decision trees. Using fuzzy rules, the
search pages are labelled to aid grouping of user search interests. Evaluation of the proposed approach
proves to be better when compared with Bayesian classifier.
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...ijdmtaiir
-In this study a comprehensive evaluation of two
supervised feature selection methods for dimensionality
reduction is performed - Latent Semantic Indexing (LSI) and
Principal Component Analysis (PCA). This is gauged against
unsupervised techniques like fuzzy feature clustering using
hard fuzzy C-means (FCM) . The main objective of the study is
to estimate the relative efficiency of two supervised techniques
against unsupervised fuzzy techniques while reducing the
feature space. It is found that clustering using FCM leads to
better accuracy in classifying documents in the face of
evolutionary algorithms like LSI and PCA. Results show that
the clustering of features improves the accuracy of document
classification
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...ijcsa
Recommender systems are utilized to predict and recommend relevant items to system users. Item could be
in any forms such as documents, location, movie and articles. The mechanism of recommender system is
based on examination which includes users’ behaviors, item ratings, various logs (e.g. user’s history log)
and, social connections. The main objective of the examination is to predict items which have great potential to be liked by users. Although, traditional recommender systems have been very successful to predict what user might like, they did not take into consideration contextual information such as users’
location. In this paper, we propose a new framework with the aim of enhancing accuracy of recommendations in user-based collaborative filtering by considering about users’ locations.
IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATI...ijcsa
As the information proliferates, searching for relevant information has become a primary task. Searching
or Information retrieval (IR) aims to help the users in organising as well as retrieving those documents
from the documentary collection which are most likely to satisfy information needs of the user. An optimal
Information Retrieval System (IRS) is one which retrieves only those documents from the document
database which are pertinent to user's information needs, while excluding documents that are not relevant.
Genetic Algorithm is described by higher likelihood of finding good solutions to large and complex
problems of IR optimisation. The performance of Genetic Algorithm depends upon the decision of
underlying operators used namely selection, crossover and mutation. A GA-based algorithm IRIGA
(Information Retrieval Improvement using Genetic Algorithm) is developed to improve the performance of
Information Retrieval System. This paper presents a comparison of performance of IRIGA when different
selection methods are used. The results are analysed by conducting experiments keeping the rest of the GA
parameters as constant and varying only the selection strategy.
Influence User Involvement On The Quality Of Accounting Information SystemArnol Awal
Background of this study was based on the argument that there were correlation between user involvement and quality of accounting information system. This study aims to examine: the influence of user involvement on the quality of the information system
Selection of Articles using Data Analytics for Behavioral Dissertation Resear...PhD Assistance
Outcomes in health-related issues including psychological, educational, Behavioral, environmental, and social are intended to sustain positive change by digital interferences. These changes may be delivered using any digital device like a phone or computer, and make them gainful for the provider. Complex and large-scale datasets that contain usage data can be yielded by testing a digital intervention. This data provides invaluable detail about how the users interact with these interventions and notify their knowledge of engagement, if they are analyzed properly. This paper recommends an innovative framework for the process of analyzing usage associated with a digital intervention .
PhD Assistance is an Academic The Best Dissertation Writing Service & Consulting Support Company established in 2001. specialiWeze in providing PhD Assignments, PhD Dissertation Writing Help , Statistical Analyses, and Programming Services to students in the USA, UK, Canada, UAE, Australia, New Zealand, Singapore and many more.
Website Visit: https://bit.ly/3dANXUD
Contact Us:
UK NO: +44-1143520021
India No: +91-8754446690
Email: info@phdassistance.com
A Study of Neural Network Learning-Based Recommender Systemtheijes
A recommender system sorts and recommends the information which meets personal preferences among a huge amount of data provided by e-commerce. In particular, collaborative filtering (CF) is the most widely used technique in these recommendation systems. This method finds neighboring users who have similar preferences with particular users and recommends the items preferred by the former. This study proposes a neural network learning model as a new technique to find neighboring users using the collaborative filtering method. This kind of neural network learning model takes care of a sparseness problem during the analysis stage among those related with target users. The proposed method was tested with MovieLens data sets, and the results showed that precision improved by 6.7%.
A study model on the impact of various indicators in the performance of stude...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Educational Data Mining is used to predict the future learning behavior of the student. It is still a research topic for the researcher who wants do better result from the prediction of the student. The results of all these techniques help the teachers, management, and administrator to draft new rules and policy for the improvement of the educational standards and hence overall results and student retention. Taking this point in mind work has been done to find the slow learner in a High School class and then provide timely help to them for improving their overall result. There are lots of techniques of data mining are available for use but we are selecting only those techniques which are mostly used by different research for their result prediction like J48, REPTree, Naive Bayes, SMO, Multilayer Perceptron. On the collected dataset Multilayer Perception classification algorithm gives 87.43% accuracy when using whole dataset as training dataset and SMO and J48 gives 69.00% accuracy when using 10-fold cross validation algorithm.
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...csandit
Social groups in the form of different discussion forums are proliferating rapidly. Most of these
forums have been created to exchange and share members’ knowledge in various domains.
Members in these groups may need to use and retrieve other members’ knowledge. Therefore,
recommender systems are one of the techniques which can be employed in order to extract
knowledge based on the members’ needs and favorites. It is noteworthy that not only the users’
comments and posts can have valuable information, but also there are some other valuable
information which can be obtained from social data; moreover, it could be extracted from
relations and interactions among users. Hence, association rules mining techniques are one of
the techniques which can be applied in order to extract more implicit data as input to the
recommender system. Our objective in this study is to improve the performance of a hybrid
recommender system by defining new hybrid rules. In this regard, for the first time, we have
defined new hybrid rules by considering both users and posts’ content data. Each of the defined
rules has been examined on an asynchronous discussion group in this study. In addition, the
impact of the defined rules on the precision and recall values of the recommender system has
been examined. We found that according to this impact, a classification of the defined rules can
be considered and a number of weights can be assigned to each rule based on their impact and
usability in the specific domain or application. It is noteworthy that the results of the
experiments have been promising.
Presentation given by Martin Halbert at the Digital Library Federation meeting in Baltimore, MA on Tuesday, November 1, 2011. Title: "National Status of Data Management. The DataRes and CLIR/Sloan Research Projects on Data Management Policies and Practices."
Evaluating the Impact of Gamification in High School Library Media CentersAriel Dagan
Creating behavioral change in approach to reading habits by High School students might be stimulated by extrinsic motivators that through this process become intrinsic and habit forming.
Maede Kiani Sarkaleh, Mehregan Mahdavi and Mahsa BaniardalanIJMIT JOURNAL
Today, mobile devices are widely used by many tourists. They can use mobile for accessing information
about all sightseeing around the world. On the other hand, it seems essential to personalize the content due
to diversity of learners and variation of the tools they use. On the whole, the goal for personalization is to
suggest a collection of comprehensive activities, taking into consideration factors such as location, user
preferences and interests and so on. One of the applications of recommender systems is in tourism industry.
Research on the field of using social media has gained more importance in the recent days due to the rapid development of social media technologies. Looking at the behavioral intention and attitude of using social media for collaborative learning within Malaysian higher educational institutions and the influencing factors in this regard has received little attention by researchers. The study aims at examining the determinants that affect learners’ attitude and behavior intention regarding their use social media to achieve collaborative learning. Such examination is carried out by using the Theory Acceptance Model (TAM) and Unified Theory of Acceptance and Usage of Technology (UTAUT). A total of 243 participants were recruited for this study. The findings indicated that students’ attitudes and behavior are strong indicators of their intentions in terms of using social media in collaborative learning.
DATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVEIJDKP
Knowledge Discovery in Databases is the process of finding knowledge in massive amount of data where
data mining is the core of this process. Data mining can be used to mine understandable meaningful patterns from large databases and these patterns may then be converted into knowledge.Data mining is the process of extracting the information and patterns derived by the KDD process which helps in crucial decision-making.Data mining works with data warehouse and the whole process is divded into action plan to be performed on data: Selection, transformation, mining and results interpretation. In this paper, we have reviewed Knowledge Discovery perspective in Data Mining and consolidated different areas of data
mining, its techniques and methods in it.
A REVIEW ON LOAD BALANCING IN CLOUD USING ENHANCED GENETIC ALGORITHM IAEME Publication
“Cloud computing” is a term, which involves virtualization, distributed
computing, networking, software and net services. A cloudconsists of several partssuch as shoppers, datacenter and distributed servers. It includes fault tolerance, high
availability, scalability, flexibility, reduced overhead for users, reduced cost of
possession, on demand services etc. Central to these issues lies the institution of a
good load reconciliation algorithmic rule. The load can be CPU load, memory
capacity, delay or network load. Load balancing is the method of distributing the load
among varied nodes of a distributed system to boost each resource utilization and job
interval whereas additionally avoiding a state of affairs wherever a number of the
nodes area unit heavily loaded whereas different nodes area unit idle or doing little
work. Load balancing ensures that all the processors within the system or each node
within the network will require the equal quantity of labor at any instant of your time.
This technique will be sender initiated, receiver initiated or symmetric sort
(combination of sender initiated and receiver initiated types). Our objective is to
develop an effective load reconciliation algorithmic rule mistreatment divisible load
programming theorem to maximize or minimize completely different performance
parameters (throughput, latency for example) for the clouds of different sizes (virtualtopology de-pending on the appliance requirement).
In the recent past, Resource sharing concept has become prime factor and playing vital role in
libraries because of innovative developments in Information, Communication and Technology
(ICT). ICT has made easy to establish networks among libraries and share their information
resources quickly and instantly. Resource sharing has become prime reason for establishing
cooperation between libraries without any geographical barriers. The various reasons for resource
sharing are might be cost benefits, non-availability of resources, insufficient library funds, lack of
skills etc. In this paper, the attempt has been made to understand the various aspects of resource
sharing in modern library technological environment.
Selection of Articles using Data Analytics for Behavioral Dissertation Resear...PhD Assistance
Outcomes in health-related issues including psychological, educational, Behavioral, environmental, and social are intended to sustain positive change by digital interferences. These changes may be delivered using any digital device like a phone or computer, and make them gainful for the provider. Complex and large-scale datasets that contain usage data can be yielded by testing a digital intervention. This data provides invaluable detail about how the users interact with these interventions and notify their knowledge of engagement, if they are analyzed properly. This paper recommends an innovative framework for the process of analyzing usage associated with a digital intervention .
PhD Assistance is an Academic The Best Dissertation Writing Service & Consulting Support Company established in 2001. specialiWeze in providing PhD Assignments, PhD Dissertation Writing Help , Statistical Analyses, and Programming Services to students in the USA, UK, Canada, UAE, Australia, New Zealand, Singapore and many more.
Website Visit: https://bit.ly/3dANXUD
Contact Us:
UK NO: +44-1143520021
India No: +91-8754446690
Email: info@phdassistance.com
A Study of Neural Network Learning-Based Recommender Systemtheijes
A recommender system sorts and recommends the information which meets personal preferences among a huge amount of data provided by e-commerce. In particular, collaborative filtering (CF) is the most widely used technique in these recommendation systems. This method finds neighboring users who have similar preferences with particular users and recommends the items preferred by the former. This study proposes a neural network learning model as a new technique to find neighboring users using the collaborative filtering method. This kind of neural network learning model takes care of a sparseness problem during the analysis stage among those related with target users. The proposed method was tested with MovieLens data sets, and the results showed that precision improved by 6.7%.
A study model on the impact of various indicators in the performance of stude...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Educational Data Mining is used to predict the future learning behavior of the student. It is still a research topic for the researcher who wants do better result from the prediction of the student. The results of all these techniques help the teachers, management, and administrator to draft new rules and policy for the improvement of the educational standards and hence overall results and student retention. Taking this point in mind work has been done to find the slow learner in a High School class and then provide timely help to them for improving their overall result. There are lots of techniques of data mining are available for use but we are selecting only those techniques which are mostly used by different research for their result prediction like J48, REPTree, Naive Bayes, SMO, Multilayer Perceptron. On the collected dataset Multilayer Perception classification algorithm gives 87.43% accuracy when using whole dataset as training dataset and SMO and J48 gives 69.00% accuracy when using 10-fold cross validation algorithm.
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...csandit
Social groups in the form of different discussion forums are proliferating rapidly. Most of these
forums have been created to exchange and share members’ knowledge in various domains.
Members in these groups may need to use and retrieve other members’ knowledge. Therefore,
recommender systems are one of the techniques which can be employed in order to extract
knowledge based on the members’ needs and favorites. It is noteworthy that not only the users’
comments and posts can have valuable information, but also there are some other valuable
information which can be obtained from social data; moreover, it could be extracted from
relations and interactions among users. Hence, association rules mining techniques are one of
the techniques which can be applied in order to extract more implicit data as input to the
recommender system. Our objective in this study is to improve the performance of a hybrid
recommender system by defining new hybrid rules. In this regard, for the first time, we have
defined new hybrid rules by considering both users and posts’ content data. Each of the defined
rules has been examined on an asynchronous discussion group in this study. In addition, the
impact of the defined rules on the precision and recall values of the recommender system has
been examined. We found that according to this impact, a classification of the defined rules can
be considered and a number of weights can be assigned to each rule based on their impact and
usability in the specific domain or application. It is noteworthy that the results of the
experiments have been promising.
Presentation given by Martin Halbert at the Digital Library Federation meeting in Baltimore, MA on Tuesday, November 1, 2011. Title: "National Status of Data Management. The DataRes and CLIR/Sloan Research Projects on Data Management Policies and Practices."
Evaluating the Impact of Gamification in High School Library Media CentersAriel Dagan
Creating behavioral change in approach to reading habits by High School students might be stimulated by extrinsic motivators that through this process become intrinsic and habit forming.
Maede Kiani Sarkaleh, Mehregan Mahdavi and Mahsa BaniardalanIJMIT JOURNAL
Today, mobile devices are widely used by many tourists. They can use mobile for accessing information
about all sightseeing around the world. On the other hand, it seems essential to personalize the content due
to diversity of learners and variation of the tools they use. On the whole, the goal for personalization is to
suggest a collection of comprehensive activities, taking into consideration factors such as location, user
preferences and interests and so on. One of the applications of recommender systems is in tourism industry.
Research on the field of using social media has gained more importance in the recent days due to the rapid development of social media technologies. Looking at the behavioral intention and attitude of using social media for collaborative learning within Malaysian higher educational institutions and the influencing factors in this regard has received little attention by researchers. The study aims at examining the determinants that affect learners’ attitude and behavior intention regarding their use social media to achieve collaborative learning. Such examination is carried out by using the Theory Acceptance Model (TAM) and Unified Theory of Acceptance and Usage of Technology (UTAUT). A total of 243 participants were recruited for this study. The findings indicated that students’ attitudes and behavior are strong indicators of their intentions in terms of using social media in collaborative learning.
DATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVEIJDKP
Knowledge Discovery in Databases is the process of finding knowledge in massive amount of data where
data mining is the core of this process. Data mining can be used to mine understandable meaningful patterns from large databases and these patterns may then be converted into knowledge.Data mining is the process of extracting the information and patterns derived by the KDD process which helps in crucial decision-making.Data mining works with data warehouse and the whole process is divded into action plan to be performed on data: Selection, transformation, mining and results interpretation. In this paper, we have reviewed Knowledge Discovery perspective in Data Mining and consolidated different areas of data
mining, its techniques and methods in it.
A REVIEW ON LOAD BALANCING IN CLOUD USING ENHANCED GENETIC ALGORITHM IAEME Publication
“Cloud computing” is a term, which involves virtualization, distributed
computing, networking, software and net services. A cloudconsists of several partssuch as shoppers, datacenter and distributed servers. It includes fault tolerance, high
availability, scalability, flexibility, reduced overhead for users, reduced cost of
possession, on demand services etc. Central to these issues lies the institution of a
good load reconciliation algorithmic rule. The load can be CPU load, memory
capacity, delay or network load. Load balancing is the method of distributing the load
among varied nodes of a distributed system to boost each resource utilization and job
interval whereas additionally avoiding a state of affairs wherever a number of the
nodes area unit heavily loaded whereas different nodes area unit idle or doing little
work. Load balancing ensures that all the processors within the system or each node
within the network will require the equal quantity of labor at any instant of your time.
This technique will be sender initiated, receiver initiated or symmetric sort
(combination of sender initiated and receiver initiated types). Our objective is to
develop an effective load reconciliation algorithmic rule mistreatment divisible load
programming theorem to maximize or minimize completely different performance
parameters (throughput, latency for example) for the clouds of different sizes (virtualtopology de-pending on the appliance requirement).
In the recent past, Resource sharing concept has become prime factor and playing vital role in
libraries because of innovative developments in Information, Communication and Technology
(ICT). ICT has made easy to establish networks among libraries and share their information
resources quickly and instantly. Resource sharing has become prime reason for establishing
cooperation between libraries without any geographical barriers. The various reasons for resource
sharing are might be cost benefits, non-availability of resources, insufficient library funds, lack of
skills etc. In this paper, the attempt has been made to understand the various aspects of resource
sharing in modern library technological environment.
Prosthesis is an artificial device that replaces a missing body part. In medicine,prosthesis is an artificial device that replaces a missing body part, which may be lost
through trauma, disease, or congenital conditions. Prosthetic amputee rehabilitation
is primarily coordinated by a prosthetist and an inter-disciplinary team of health care
professionals including psychiatrists, surgeons, physical therapists, and occupational
therapists. A person's prosthetics should be designed and assembled according to the
patient's appearance and functional needs.
For instance, a patient may need transradial prosthesis, but need to choose
between an aesthetic functional device, a myoelectric device, a body-powered device,
and an activity specific device. The patient's future goals and economical capabilitiesmay help them choose between one or more devices.
INFLUENCE OF SOCIAL NETWORKING SITES ON LIBRARY AND INFORMATION CENTERS IAEME Publication
This paper is mainly focused on the latest development in the area of library science where the
need of social networks is playing a vital role in dissemination of information to the users. Present
days everyone is connected with each other by means of various social networks like twitter, face
book, linked in, flicker etc. Social networking sites are one of the new technologies offering
academic libraries the opportunities to reach out the users of the library. This became an effective
medium to exchange knowledge and skills of the library professionals and users also
Library and Information Services are playing a vital role in digital era. Library services are
now depends upon the Information and Communication Technology. This paper is highlight the
services of libraries with new technology. It identify the various components of ICT. It also definethe functions and challenges of ICT based library services
Ancient Gurus in ancient Gurukulas used to impart knowledge to their pupils through oralteaching. The Gurus themselves were treasure troves of knowledge, without the need to refer to
hard and soft copies, and online resources. The long-driventransition from paperless back topaperless, that is, from oral instruction through palm leaves through copper plates through virtualpaper through electronic to digital Libraries is as arduous as it is fascinating.
NOMENCLATURE CHANGE FOR LIBRARY AND INFORMATION SCIENCE (LIS) SCHOOLS IN NIGE...IAEME Publication
This paper provides a synopsis of the evolutionary changes in the nomenclature of Library andInformation Science (LIS) programme in different countries and makes a case for LIS Schools in
Nigeria to adopt Information and Knowledge Management (IKM) as their new name in line with
current trends. It highlights the specific factors which make this transformation of LIS to IKM
imperative. Various institutions that changed the nomenclature of their LIS programme and thosethat prefer IKM were listed. The scope and content of an IKMprogramme were outlined. In
addition, the implications of IKM for interdisciplinary research and emerging opportunities in the
21st century were discussed. Finally, a proposal was made for a bachelor degree programme inpublishing and multimedia studies/technology, which is highly entrepreneurial in nature. The push
for other information-related disciplines was used to justify the argument for a distinct faculty forthese courses in the Nigerian tertiary education sector. This has implications for the change to IKM
as it underlines the strategic importance of thisrebrandeddiscipline in the educational systems ofthe knowledge economy.
ANALYSIS OF FREE WEBSITES SUPPORTING THE LEARNING OF SHAKESPEAREAN LITERATURE IAEME Publication
Free Websites assist learning in several ways. To what extend are they helpful is always a. In the case of the free websites supporting the learning of Shakespearean Literature, a
content analysis is made, to find out whether the usually sought attributes are available. Thewebsites under study are evaluated with regard to the syllabus assigned to top institutions in India
offering English Literature study. A librarian can make use of this tailored information to supporthis clientele of the respective genre. Also, the findings can be used to improvisethe respectivewebsites content.
GENERIC CODE CLONING METHOD FOR DETECTION OF CLONE CODE IN SOFTWARE DEVELOPMENT IAEME Publication
The major part of risk the development of software orprograms is existence ofduplicate code that can affect the software maintainability. The main aim of Clone
identification technique is to search and detect the parts of the software code which is
identical. In the passed there are various techniques that are used to identify andreflect the code identity and code fragments.Code cloning reduces the time and effort of the softwaredeveloper but it alsodecreases the quality of the software like readability, changeability and increasesmaintainability. So, code clone has to be detected to reducethe cost of maintenance tosome extent. In this paper, a new Generic technique is purposed to detect code clone
from various input source codes (from web, disk and etc.,) by segmenting the code intonumber of sub-programs or modules or functions. I propose a technique that candetect 1-type,2type, 3-type and 4-type clones efficiently.
THE PRESENT SCENARIO OF THE PUBLIC LIBRARIES IN THE THRISSUR DISTRICT OF KERALA IAEME Publication
An attempt has been made to evaluate the present status of the public libraries affiliated to theKerala state library council, in Thrissur district of Kerala in terms of grade, infrastructural
facilities, total collection of books, annual issues of books, no of periodicals and social activitiesetc. Possible suggestions are recommended for effective functioning of public libraries.
CIRCULARLY POLARIZED APERTURE COUPLED MICROSTRIP SHORT BACKFIRE ANTENNA WITH ...IAEME Publication
A circularly polarized microstrip short back fire antenna (CPMSBA) with two ringcorrugated rim using aperture coupling feed method is proposed in this paper. Theantenna is designed to operate in KU-band. The simulation results verify the circular
polarization. The axial ratio bandwidth bwAR is 3.74%, gain is 10.43 dBi andradiation efficiency is 89.7%. The antenna has a compact structure and high electricaland mechanical characteristics.
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN) IAEME Publication
A Body Area Network is a system of computing devices located in close proximityto the human body which coordinates and cooperates for the benefit of the user. Body
Area Networks have evolved out of sensor network technology and biomedicalengineering. In this paper we discuss various aspects of Body Area Networks,introduction section deals with various concepts associated with computer networks
and some supporting technologies of Wireless Body Area Networks (WBANs). Section
2 deals with the various definitions of Body Area Networks(BANs) followed by the
types of BAN in section 3 and system architecture in section 4. Section 5 gives the
draft guidelines by IEEE 802.15.6 for a communicationsstandard for BAN, the next
two sections list out the applications and current researctrends of BAN followed bythe conclusion.
Function follows form: the paradigmatic potentialities of recommender systems and the role of paradata in effective user engagement with open education
Dr. Shiv Kumar Assistant Professor Dr. Rammanohar Lohia Avadh University Ayodhya, U.P. India.
How Efficient are Information Seeking Behavior of Faculty Members of NIRF Ranked Indian Universities? : A Practical Approach
Shodh Sarita an International Bilingual Peer Reviewed Refereed Research Journal
ISBN- 2348-2397
UGC CARE LISTED JOURNAL
The value of libraries and librarians have been underestimated at several places. These slides are created to sensitize the people about the importance of libraries and to tell them about the importance of information literacy based courses in education
There are many online and in-person courses available for librarians to learn about research data management, data analysis, and visualization, but after you have taken a course, how do you go about applying what you have learned? While it is possible to just start offering classes and consultations, your service will have a better chance of becoming relevant if you consider stakeholders and review your institutional environment. This lecture will give you some ideas to get started with data services at your institution.
Competencies of Librarians as a Factor Affecting Information, Service Deliver...SubmissionResearchpa
This study investigated the competencies of librarians as a factor affecting information service delivery in Delta state university (DELSU) library and Federal university of petroleum resources (FUPRE) library. The main objective of the study was to determine the extent to which information and competencies of librarians in DELSU and FUPRE affect their information service delivery. The instrument used for data collection was the questionnaire. A descriptive survey design was used in this study. A total of 61 librarians were selected using the total enumeration sampling technique since the total population was manageable. A total of 52 copies of the questionnaire were retrieved and analyzed using simple percentage, mean score, and standard deviation. The findings of this study show that: the majority of the respondents possess high extent of the ICT skills, majority have high extent of customer-service competency, and most librarians possess high extent of competency in interpersonal communication. It was concluded that these skills, though basic are a good platform that increases the effect of relevant information service delivery in the library. A minor but regular training was said to be what will do the magic by Ogagaoghene Uzezi IDHALAMA, Afebuameh James AIYEBELEHIN and Onomiroro OKOBO 2020. Competencies of Librarians as a Factor Affecting Information, Service Delivery in Selected University Libraries in Delta State, Nigeria. International Journal on Integrated Education. 3, 10 (Oct. 2020), 92-102. DOI:https://doi.org/10.31149/ijie.v3i10.693 https://journals.researchparks.org/index.php/IJIE/article/view/693/653 https://journals.researchparks.org/index.php/IJIE/article/view/693
International Journal of Humanities and Social Science Invention (IJHSSI) is an international journal intended for professionals and researchers in all fields of Humanities and Social Science. IJHSSI publishes research articles and reviews within the whole field Humanities and Social Science, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Social Media Datasets for Analysis and Modeling Drug Usageijtsrd
This paper based on the research carried out in the area of data mining depends for managing bulk amount of data with mining in social media on using composite applications for performing more sophisticated analysis. Enhancement of social media may address this need. The objective of this paper is to introduce such type of tool which used in social network to characterised Medicine Usage. This paper outlined a structured approach to analyse social media in order to capture emerging trends in medicine abuse by applying powerful methods like Machine Learning. This paper describes how to fetch important data for analysis from social network. Then big data techniques to extract useful content for analysis are discussed. Sindhu S. B | Dr. B. N Veerappa "Social Media Datasets for Analysis and Modeling Drug Usage" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25246.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/25246/social-media-datasets-for-analysis-and-modeling-drug-usage/sindhu-s-b
METHODS1Sampling and MethodologyStudenDioneWang844
METHODS 1
Sampling and Methodology
Student's Name
Institutional Affiliation
Date
Sampling and Methodology
Discussion.
The action of obtaining, evaluating, and interpreting information for a range of social, educational, economic, and political reasons is known as social science research. The book, How to Critique Journal Articles in the Social Sciences, Harris (2014) aims at making one aware of the fact that when you engage in social science research, you should do it with your eyes (and mind) wide open and not blindly, but with a healthy degree of pessimism.
The growing popularity of Minimally Invasive Surgery (MIS) necessitates the need to educate medical specialists, which is rapidly being done through e-learning and hybrid learning techniques. Because the majority of nurses lack MIS expertise and training, a laparoscopic collaborative learning course for nurses has been developed. The major goal of such a study would be to validate the online conceptual component of such a course to assess learner satisfaction level, as well as friendliness and usefulness metrics and nurses' enthusiasm in collaborative learning (Ortega-Morán et al., 2020). Participants were given a web link that included guidance for performing the validation tests as well as access to the course registration form. A defined validation methodology was used to gather information via sociability (relational statistical data and checklist), usability (Web Analytics), and perception and satisfaction (questionnaire) assessments under quasi conditions after the nurses who were participants in the investigation completed the online module of the laparoscopic training course for nursing within a maximum of ten days without supervision.
The measurement technique majorly applied in the gathering of information is the administration of questionnaires. Experts assisted in the development of questionnaires, ensuring their validity, determining their duration, and spotting potential flaws. From these questionnaires sociability, as well as perception and satisfaction validation was performed through a 5-point Likert scale ((1 – completely disagree, 5 – completely agree) (Ortega-Morán et al., 2020). In my opinion, the measurement strategy used by the authors was great. The fact that consistent and systematic measurement procedures were applied throughout the study on all participants is a plus. The weakness posed is that the measurement should have been carried across more participants as the study's generalizability was hindered by the small participant sample size. The measurement scale needed to incorporate national or perhaps international considerations on other important measures to provide additional proof to the study. The author did however not mention other measurement choices they could have considered but I think the incorporation of random sampling in choosing participants as opposed to participants volunteering would have led to obtaining better mea ...
Similar to USER STUDY FOR EXPLORATION OF USERS NEEDS (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2. Dr. Pragya Gupta Nayak
http://www.iaeme.com/IJLIS/index.asp 68 editor@iaeme.com
know the library users, how they interact with the information system, their purpose and pattern of search,
what strategy they adopt for reaching information and their pertinent information requirements. Now-a-
days user studies play an important role to evaluate the existing information system in order to re-orient
and improve library collections, services and activities to effectively meet the information needs of the
user. In an era of continuous technological development in conjunction with information overload, user
studies enable information professionals to improve both their understanding of information use and
information delivery .Day to day contact with user can provide some of the understanding but, for a deeper
insight into the information needs, more formal studies are required. According to Shaughness (1987)2
one
of the fundamental factors for quality assessment of information services is the focus on patrons.
(Pao, 1989. P 42)3
categorizes the three groups for user studies.
• User oriented studies.
• System use oriented studies
• Utility oriented studies.
User oriented studies: Are focused on the characteristics of users. Pao suggests following points in the
study in the concentrating on users. User age, educational level, economic status, personal demography,
sociological, job and task description.
System use oriented studies: System use oriented studies drive their data from the system. The
transactions between users and the system are investigated and examined, for example the number of item
known to be having and/or loan through inter library channels, and the number of on line searches perform.
Utility Oriented Studies: Are related to information use and its impact. This study is difficult in the
sense that information use is uncountable and unobservable.
Purpose of a user study is:
• To identify the needs of users.
• To identify the resources and services user need.
• To identify the strength and weakness of library resources.
• For book selection.
• For resources collection.
User studies are a must at the time of designing a system or services. The effectiveness of a library and
information system depends on the extent to which the system characteristics correspond with the users
and, in how much the potential users are willing and able to make use of it.
A Systematic user study can also reveal some unanticipated data about the dynamic component of user.
No system has a luxury of unlimited resources and funds, User studies are required to check whether
intended goals are served by the system, if not, to alter the priorities and programmes so as to ensure
judicious allocation of limited resources. Users studies help improve public relations of a library with its
users. User studies is an area of continuous librarian education, about users than user education about
library and understanding user is a must.
The final goal of the system, which is engaged in collection and retrieval of information, is to deliver
the information according to the needs and requirements of the users. The success of providers of
information service depends on their ability with regard to catering to the specific need of information
seekers. So information needs of users should be carefully measured and assessed and that will prepare the
necessary platform for all information activities. Due to Scientific and technological revolution, the sheer
quantity of knowledge and information is growing exponentially. As a result, the libraries and information
centers are facing growing challenges to meet the diverse needs of the users.
3. User Study For Exploration of Users Needs
http://www.iaeme.com/IJLIS/index.asp 69 editor@iaeme.com
2. MODELS OF INFORMATION SEEKING BEHAVIOUR
Information seeking behaviour is the key area of user studies. Users are the principal component of
information system. Thus, it is important to examine information seeking behavior of user because this
behavior can assist librarians, designers of information system and information professionals to create a
system that is according to user strategies.
For understanding the process of information seeking, various models are useful for examining the
strategies, process, success and failures of the users while searching for information.
2.1. Alen Foster’s4
a Nonlinear Model of Information Seeking Behavior
Foster group information seeking activities into three categories: opening, orientation and
consolidation. These processes describe the interaction between the information seeker’s cognitive
approach and their internal and external context.
Opening: is a nonlinear component representing a collection of activities. All activities interact with
each other further opening activities and other core processes. Two activities, breadth exploration and
eclecticism, involve combination of other activities to form a larger process. Breadth exploration is a
conscious expansion of searching to allow exploration of every possibility. Following activities are Choice
of keywords, selection of sources and the initiation of combination of other core processes. Eclecticism
includes accepting, gathering and storing information from a diverse range of both passive and active
sources building.
Orientation: performs many of the basic problem solving aspects. It focuses on identification and the
direction we should look at. The activities and strategies found in the opening process feed results into the
orientation process.
Consolidation: It is the process of judgment whether acquired material is sufficient to satisfy the
information need. In this step search will be refined by deciding the boundaries for search. Outcomes
depend on sources and awareness of information needs. If information or outcomes are not available then
the loop will go back to the characteristics of information need.
Information seeking is context dependent process in which the information seeker works. Many
external and internal factors influence this process. There are categories of context which are given as
follows: External context includes social and organizational, time, the project, cognitive approach, etc
.Internal influence i.e. level of experience, prior knowledge, self-precision, and self-efficiency .Cognitive
approach means mode of thinking and willingness to identify the use of information.
2.2. Barbara Nicdzwiedzka (2003)5
, General Model of Information Behavior
Barbara designed a new model of information behavior on the basis of Wilson’s 1996 model of
information behavior. The proposed new model consists of main concepts of Wilson’s model such as
4. Dr. Pragya Gupta Nayak
http://www.iaeme.com/IJLIS/index.asp 70 editor@iaeme.com
person-in-context, three categories intervening variables (individual, social and environmental).According
to this model, a user perceives a need and then takes decision to seek information. He either seeks himself
independently or by intermediaries. This seeking process is done in information center, libraries etc. or in
computerized search system or own knowledge and reference collection. This entire process includes
intervening variables i.e. personal, role related, environmental. Wilson in his model described that these
variables influence as activating mechanism context. Thus, variables are influenced at all stages of the
process.
The model shows two basic strategies of information seeking.
• User seeks information personally
• Intermediaries seek information on behalf of user
2.3. Ellis’ Models of Information Seeking Behavior
Ellis (1989)5
, Ellis etal (1993)6
and Ellis and Hugan (1997)7
proposed a general model of information
seeking behavior after studying the information seeking pattern of different user groups for example; social
scientists, research physicists, chemists and engineers. Ellis’ model illustrates six types of information
seeking activities. These are Starting, Chaining, Browsing, Differentiating, Monitoring and Extracting.
They have explained these activities in the following terms.
Starting: “The means employed by the user begin information seeking, for example, asking a
knowledgeable colleague”. It means all activities which are related to initial search for example,
identification of sources from which seeker get information might serve as primary source because they
refer to additional sources related to the topic.
Chaining: It is characterized by following different forms of referential connections between the
sources to identify new sources of information Footnotes and bibliographic citations cited in an article or
book referred to sources relevant to the topic make a chain. This chain can be backward or forward. Chain
enhances the search process.
Browsing: “Semi directed or semi structured searching”. Browsing means “to look casually”. It is the
activity by which seeker looks through table of contents, list of titles, keywords, proper nouns e.g. person,
organization’s name, abstract, summaries and conclusion. Shelf reading is also browsing. These activities
are basically unstructured and adhoc.
Differentiating: It is characterized by the activities undertaken when the information sources are ranked
according to their relative importance based on the respondent’s own perceptions. Informal channels are
given preference over formal channels. Participation in discussion and conversations is considered to be
more effective than reading literature. Filtering: - It is the process carried out by the use of certain criteria
or a mechanism while searching the information to make it as relevant and precise as possible. After some
browsing, the user filters and selects the sources that are according to his need or are recommended by
anyone or reviews. Computerised literature searches are considered the main means of filtering which
minimize the risk of failing to obtain the important information and problem of lack of time
Monitoring: “Keeping up to date or current awareness searching”. It is the activity in which users keep
themselves aware about the current and latest knowledge of their interest.
Extracting: “Selectively identifying relevant material in an information source”. In this activity, the
seeker searches a particular source or resources to identify-
the material of his interest. This particular
source would be secondary type of source which can be located at the specific source e.g. bibliography,
indexes and online databases.
Verifying: “Checking the accuracy of information” which is sought.
Ending: i.e. “the tying up of loose ends through a final search”. This activity is carried out to actually
finish the information seeking process. This is performed at the end of final stage. When the researchers
5. User Study For Exploration of Users Needs
http://www.iaeme.com/IJLIS/index.asp 71 editor@iaeme.com
are knowledgeable about the subject field and the conclusions are drawn they may need to carry out small
scale searches targeted towards the particular unsolved question to complete the project.
2.4. Wilson’s General Model of Information Behavior (1996)8
This model is designed on the basic framework of the 1981 model. The person in context remains the
focus of information needs. In this model barriers are identified as intervening variables, whose impact
may be “supportive” or “preventive” information seeking behavior would be active or passive. Behavior
theories are involved in stimulating information seeking behavior which explains the factors that motivate
information seeking behavior.
Stress coping theory explains that when the information needs of individuals engaged in seeking
activities are high, their work is affected due to lack of knowledge. This situation creates stress. High level
of stress develops high level of motivation to cope the stress and the individual engages in seeking
activities. The risk/reward theory explains why in some situations people seek information and in some
they do not and why certain information sources are more frequently used then others.
2.5. Leckie etal’s Model of Information Seeking of Professionals (1996)9
6. Dr. Pragya Gupta Nayak
http://www.iaeme.com/IJLIS/index.asp 72 editor@iaeme.com
Leckie etal’s model is based on the assumptions that a man associated with any profession has to play a
particular role in his profession. For performing his role he has to accomplish particular tasks. These tasks
require information.
Thus, information need arises at this stage. In response to the needs, he shows seeking behavior. This
behavior is affected by factors such as sources available, intended use of sources, individual characteristics
of the user, and environment surrounding the user (Devadson and Lingam 1997)10
Leckie et.al specifies the
factors which directly have an impact on his appearances and awareness of information sources which
include accessibility, quality, timeliness, trustworthiness, familiarity and previous success. This model is
compatible for the researcher’s study because it is based on work role and tasks which arises information
needs.
2.6. Kuhithau(1992)11
Model of Information Seeking
Kuhlthau developed a model for high secondary student’s information seeking behavior to accomplish a
research assignment. His model illustrates information seeking process in different stages:
Initiation: In the first step the user recognizes the need due to lack of knowledge or understanding.
General information is related to the general understanding rather than specific information.
Formulation: Information gathered in exploration stage and thoughts become clearer and focused
perspective on the topic is developed on the basis of information found. At this stage understanding of the
topic grows and thus, the information search can be more focused.
Collection: Interaction between user and information system i.e. library, experts, librarian, friends
occur. In this step user have clear sense of direction. A person can specify his needs based on
understanding developed in exploration step. He is more confident in this stage.
Search Closure or presentation: When the problem is resolved or assignment is prepared the search is
completed and closed.
In Kuhlthau’s model student’s knowledge grows gradually due to interaction with information and
information system. Cognitive process is involved in information seeking. User gradually enhances
learning. His cognitive level increases step by step. Kuhlthau’s model focuses on the search process rather
than use, synthesize, evaluation and assimilation of information.
2.7. Dervin’s (1983)12
Sense-Making Approach
Sense-making can be defined as behaviour, both internal (i.e. cognitive) and external (i.e. procedural),
which allows the individual to construct and design his or her movement through time-space. It refers to
the ways in which individuals perceive and bridge cognitive gaps . As such the Sense-making approach
can be used to acquire an understanding of information, communication, and meaningful relationships in
these forms of behaviour (Tidline 2005:113)13
. By using the Sense-making approach to study users’
information behaviour, researchers are able to discover people’s strategies, expectations, attitudes, and
anxieties within their lives and work situations (Solomon 1997a:1098)14
.
To bridge this gap, individuals seek information to make new sense and use this information to help
them continue on their journey. The outcome represents the use of information to complete a task. From a
cognitive point of view, the Sense-making approach is an essential step forward in a study of information
needs and information-seeking. The approach draws attention to individual sense-making (problem
7. User Study For Exploration of Users Needs
http://www.iaeme.com/IJLIS/index.asp 73 editor@iaeme.com
solving) in varying situations, and focuses on the information seeker and process viewpoints rather than on
information systems or traditional viewpoints (Ingwersen & Jarvelin 2005:6215
; Tidline 2005:11416
).
2.8. Wilson’s Model of Information behavior (1981)17
The model characterizes information seeking behavior as a user perceives a need. To satisfy this need,
he makes demands from formal or informal information system services or sources. His demands may be
fulfilled or not which result in success or failure to find relevant information. In case of success the uses
the information but if he fails to satisfy the need, he will have to start searching again.In this model other
people may be involved through information exchange. In seeking process if a user finds information,
which is useful to any other person, he passes it to them
Common elements or factors reflected in all the models are that information usage is a process
involving multiple phases. There phases include the identification of Information need, the decision to use
information, selecting and acquiring information sources, finding and gathering, interpreting and
processing the information, and putting the information to use. The outcome of the information seeking
process is the utilisation of the required information to complete the task (i.e. the satisfaction of the
original need).
Ellis (1989)18
model and Kuthlthau's (1993)19
information process models characterise the information
seeking patterns of information users. Dervin's (1983)20
sense making approach's focuses on the need for
information experienced by users within the context of their personal situations.
Models have some other features, which distinguish them. While Foster, Wilson, Barbara and Kuhlthau
focus on the personal context and personal cognition of information need, their explanation of information
seeking behavior might be understood with the terminology they have used to emphasise their concept.
Foster talks of collection of certain activities which interact with each other and this combination provide
the basic drive for other required steps of his model like ‘judgment’ and ‘consolidation’. Wilson and
Barbara explain the process in a much-simplified manner. Wilson highlights the context of information
need, which is activated by a strong feeling to do something. Thus, the individual develops a deep feeling
of the need that in turn motivates him to satisfy that need under a mixed effect of psychological,
demographic, role oriented, environmental elements and source characteristics and according the
expectation of reward etc. 'the seeker is activated to seek information. Although this model is quite
comprehensive, yet Barbara believes that ‘intermediaries, who work on behalf of the user, also play some
role. Leckie’s model focuses on the work role which certainly shapes up the nature of required tasks. This
partly linear and partly circular model emphasizes the role of ‘feedback’ which in turn affects information
seeking. Kuhlthau’s six stage model describes the beginning (initiation) of the specific subject which is to
be explored. This step precedes and shapeup the kind of information required.
8. Dr. Pragya Gupta Nayak
http://www.iaeme.com/IJLIS/index.asp 74 editor@iaeme.com
3. INFORMATION NEEDS
Information needs are not “Internal mental states”. This is a mistaken understanding related to the
subjectivity of a cognitive view and the concept of ASK (“Anomalous state of knowledge”).the concept of
information needs is similar to the need for love and the physiological need for food and water.
Information seeking thus is dependent upon the problem situation from which the need for information
arises”. In this view, information need is a situation or task which depends on many factors and changes as
the seeker goes form on stage of task to the next. Thus, it seems that there is a need to understand the
user’s requirement because the root of any information seeking is believed to be the concept of information
needs, like; needs for new information; need to expand or clarify the information obtained; and need to
confirm or validate the information known (Allen, 1996, P.103)22
Voigt23
recognizes types of users
Information needs or approaches
Current approach: User keeps himself abreast with the latest development in his own field of
information.
Everyday approach: is to meet user’s frequent information need during his research work. Exhaustive
approach, this type of information need user wants to know almost all the relevant literature on a particular
field.
Catching up approach: A user seeks brief but full information on this recent development in a related
field to have a quick and broad view of the subject.
Psychologists have divided need into three categories:
• Physiological need, such as of food, water, shelter etc.
• Affective needs, such as the need for attainment for domination, etc.
• Cognitive needs, such as the need to plan, to learn a skill.
Choudhary, (1999, P.181)24
Characterizes information need as-
• It is a relative concept. It depends on several factors and does not remain constant.
• Information needs vary from over a period of time.
• Information needs vary from person to person; from job to job, subject to subject, organization to
organization and so on.
• People’s information needs are largely dependent on the environment for ex, information needs of those in
an academic environment from those in an industrial, business or government/administrative environment.
• Information need often either remains unexpressed or is poorly expressed.
• Information often changes on receipt of some information.
All these categories are interrelated. One type of need may trigger another and as a part of search for
satisfaction of needs an individual may seek information, Rohde (1986)25
3.1. Factors of Information Need & Use
• Information needs are subjective as well as objective with inter relationship between the two.
• Needs differ from: individual to individual, group to group, institution to institution, society to society,
environment to environment and from time to time.
The main factors for such variations are caused because the group or the individual has to perform
various work roles and functions in different environment. In addition to this, personal characteristics,
aptitude, knowledge structure also influences individual behavior of information seeking. The range of
information services available, service aptitude of the library staff, availability of information resources,
physical facilities and environment within the library or information center and user own orientation also
make difference. The social, political, economic and cultural environment within the work role is
9. User Study For Exploration of Users Needs
http://www.iaeme.com/IJLIS/index.asp 75 editor@iaeme.com
performed by users also affect information needs of users. Paisley (1981)26
observed the following
dependant factors:-
• The full array of information sources those are available to users.
• The different uses to which the information will be put.
• Individual characteristics of users, for example, Motivation professional orientation etc.
• The social, cultural, political and economic factors that may affect the work of the user and his/her
information needs, information seeking behavior and use patterns.
• The consequence and impact of information use, for example increase in work productivity.
Persistent person is strong willed to search information. He tries again and again and in case of failure
he applies new strategies. Some people search comprehensively on a topic. Their search is exhaustive in
nature. Some people keep all their information systematically in files and use it in time of need. A
motivated person has strong desire to search. So many factors create motivation, job; he/she would do
better work (competition with other employ); job perfection promotion or financial matters, several other
factors also contribute in creating motivation. Moreover, people do not get time in their busy schedule to
meet their information needs. They need concise, precise and ready mode information urgently. Access to
information, sources and systems is very important.
Information need is a relative concept. Different authors describe different factors but almost all of
them agree on these factors: Work activity/ job or subject field, motivation, willingness to search and use
information, personal characteristics, availability of information sources.
3.2. Identification of Information Need
Hale (1986)27
summarized the purpose of identifying information needs for:
• Optimizing the allocation of operating resources by customizing services to selected clientele.
• Fine tuning the delivery of information within existing system.
Although, the identification of information need is a complex process, it is a crucial job, because it
depends on different variables such as subject interest of user, nature of his work, motivation etc .Tom
Wilson presented a paper in Association of Caribbean University, research and Institutional libraries, XXV
conference, 1997, on the topic of “Information Seeking
Behavior: designing information system to meet our clients’ needs”. According to (Wilson.)28
Information recognized if we understand,
• The nature of organization.
• Organizational information need.
• Work in the organization.
• Personal Information needs.
Every individual performs different types of activities in the organizations to fulfill his responsibilities.
To understand the work in the organizations their activities must be observed. Interaction with people is
the best method to comprehend the work in the organization. (Wilson)29
“Talking to people about their
problems, observe flow of information, find out how information sources are used, what are the methods
by which information manager keeps himself. Every person has working responsibilities, their working
activities constitute some needs and these needs are related to fill a knowledge gap, to resolve any
problem.”
10. Dr. Pragya Gupta Nayak
http://www.iaeme.com/IJLIS/index.asp 76 editor@iaeme.com
4. INFORMATION SEEKING BEHAVIORS
In order to satisfy the information need, the user actively undergoes the information seeking processes. It is
the “Complex pattern of action and interactions which people engage in when seeking information of
whatever kind and for whatever purpose”. (Ellis 1997, P.216)30
The following process takes place in the information seeking behavior.
• Identifying objective’
• Defining need.
• Accessing information system
• Establishing sources of information
• Information acquisition
• Use of Information
• Satisfaction/ dissatisfaction
(Solomon, 1997).31
Kuhlthav (1993)32
describes information seeking as a cognitive and emotional
process of constructing a personal understanding of a topic. Personality traits play an important role in the
learning process. Seeking process and seeking strategies reflect personality characteristics.
CONCLUSION
Summarizing the compiled ideas and thoughts presented by various experts, one can say that information
seeking behavior is a multidimensional process and its dimensions are mental, linguistic, cognitive, social
and psychological.
The process starts when a person perceives a need in his mind and for satisfaction of need he interacts
with library, information centers, internet or a person. An interaction causes social relationship in turn.
Thinking, perception, memory and learning are involved in cognitive process. Language is used to convey
the message which appears in the mind. It is a learning process in which thinking, dealing and acting is
involved.
Information seeking behavior undertakes under certain circumstances, e.g. time, background,
conditions, etc. so it is considered to be a context based process. One of its important dimensions is
psychological in nature. An individual’s type of personality has a great impact on his seeking process.
Accessibility and reliability of an information source or channel is also quite important in this process.
Ever increasing number of sources and channels of information are not easily accessible by users. Users
often do not have knowledge regarding how to make best use of many sources of information. Consequent
user’s demands for various types of information are increasing continuously. There is an urgent need to
assess and analyze the real and current information needs of users.
In this regard the development of powerful information system/centers, strong collection and
development of library, designing of services and planning is quite important. The effectiveness of an
information system/Center or any other channel depends on user’s satisfaction. User’s information need
study is the only way to measure the effectiveness of any information system. This area of the subject
requires continuous research to cope with the demands of the changing information environment.
REFERENCES
[1] Kawatra, P. S. (1992). Library user studies: a manual for librarians and information scientists. Bombay.
Jaico Publishing.p-2.
[2] Shaughnees, T.W. (1987) The search for quality. Journal of library administration, 8(5).p10
11. User Study For Exploration of Users Needs
http://www.iaeme.com/IJLIS/index.asp 77 editor@iaeme.com
[3] Pao, L. M. (1989). Concepts of information retrieval. Englewood: Libraries unlimited.p42. Retrieved20
April 2015 from.http://wff1.ff.unilj.si/oddelki/biblio/studij/podiplomski/stari/predmeti.html.
[4] Allen, Foster .(2004) A nonlinear model of information-seeking behavior. .
Journal of the American
Society for Information Science and Technology.55, (3), p 228–237. Retrieved 20 May 2015 from
http://onlinelibrary.wiley.com/doi/10.1002/asi.10359/abstract.
[5] Ellis, D. A. (1989). A behavioral approach to information retrieval design. Journal of documentation, 45,
171-212.
[6] Ellis, D., Cox, D. and Hall, K. (1993). A comparison of the Information seeking patterns of researchers
in the physical and social sciences. Journal of documentation. 49, p356-369.
[7] Ellis, D. and M. Haugan. (1997) Modeling the information seeking patterns of engineers and research
scientists in an industrial environment. Journal of Documentation. 53(4), p. 384-403.
[8] Wilson, T.D.(1997) Information behaviour: an interdisciplinary perspective . Information Processing
and Management, 1997. 33(4). p. 551-572.
[9] Leckie, G. J., Pettigrew, K. E, and Sylvain, C. (1996). Modeling the information seeking of
professionals: a general model derived from research on engineers, health care professionals and
lawyers. Library Quarterly, 66(2), 161-193.
[10] Devadason, F. J. and Lingam, P. P. (1997). A methodology for the identification of information needs of
users /I FLA Journal, 23( 1), 41-51.
[11] Kuhlthau, C. C. (1991). Inside the search process: Information seeking from the user’s perspective.
Journal of American society for information science, 42,361 -371.
[12] Dervin,B.(1983).An overview of Sense-making research: concepts, methods, and results to date. Paper
presented at the annual meeting of the International Communication Association, Dallas, Texas.
Available: http://communication.sbs.ohio-state.edu/sense-making/ (Accessed: 27 March 2012).
[13] Tidline,T. (2005). User needs. In. Allen Kent (E. d.).Encyclopedia of library and information science.
(Vol. 59. Supplement 35). New York. Marcel Dekker,p.113.
[14] Solomon, P. (1997). Discovering information behavior in sense making: III the person, Journal of
American Society for information Science. 48(12) p.1098.
[15] Ingwersen, P., Järvelin, K. (2005). The Turn: Integration of Information Seeking and retrieval in
Context. Springer, 2005,p 448 .
[16] Op.Cit. Tidline,T. ,p.114.
[17] Wilson, T. D. (1981).On user studies and Information needs. Journal of documentation, 37(1), 3-15.
[18] Op.Cit. Ellis, D. ,p-217.
[19] Kuhlthau, C. C. (1993). Seeking meaning: a process approach to library and information services.
Norwood, NJ: Ablex.
[20] Op.Cit. Dervin , B.,p-65.
[21] Allen, B.L., (1996), information mech. information tark; toward a user (enclosed approach information
system; C.A. Academic press, p. 103.
[22] Voigt ,Mchinj (1987). Scientists approaches to information, 1961. ALA. N.Y. (ACRL monograph No.
24). cited by Prasher (1987) Wilson (1980).
[23] Choudhary, G. G. (1999). Introduction to modern Information retrieved London: Library
Association.p.181.
[24] Rohde, Nancy Freeman (1986). Information needs. Advances in librarianship V14, 53.
[25] Paisley, W. J. (1968). Information needs and uses. In. Annual review of information science and
technology. 1-30.
12. Dr. Pragya Gupta Nayak
http://www.iaeme.com/IJLIS/index.asp 78 editor@iaeme.com
[26] Hale, Martha L. (1986).Administrator and information: a review of methodologies used for diagnosing
information use. Advance in Librerianship.14, 75.
[27] Wilson, T. D. (1997). Information seeking behavior: designing information system, to meet our clients’
needs, (n.d.) Retrieved. Apr, 2013, from huo://Panizzi.Shef.ac.Uk/tom/tom-Puhs/acuri/.htm.
[28] Wilson, T. D. (1981). On user studies and information needs. Journal of documentation. 37(1), 3-15.
[29] Wilson, T. D. (1996). Information behaviour: an interdisciplinary perspective. Wilson, T. D.
Models in information behaviour research. JoD. 55 [1999], 3, Retrieved 20 April 2006 from
http://informationr.net/tdw/publ/papers/1999JDoc.html
[30] Op .Cit. Ellis, p-216.
[31] Solomon, P. (1997). Discovering information behavior in sense making: III the person, Journal of
American Society for information Science. 48(12). 127-1138.
[32] Kuhltau,C. C. (1993). Seeking meaning: a process approach to library and information services.
Norwood, NJ: Ablex, 1993, p199.
[33] ANIE N C. Utilization of E-Journals by the Research Scholars of Sree Sankaracharya University,
Kalady: A Case Study. International Journal of Library & Information Science, 2 (2), 2013, pp. 13-25.
[34] Dr. E. S. Kavitha. Information Needs and Use Pattern of Resources by the Research Scholars of Periyar
University, Salem. International Journal of Library & Information Science, 4 (3), 2015, pp. 77-84.