Improving Digital Library Interfaces by Investigating the Electronic Activities of Users

Author(s):  
M. Asim Qayyum

The purpose of this study was to examine the navigational patterns and text markings of electronic text readers when they interacted with electronic documents during an active reading process. The readings took place in two settings, private and document sharing, and the results provided us with user-navigational patterns taxonomy.Le but de cette étude était d’examiner les modèles de navigation et de marquage de textes électroniques des lecteurs lorsqu’ils interagissent avec les documents numériques pendant un processus de lecture active. Les séances de lecture ont eu lieu dans deux environnements, à l’aide de documents privés et partagés, et les résultats ont offert une taxinomie sur les modèles de navigation des utilisateurs. 

Author(s):  
Anna Zhuikova

Taking into consideration the legal nature of evidence, we analyze the main procedural features of evidence widely used by persons participating in the case when resolving civil cases related to the protection of intellectual rights, such as screenshots of materials posted on Internet sites, electronic messages. We define the general features that characterize the indicated sources of evidence in this category of disputes. We point out, in particular, the objective influence of the procedural rules governing the rules of jurisdiction over intellectual disputes, as well as the substantive rules of Part 4 of the Civil Code of the Russian Federation, on the features of the development and provide evidence for the protection of intellectual rights in court, sources of evidence. We describe the relationship between the concepts of electronic documents, written evidence, and evidence generated through the use of the Internet. When applying general scientific methods of comparative analysis (in relation to certain sources of evidence) and deduction (in relation to the analysis of special norms through the prism of general, basic, main procedural institutions that regulate relations in terms of the legal nature and characteristics of the evidence presentation in the category of cases under consideration), we form the main conclusions in terms of possible options for the development of these procedural institutions. We prove the necessity of the proposed changes for the purpose of the subsequent optimal functioning, action and application of the norms governing the evidence process in this category of cases, the concept of “electronic text evidence” is introduced.


2011 ◽  
pp. 1551-1568
Author(s):  
Anders Broberg

Traditionally, much of the efforts to develop computer-based tools has been concentrated on developing production or authoring tools, such as word processors, drawing programs, and so on, and not so many consumption or reading tools have been developed except Web browsers and different kinds of media players. Authoring plays an important role in the learning process, and good tools are needed, but reading—especially active reading—and exploring are is at least as important. Traditionally, computer-mediated texts have little support for an active way of reading. This means that reading computer-mediated texts, as on the WWW, tends to be a very passive form of reading. The development of Text-Col addresses this problem. Text-Col is a tool designed to support readers in deep processing of texts by letting the readers change appearance of the text based on different strategies for categorizing words. Text-Col is a reading tool and exploring tool aimed to make the reading process more active.


Author(s):  
Anders Broberg

Traditionally, much of the efforts to develop computer-based tools has been concentrated on developing production or authoring tools, such as word processors, drawing programs, and so on, and not so many consumption or reading tools have been developed except Web browsers and different kinds of media players. Authoring plays an important role in the learning process, and good tools are needed, but reading—especially active reading—and exploring are is at least as important. Traditionally, computer-mediated texts have little support for an active way of reading. This means that reading computer-mediated texts, as on the WWW, tends to be a very passive form of reading. The development of Text-Col addresses this problem. Text-Col is a tool designed to support readers in deep processing of texts by letting the readers change appearance of the text based on different strategies for categorizing words. Text-Col is a reading tool and exploring tool aimed to make the reading process more active.


2011 ◽  
pp. 145-158
Author(s):  
Stanley Loh ◽  
Daniel Lichtnow ◽  
Thyago Borges ◽  
Gustavo Piltcher

This chapter investigates different aspects in the construction of a domain ontology to a content-based recommender system. The recommender systems suggests textual electronic documents from a Digital Library, based on documents read by the users and based on textual messages posted in electronic discussions through a web chat. The domain ontology is used to represent the user’s interest and the content of the documents. In this context, the ontology is composed by a hierarchy of concepts and keywords. Each concept has a vector of keywords with weights associated. Keywords are used to identify the content of the texts (documents and messages), through the application of text mining techniques. The chapter discusses different approaches for constructing the domain ontology, including the use of text mining software tools for supervised learning, the interference of domain experts in the engineering process and the use of a normalization step.


2021 ◽  
Vol 33 (4) ◽  
pp. 131-146
Author(s):  
Alexander Vasilievich Kozachok ◽  
Sergey Alexandrovich Kopylov ◽  
Pavel Nikolaevich Gorbachev ◽  
Artur Evgenevich Gaynov ◽  
Boris Vladimirovich Kondrat’ev

The article presents an electronic text documents marking algorithm based on the identification information embedding by changing the values of the intervals between words (interwords distance shifting). The algorithm development is aimed at increasing the documents containing text information security from leakage through the channel due to the transfer of documents printed on paper, as well as the corresponding electronic copies of paper documents. In the marking algorithm developing process, an existing tools analysis of protecting paper documents from leakage was carried out, practical solutions in the field of protecting text documents were considered, their advantages and disadvantages were determined. The interwods distance shifting algorithm acts as an approach to the information embedding in electronic documents. Changing the values of interwords distance is based on embedding the normalized space in the selected areas of text lines and adjusting the remaining values of the spacing between words by the calculated values. To invariance ensure of the embedded marker for printing and subsequent scanning or photographing, formation algorithms of embedding regions and embedding matrix have been developed. In the embedding regions forming process from the text lines of the source document, arrays of spaces are formed, consisting of pairs: four and two spaces or two spaces. By means of the embedded information in the formed areas, the places where the normalized space is inserted is determined. In the embedding a marker process, an embedding matrix is formed, containing the values of the word displacement, and it is embedded in the original document in the process of printing. The developed marking algorithm usage makes it possible to introduce a marker into the electronic document text structure that is invariant to the format transformation of an electronic document into a paper one and vice versa. In addition, the developed marking algorithm features and limitations are presented. Directions for further research identified.


Author(s):  
E. A. Blinova ◽  
A. A. Sushchenia

The description of the method and algorithm for embedding a hidden message or a digital watermark into files of Microsoft Word electronic documents in .DOCX format based on two steganographic methods is given. A Microsoft Word electronic document in .DOCX format is used as a steganographic container. One of the methods uses the features of displaying a document by a word processor and the word processor allows the displacement of hidden characters, such as spaces, tabs and paragraphs, in the text relatively to the line of text. The second method uses the feature of the .DOCX format electronic text document that a document is an archive containing Open XML format files and media files, so specialized steganographic methods for XML files can be used for embedding a hidden message. In this case the quotes replacement method is used. The embedding of a hidden message by one of the methods is used for checking the integrity of the other message through the second method. Depending on the capacity of the steganographic container a method can be chosen to embed the message anda method to control the integrity of the message. The algorithm of the inverse steganographic transformation for extracting a message and confirming the integrity of an electronic document is considered. The application is developed to perform the embedding of a hidden message in an electronic text document depending on the capacity of the container. The possibility of using of some steganographic methods is analyzed with the aim of forming a multi-key steganographic system intended for a digital watermarking of an electronic document Microsoft Word format .DOCX.


Author(s):  
Cathy Spierenburg

In 2010, the My Book Buddy foundation started the first children’s library at a primary school in the slums of Nairobi in Kenya. Not a children’s library in the traditional sense of the word, but an evidence based concept which is already embraced by 18 countries, and which has allowed 22,500 children to participate in active reading. This paper gives an insight into the various aspects of the concept, the success factors in the different developing countries, and the necessity to realize more My Book Buddy children’s libraries in co-operation with expert librarians who have knowledge of knowledge of children’s literature and insight into the reading process of children. A window to the world has been opened for children who are usually deprived of books because they are too expensive or out of reach for them, not only figuratively speaking, but also in the literal meaning of the word.


Sign in / Sign up

Export Citation Format

Share Document