Guest Editorial: Information Literacy
نویسندگان
چکیده
منابع مشابه
Guest Editorial: Impact of Integrated Intelligent Information and Analytical Systems on Society
The Special Issue of the Journal of Information Technology Management (JITM) is publishing very selective papers on information management, technology in higher education, integrated systems, enterprise management, cultural thoughts, strategic contributions, management information systems, and cloud computing. We received numerous papers for this special issue but after an extensive pe...
متن کاملGuest editorial: bio-inspired information hiding
Welcome to this Special Issue on Bio-Inspired Information Hiding. Research in information hiding started in the early 1990s. With the widespread use of Internet and wireless networks, and the blooming growth in consumer electronic devices and advances inmultimedia compression techniques, multimedia streams are easily acquired nowadays. Hence, how to achieve copyright protection of the above-men...
متن کاملGuest Editorial Special Issue on Information Security
⎯Recently, an edge adaptive image steganographic method based on least significant bit (LSB) matching revisited (EA-LSBMR) has been proposed, which holds good visual quality and proper security under appropriate embedding rates. However, from the extensive experiments to EA-LSBMR, we find that the discrete Fourier transform (DFT) spectrum of pixelpairs differences histogram still reveals the pr...
متن کاملGuest Editorial - Information Theory, IEEE Transactions on
I Theory is one of the few scientific disciplines fortunate enough to have a precise date of birth. This special commemorative issue of the IEEE TRANSACTIONS ON INFORMATION THEORY celebrates the 50th anniversary of Claude E. Shannon’s “A Mathematical Theory of Communication,” published in July and October 1948. With communication engineering at the epicenter of the bombshell, the sensational af...
متن کاملGuest editorial: Special issue on data mining for information security
Computer and communication systems are subject to repeated security attacks. Given the variety of new vulnerabilities discovered every day, the introduction of new attack schemes, and the ever-expanding use of the Internet, it is not surprising that the field of computer and network security has grown and evolved significantly in recent years. Attacks are so pervasive nowadays that many firms, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: College & Research Libraries
سال: 1991
ISSN: 2150-6701,0010-0870
DOI: 10.5860/crl_52_04_313