نتایج جستجو برای: preservation

تعداد نتایج: 73639  

Journal: :Animal Sentience 2020

2017
Elizabeth J. N. Miller Lisa M. Cookingham Teresa K. Woodruff Ginny L. Ryan Karen M. Summers Laxmi A. Kondapalli Divya K. Shah

BACKGROUND Despite a large body of data suggesting that delivery of fertility care to cancer patients is inconsistent and frequently insufficient, there is a paucity of literature examining training in fertility preservation for those physicians expected to discuss options or execute therapy. The study objective was to compare fertility preservation training between Reproductive Endocrinology &...

2008
José Carlos Ramalho Luís Corujo Francisco Barbedo Rui Castro Luis Faria Miguel Ferreira

In 2006 the Portuguese National Archives (DirectorateGeneral of the Portuguese Archives) engaged in the development of an OAIS compatible digital repository system for long-term preservation of digital material. Simultaneously, at the University of Minho a project called CRiB was being devised which aimed at the development of a wholesome set of services to aid digital preservation. Among those...

2001
Maria Luisa Calanag Shigeo Sugimoto Koichi Tabata

Selection and metadata issues which surround the preservation of digital information are discussed, in particular, the assignment of “collection levels” to Web materials to ensure preservation, and some Preservation Metadata Element Sets (PMES) which have been identified as informed by the Open Archival Information System (OAIS) Reference Model. A metadata framework that can support a broad ran...

2013
Zhenxin Wu

This paper briefly introduces the context and major functions of Digital Preservation Center of National Science Library, Chinese Academy of Sciences (NSLC), and describes its digital preservation system, as well as its preservation services and future work.

2011
Peter Langfelder Rui Luo Michael C. Oldham Steve Horvath

In many applications, one is interested in determining which of the properties of a network module change across conditions. For example, to validate the existence of a module, it is desirable to show that it is reproducible (or preserved) in an independent test network. Here we study several types of network preservation statistics that do not require a module assignment in the test network. W...

2012
Gonçalo Antunes Christoph Becker José Luis Borbinha Diogo Proença José Barateiro Ricardo Vieira

Digital preservation is increasingly recognized as a need by organizations from diverse areas that have to manage information over time and make use of information systems for supporting the business. Methods for assessment of digital preservation compliance inside an organization have been introduced, such as the Trustworthy Repositories Audit & Certification: Criteria and Checklist. However, ...

2010
Matt Schultz Emily B. Gore

Distributed digital preservation is a maturing and appealing solution to the pressing problem of ensuring the survivability of digital content. Like all other digital preservation efforts, distributed digital preservation solutions must communicate trust to their Designated Communities as they continue to mature. The following paper discusses the importance of establishing this trust, retraces ...

2014
Chunqiu Li Shigeo Sugimoto

Provenance description is necessary for long-term preservation of digital resources. Open Archival Information System (OAIS) and Preservation Metadata: Implementation Strategies (PREMIS), which are well-known standards designed for digital preservation, define descriptive elements for digital preservation. Metadata has to be preserved as well as primary resource in order to keep the primary res...

Journal: :JSW 2012
Yun Pan Xiao-ling Zhu Ting-gui Chen

The disclosure of sensitive information has become prominent nowadays; privacy preservation has become a research hotspot in the field of data security. Among all the algorithms of privacy preservation in data mining, K-anonymity is a kind of common and valid algorithm in privacy preservation, which can effectively prevent the loss of sensitive information under linking attacks, and it is widel...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید