21,728 research outputs found

    Open source in libraries: Implementation of an open source ILMS at Asia e-University library

    Get PDF
    Open source systems for libraries have improved significantly to gain the confidence of librarians. The main focus of the paper is to describe the selection process and criteria that led to the implementation of Koha the first open source Integrated Library Management System at the AeU Library. A study was made based on the set criteria used to compare and contrast with the more popular propriety library management systems. The paper presents the findings of the study which led to the selection of Koha, and a brief introduction to features of open source systems for libraries. The reasoning and conditions for accepting Koha are discussed. A brief account of the implementation process and related experience of the open source ILMS are given. AeU library implemented the various modules of the system: cataloging, online public access (OPAC), circulation, patron management and acquisitions. The expanding influence and acceptance of OSS in libraries is here to stay. Malaysian libraries may need to look into the credible options and benefits of utilizing open source systems and harness this development in ILS

    Evading Classifiers by Morphing in the Dark

    Full text link
    Learning-based systems have been shown to be vulnerable to evasion through adversarial data manipulation. These attacks have been studied under assumptions that the adversary has certain knowledge of either the target model internals, its training dataset or at least classification scores it assigns to input samples. In this paper, we investigate a much more constrained and realistic attack scenario wherein the target classifier is minimally exposed to the adversary, revealing on its final classification decision (e.g., reject or accept an input sample). Moreover, the adversary can only manipulate malicious samples using a blackbox morpher. That is, the adversary has to evade the target classifier by morphing malicious samples "in the dark". We present a scoring mechanism that can assign a real-value score which reflects evasion progress to each sample based on the limited information available. Leveraging on such scoring mechanism, we propose an evasion method -- EvadeHC -- and evaluate it against two PDF malware detectors, namely PDFRate and Hidost. The experimental evaluation demonstrates that the proposed evasion attacks are effective, attaining 100%100\% evasion rate on the evaluation dataset. Interestingly, EvadeHC outperforms the known classifier evasion technique that operates based on classification scores output by the classifiers. Although our evaluations are conducted on PDF malware classifier, the proposed approaches are domain-agnostic and is of wider application to other learning-based systems

    A gentle transition from Java programming to Web Services using XML-RPC

    Get PDF
    Exposing students to leading edge vocational areas of relevance such as Web Services can be difficult. We show a lightweight approach by embedding a key component of Web Services within a Level 3 BSc module in Distributed Computing. We present a ready to use collection of lecture slides and student activities based on XML-RPC. In addition we show that this material addresses the central topics in the context of web services as identified by Draganova (2003)

    Twitter and non-elites. Interpreting power dynamics in the life story of the (#)BRCA Twitter stream

    Get PDF
    In May 2013 and March 2015, actress Angelina Jolie wrote in the New York Times about her choice to undergo preventive surgery. In her two op-eds she explained that - as a carrier of the BRCA1 gene mutation - preventive surgery was the best way to lower her heightened risk of developing breast and ovarian cancer. By applying a digital methods approach to BRCA-related tweets from 2013 and 2015, before, during and after the exposure of Jolieā€™s story, this study maps and interprets Twitter discursive dynamics at two time points of the BRCA Twitter stream. Findings show an evolution in curation and framing dynamics occurring between 2013 and 2015, with individual patient advocates replacing advocacy organisations as top curators of BRCA content and coming to prominence as providers of specialist illness narratives. These results suggest that between 2013 and 2015, Twitter went from functioning primarily as an organisation-centred news reporting mechanism, to working as a crowdsourced specialist awareness system. This paper advances a twofold contribution. First, it points at Twitterā€™s fluid functionality for an issue public and suggests that by looking at the life story ā€“ rather than at a single time point ā€“ of an issue-based Twitter stream we can track the evolution of power roles underlying discursive practices and better interpret the emergence of non-elite actors in the public arena. Second, the study provides evidence of the rise of activist cultures that rely on fluid, non-elite, collective and individual social media engagement

    Evaluation of the ICT Test Bed Project : the qualitative report

    Get PDF

    ALT-C 2010 - Conference Proceedings

    Get PDF
    • ā€¦
    corecore