26 results on 'Available in Library Collection'
Search Results
2. Combining methods for non-invasive fecal DNA enables whole genome and metagenomic analyses in wildlife biology
- Abstract
Non-invasive biological samples benefit studies that investigate rare, elusive, endangered, or dangerous species. Integrating genomic techniques that use non-invasive biological sampling with advances in computational approaches can benefit and inform wildlife conservation and management. Here, we used non-invasive fecal DNA samples to generate low- to medium-coverage genomes (e.g., >90% of the complete nuclear genome at six X-fold coverage) and metagenomic sequences, combining widely available and accessible DNA collection cards with commonly used DNA extraction and library building approaches. DNA preservation cards are easy to transport and can be stored non-refrigerated, avoiding cumbersome or costly sample methods. The genomic library construction and shotgun sequencing approach did not require enrichment or targeted DNA amplification. The utility and potential of the data generated was demonstrated through genome scale and metagenomic analyses of zoo and free-ranging African savanna elephants (Loxodonta africana). Fecal samples collected from free-ranging individuals contained an average of 12.41% (5.54–21.65%) endogenous elephant DNA. Clustering of these elephants with others from the same geographic region was demonstrated by a principal component analysis of genetic variation using nuclear genome-wide SNPs. Metagenomic analyses identified taxa that included Loxodonta, green plants, fungi, arthropods, bacteria, viruses and archaea, showcasing the utility of this approach for addressing complementary questions based on host-associated DNA, e.g., pathogen and parasite identification. The molecular and bioinformatic analyses presented here contributes towards the expansion and application of genomic techniques to conservation science and practice., Non-invasive biological samples benefit studies that investigate rare, elusive, endangered, or dangerous species. Integrating genomic techniques that use non-invasive biological sampling with advances in computational approaches can benefit and inform wildlife conservation and management. Here, we used non-invasive fecal DNA samples to generate low- to medium-coverage genomes (e.g., >90% of the complete nuclear genome at six X-fold coverage) and metagenomic sequences, combining widely available and accessible DNA collection cards with commonly used DNA extraction and library building approaches. DNA preservation cards are easy to transport and can be stored non-refrigerated, avoiding cumbersome or costly sample methods. The genomic library construction and shotgun sequencing approach did not require enrichment or targeted DNA amplification. The utility and potential of the data generated was demonstrated through genome scale and metagenomic analyses of zoo and free-ranging African savanna elephants (Loxodonta africana). Fecal samples collected from free-ranging individuals contained an average of 12.41% (5.54–21.65%) endogenous elephant DNA. Clustering of these elephants with others from the same geographic region was demonstrated by a principal component analysis of genetic variation using nuclear genome-wide SNPs. Metagenomic analyses identified taxa that included Loxodonta, green plants, fungi, arthropods, bacteria, viruses and archaea, showcasing the utility of this approach for addressing complementary questions based on host-associated DNA, e.g., pathogen and parasite identification. The molecular and bioinformatic analyses presented here contributes towards the expansion and application of genomic techniques to conservation science and practice.
- Published
- 2023
3. Combining methods for non-invasive fecal DNA enables whole genome and metagenomic analyses in wildlife biology
- Abstract
Non-invasive biological samples benefit studies that investigate rare, elusive, endangered, or dangerous species. Integrating genomic techniques that use non-invasive biological sampling with advances in computational approaches can benefit and inform wildlife conservation and management. Here, we used non-invasive fecal DNA samples to generate low- to medium-coverage genomes (e.g., >90% of the complete nuclear genome at six X-fold coverage) and metagenomic sequences, combining widely available and accessible DNA collection cards with commonly used DNA extraction and library building approaches. DNA preservation cards are easy to transport and can be stored non-refrigerated, avoiding cumbersome or costly sample methods. The genomic library construction and shotgun sequencing approach did not require enrichment or targeted DNA amplification. The utility and potential of the data generated was demonstrated through genome scale and metagenomic analyses of zoo and free-ranging African savanna elephants (Loxodonta africana). Fecal samples collected from free-ranging individuals contained an average of 12.41% (5.54–21.65%) endogenous elephant DNA. Clustering of these elephants with others from the same geographic region was demonstrated by a principal component analysis of genetic variation using nuclear genome-wide SNPs. Metagenomic analyses identified taxa that included Loxodonta, green plants, fungi, arthropods, bacteria, viruses and archaea, showcasing the utility of this approach for addressing complementary questions based on host-associated DNA, e.g., pathogen and parasite identification. The molecular and bioinformatic analyses presented here contributes towards the expansion and application of genomic techniques to conservation science and practice., Non-invasive biological samples benefit studies that investigate rare, elusive, endangered, or dangerous species. Integrating genomic techniques that use non-invasive biological sampling with advances in computational approaches can benefit and inform wildlife conservation and management. Here, we used non-invasive fecal DNA samples to generate low- to medium-coverage genomes (e.g., >90% of the complete nuclear genome at six X-fold coverage) and metagenomic sequences, combining widely available and accessible DNA collection cards with commonly used DNA extraction and library building approaches. DNA preservation cards are easy to transport and can be stored non-refrigerated, avoiding cumbersome or costly sample methods. The genomic library construction and shotgun sequencing approach did not require enrichment or targeted DNA amplification. The utility and potential of the data generated was demonstrated through genome scale and metagenomic analyses of zoo and free-ranging African savanna elephants (Loxodonta africana). Fecal samples collected from free-ranging individuals contained an average of 12.41% (5.54–21.65%) endogenous elephant DNA. Clustering of these elephants with others from the same geographic region was demonstrated by a principal component analysis of genetic variation using nuclear genome-wide SNPs. Metagenomic analyses identified taxa that included Loxodonta, green plants, fungi, arthropods, bacteria, viruses and archaea, showcasing the utility of this approach for addressing complementary questions based on host-associated DNA, e.g., pathogen and parasite identification. The molecular and bioinformatic analyses presented here contributes towards the expansion and application of genomic techniques to conservation science and practice.
- Published
- 2023
4. Making and Using AI in the Library : Creating a BERT Model at the National Library of Sweden
- Abstract
How can novel AI techniques be made and put to use in the library? Combining methods from data and library science, this article focuses on Natural Language Processing technologies in especially national libraries. It explains how the National Library of Sweden’s collections enabled the development of a new BERT language model for Swedish. It also outlines specific use cases for the model in the context of academic libraries, detailing strategies for how such a model could make digital collections available for new forms of research: from automated classification to enhanced searchability and improved OCR cohesion. Highlighting the potential for cross-fertilizing AI with libraries, the conclusion suggests that while AI may transform the workings of the library, libraries can also have a key role to play in the future development of AI.
- Published
- 2023
- Full Text
- View/download PDF
5. Making and Using AI in the Library : Creating a BERT Model at the National Library of Sweden
- Abstract
How can novel AI techniques be made and put to use in the library? Combining methods from data and library science, this article focuses on Natural Language Processing technologies in especially national libraries. It explains how the National Library of Sweden’s collections enabled the development of a new BERT language model for Swedish. It also outlines specific use cases for the model in the context of academic libraries, detailing strategies for how such a model could make digital collections available for new forms of research: from automated classification to enhanced searchability and improved OCR cohesion. Highlighting the potential for cross-fertilizing AI with libraries, the conclusion suggests that while AI may transform the workings of the library, libraries can also have a key role to play in the future development of AI.
- Published
- 2023
- Full Text
- View/download PDF
6. Making and Using AI in the Library : Creating a BERT Model at the National Library of Sweden
- Abstract
How can novel AI techniques be made and put to use in the library? Combining methods from data and library science, this article focuses on Natural Language Processing technologies in especially national libraries. It explains how the National Library of Sweden’s collections enabled the development of a new BERT language model for Swedish. It also outlines specific use cases for the model in the context of academic libraries, detailing strategies for how such a model could make digital collections available for new forms of research: from automated classification to enhanced searchability and improved OCR cohesion. Highlighting the potential for cross-fertilizing AI with libraries, the conclusion suggests that while AI may transform the workings of the library, libraries can also have a key role to play in the future development of AI.
- Published
- 2023
- Full Text
- View/download PDF
7. Making and Using AI in the Library : Creating a BERT Model at the National Library of Sweden
- Abstract
How can novel AI techniques be made and put to use in the library? Combining methods from data and library science, this article focuses on Natural Language Processing technologies in especially national libraries. It explains how the National Library of Sweden’s collections enabled the development of a new BERT language model for Swedish. It also outlines specific use cases for the model in the context of academic libraries, detailing strategies for how such a model could make digital collections available for new forms of research: from automated classification to enhanced searchability and improved OCR cohesion. Highlighting the potential for cross-fertilizing AI with libraries, the conclusion suggests that while AI may transform the workings of the library, libraries can also have a key role to play in the future development of AI.
- Published
- 2023
- Full Text
- View/download PDF
8. Making and Using AI in the Library : Creating a BERT Model at the National Library of Sweden
- Abstract
How can novel AI techniques be made and put to use in the library? Combining methods from data and library science, this article focuses on Natural Language Processing technologies in especially national libraries. It explains how the National Library of Sweden’s collections enabled the development of a new BERT language model for Swedish. It also outlines specific use cases for the model in the context of academic libraries, detailing strategies for how such a model could make digital collections available for new forms of research: from automated classification to enhanced searchability and improved OCR cohesion. Highlighting the potential for cross-fertilizing AI with libraries, the conclusion suggests that while AI may transform the workings of the library, libraries can also have a key role to play in the future development of AI.
- Published
- 2023
- Full Text
- View/download PDF
9. SARA: A Collection of Sensitivity-Aware Relevance Assessments
- Author
-
McKechnie, Jack and McDonald, Graham
- Subjects
Computer Science - Information Retrieval - Abstract
Large archival collections, such as email or government documents, must be manually reviewed to identify any sensitive information before the collection can be released publicly. Sensitivity classification has received a lot of attention in the literature. However, more recently, there has been increasing interest in developing sensitivity-aware search engines that can provide users with relevant search results, while ensuring that no sensitive documents are returned to the user. Sensitivity-aware search would mitigate the need for a manual sensitivity review prior to collections being made available publicly. To develop such systems, there is a need for test collections that contain relevance assessments for a set of information needs as well as ground-truth labels for a variety of sensitivity categories. The well-known Enron email collection contains a classification ground-truth that can be used to represent sensitive information, e.g., the Purely Personal and Personal but in Professional Context categories can be used to represent sensitive personal information. However, the existing Enron collection does not contain a set of information needs and relevance assessments. In this work, we present a collection of fifty information needs (topics) with crowdsourced query formulations (3 per topic) and relevance assessments (11,471 in total) for the Enron collection (mean number of relevant documents per topic = 11, variance = 34.7). The developed information needs, queries and relevance judgements are available on GitHub and will be available along with the existing Enron collection through the popular ir_datasets library. Our proposed collection results in the first freely available test collection for developing sensitivity-aware search systems.
- Published
- 2024
10. On the culture of open access: the Sci-hub paradox
- Author
-
Maddi, Abdelghani and Sapinho, David
- Subjects
Computer Science - Computers and Society - Abstract
Shadow libraries, also known as ''pirate libraries'', are online collections of copyrighted publications that have been made available for free without the permission of the copyright holders. They have gradually become key players of scientific knowledge dissemination, despite their illegality in most countries of the world. Many publishers and scientist-editors decry such libraries for their copyright infringement and loss of publication usage information, while some scholars and institutions support them, sometimes in a roundabout way, for their role in reducing inequalities of access to knowledge, particularly in low-income countries. Although there is a wealth of literature on shadow libraries, none of this have focused on its potential role in knowledge dissemination, through the open access movement. Here we analyze how shadow libraries can affect researchers' citation practices, highlighting some counter-intuitive findings about their impact on the Open Access Citation Advantage (OACA). Based on a large randomized sample, this study first shows that OA publications, including those in fully OA journals, receive more citations than their subscription-based counterparts do. However, the OACA has slightly decreased over the seven last years. The introduction of a distinction between those accessible or not via the Scihub platform among subscription-based suggest that the generalization of its use cancels the positive effect of OA publishing. The results show that publications in fully OA journals are victims of the success of Sci-hub. Thus, paradoxically, although Sci-hub may seem to facilitate access to scientific knowledge, it negatively affects the OA movement as a whole, by reducing the comparative advantage of OA publications in terms of visibility for researchers. The democratization of the use of Sci-hub may therefore lead to a vicious cycle, hindering efforts to develop full OA strategies without proposing a credible and sustainable alternative model for the dissemination of scientific knowledge., Comment: Scientometrics, 2023. arXiv admin note: substantial text overlap with arXiv:2206.06874
- Published
- 2023
- Full Text
- View/download PDF
11. A defesa aérea do Vietnã do Norte contra a campanha de bombardeios dos EUA (1965 – 1968)
- Abstract
In late 1964, due to the constant operations carried out by the Viet Cong, the US government faced major difficulties in dealing with the political situation in South Vietnam. President Lyndon Baynes Johnson opted for an effective show of strength, further evidencing his support for the South Vietnamese. The first resource used in the military assault were air raids, which provoked as much discussion as the delay in the deployment of ground troops. Between February and March 1965, President Johnson sent the first US military contingents to South Vietnam and launched a major bombing campaign against North Vietnam called “Rolling Thunder” initiating the country's official involvement in the war. In general terms, the air strikes failed to achieve their goals as they did not stop the flow of fighters and supplies to the Viet Cong. This article is aimed to recall how the Democratic Republic of North Vietnam managed to respond to US military aviation using Russian and Chinese aircraft and taking full advantage of their equipment and skilled pilots, as well as how the country overcame adversity, its own limitations and the immense US air power between 1965 and 1968. The major side effects of the air offensive against North Vietnam and their capitalization by the North Vietnamese as negative war propaganda will also be observed. To this end, the focus was put on the new field of Military History and the History of International Affairs. Available sources from the Presidential Library's online collections, Lyndon Baynes Johnson, the Cold War International History Project at the Wilson Center, the National Archives and Records Administration of the United States, the online archive of the French newspaper Le Monde and the US newspaper Chicago Tribune were additionally consulted. At the end of the present article, the works of Boniface (2015), Davies (2008), McNamara (1995), Moïse (1996), Morrocco (1984), Toperczer (2001), Van Staaveren (2002) are cited as bibliographic suppo, Em fins de 1964, o governo dos EUA encontrava-se diante de grandes dificuldades para lidar com a situação política no Vietnã do Sul, por conta da ação constante dos guerrilheiros vietcongues. O presidente Lyndon Baynes Johnson, optou por uma efetiva demonstração de força, evidenciando ainda mais o seu apoio aos Sul-vietnamitas. O primeiro recurso utilizado na investida militar foi o da ofensiva aérea, que gerou tantas discussões quanto a demora para a utilização de tropas terrestres. Entre fevereiro e março de 1965, o presidente Johnson enviou os primeiros contingentes militares dos EUA ao Vietnã do Sul e deflagrou uma grande campanha de bombardeios contra o Vietnã do Norte chamada Rolling Thunder, inaugurando o envolvimento oficial do país na guerra. As ofensivas aéreas não atingiam seus objetivos como um todo, pois não faziam cessar o fluxo de homens e materiais que abasteciam os vietcongues. Este artigo pretende recordar sobre como a então República Democratica do Vietnã do Norte conseguiu com o seu sistema defensivo, reagir aos ataques da aviação militar norte americana, utilizando aeronaves de origem russa e chinesa, como tiraram o máximo proveito da habilidade de seus pilotos e de seu equipamento e de que forma o país superou as adversidades, suas próprias limitações e o imenso poderio aéreo dos EUA entre os anos de 1965 e 1968. Observou-se ainda como os efeitos colaterais da ofensiva aérea ao Vietnã do Norte foram grandes, e como foi capitalizada pelos norte vietnamitas como propaganda negativa da guerra. Para tanto trabalhamos com uma abordagem no campo da nova História Militar e da História das Relações Internacionais. Utilizamos as fontes disponíveis em acervos online da Biblioteca presidencial, Lyndon Baynes Johnson, do Cold War International History Project localizado no Wilson Center, dos Arquivos Nacionais dos EUA (NARA), do arquivo online do Jornal francês Le Monde e do jornal norte-americano Chicago Tribune. Para o propósito do artigo tomou-se como, A finales de 1964, el Gobierno de los Estados Unidos se enfrentaba a grandes dificultades para lidiar con la situación política en Vietnam del Sur, debido a la acción constante de la guerrilla vietnamita. El presidente Lyndon Baynes Johnson optó por una demostración efectiva de fuerza, subrayando aún más su apoyo a los vietnamitas del sur. El primer recurso utilizado en el ataque militar fue el de la ofensiva aérea, que provocó tantas discusiones como el retraso en la utilización de tropas terrestres. Entre febrero y marzo de 1965 el presidente Johnson envió los primeros contingentes militares de los Estados Unidos a Vietnam del Sur y lanzó una importante campaña de bombardeos contra Vietnam del Norte llamada Rolling Thunder, para inaugurar la participación oficial del país en la guerra. Las ofensivas aéreas no lograron sus objetivos en su conjunto, ya que no detuvieron el flujo de hombres y materiales que abastecían al Viet Cong. Este artículo tiene como objetivo recordar cómo la entonces República Democratica de Vietnam del Norte logró con su sistema defensivo responder a los ataques de la aviación militar de los EUA, utilizando aviones de origen ruso y chino; cómo aprovecharon al máximo la capacidad de sus pilotos, sus equipajes y cómo el país superó la adversidad, sus propias limitaciones y el inmenso poder aéreo estadounidense entre 1965 y 1968. También se observó cómo los efectos secundarios de la ofensiva aérea contra Vietnam del Norte fueron grandes y cómo fueron capitalizados por los norvietnamitas como propaganda negativa de la guerra. Con este fin, trabajamos con un enfoque en el campo de la nueva Historia Militar y la Historia de las Relaciones Internacionales. Utilizamos las fuentes disponibles de las colecciones en línea de la Biblioteca Presidencial, Lyndon Baynes Johnson, el Proyecto de Historia Internacional de la Guerra Fría ubicado en el Centro Wilson, los Archivos Nacionales de los Estados Unidos (NARA), el archivo en línea del periódico francés
- Published
- 2022
12. Transferências culturais entre França e Brasil: as revistas ilustradas Je sais tout e Eu sei tudo
- Abstract
In this article, by having as sources the magazine Je Sais Tout-published in France between 1905 and 1939 -and Eu Sei Tudo -was edited in Brazil between 1917 and 1958 -and by adopting the History of Illustrated magazine as a theoretical reference and from a Transnational History perspective, this articleaims to investigate the circulation of this French magazine in Brazil and its cultural transfers to the Brazilian one. All issues of Eu Sei Tudoand some of Je Sais Tout –available in the online collection of the National Library of France (Gallica) –were researched, with emphasis on the first decade of publication of both journals. We consider the hypothesis that Eu Sei Tudo, despite the national appropriations and tones, propagated on its pages content linked to behaviors and gestures that often reiterated a Eurocentric view., Tomando como fontes a revista Je Sais Tout - publicada na França entre 1905 e 1939 - e a Eu Sei Tudo - editada no Brasil entre os anos de 1917 - e adotando como referencial teórico a perspectiva da história transnacional, este artigo tem como objetivo investigar a circulação dessa revista francesa no Brasil e suas transferências culturais para a brasileira. Foram pesquisados todos os números da Eu Sei Tudo e alguns da Je Sais Tout – disponíveis no acervo online da Biblioteca Nacional da França (Gallica), dando ênfase a primeira década de publicação de ambas as revistas. Consideramos a hipótese de que a Eu Sei Tudo, em que pesem as apropriações e tons nacionais, propagou em suas páginas conteúdos vinculados a comportamentos e gestos que, frequentemente, reiteravam um olhar eurocêntrico.
- Published
- 2022
13. Estereotipos de género en literatura infantil: un estudio sobre la tendencia actual en álbumes ilustrados
- Abstract
La lectura incide en el desarrollo personal y académico de los niños y niñas y es considerada una habilidad fundamental a desarrollar. Como resultado, los niños y niñas, desde edades tempranas, están expuestos a la lectura de historias, de manera que su visión del yo y del mundo se construye a partir de los patrones y valores que esas historias transmiten, pues la lectura puede adquirir la función de actuar como el germen de la construcción de una identidad. Tradicionalmente, la presencia de estereotipos de género ha sido muy común en literatura infantil y, por lo tanto, se corre el riesgo de que estas concepciones estereotipadas sean asumidas por el público infantil. Por lo tanto, resulta fundamental que los niños y niñas tengan acceso a una literatura entendida desde términos coeducativos. Como consecuencia, en este trabajo se presenta un estudio de una colección actual de álbumes ilustrados disponibles para su lectura en una Biblioteca Pública. La finalidad es analizar la representación del género que se realiza y valorar la tendencia actual en cuanto a la presencia de estereotipos de género en literatura infantil. Se trata de un acercamiento necesario para fomentar una elección de recursos lectores crítica y bien fundamentada., Reading has an impact on the personal and academic development of children and it is considered as a basic ability to develop. As a result of this, children are exposed to the reading of stories from an early age, so their view of themselves and the world is built through the patterns and values that those stories transmit. This is due to the reading’s function as the grounds for identity’s construction. Traditionally, the presence of gender stereotypes has been really usual in literature for children and, therefore, there is a risk of an assumption of these stereotyped conceptions by children. Hence, a coeducative literature has to be accessible to children. Consequently, this work presents a study about a collection of illustrated albums available in a public library. The aim is to analyse the representation of gender that is done and the actual tendency regarding the presence of gender stereotypes in literature for children. It is a required approach in order to encourage a critical and well-supported choice of reading resources.
- Published
- 2022
14. Public Library Services on the Promotion of Literacy Level of Users in Kenneth Dike E-Central Library, Awka
- Abstract
This study investigated public library services on the literacy level of users in Kenneth Dike E-Central Library, Awka. Five research questions were used for the study. The research method adopted was the survey method and population consisted of 2543 registered users of Kenneth Dike public library. A sample size of 345 users was used. Mean was used for data analysis. Questionnaires and observation checklist were used for data collection. The study found that the available public library services that can promote the literacy level of users are consultancy services, exhibition and displays, book reservation services which have high mean score above 2.50. The extent of use of the available public library services by users to promote their literacy level are reprographic services, library instruction (user education), and inter-library loan which have high mean score above 2.50. The roles of public library in promoting literacy level of users in Kenneth Dike E-central Library in Awka are teaching of literacy skills, promotion of independent learning ,education on lifelong learning ,organizing library week, story-talk hour, creative activities or creative writing , book exhibition and book talk which have high mean score above 2.50. The challenges that hinder public library in providing effective services towards promoting literacy level are inadequate financial support, insufficient library materials, and poor library infrastructure which have high mean score above 2.50. The solutions to the challenges that hinder public library in providing effective services towards promoting literacy level of users are adequate financial support, sufficient library materials, and low cost of library materials which have high mean score. This study concludes that the impacts of public library services on promoting literacy level are high as they have the tendency of improving the reading culture of users. The study went on to recommend that sufficient and relevant library materials
- Published
- 2022
15. COLLECTION DEVELOPMENT POLICY FOR E-RESOURCES
- Abstract
Collection development is a most important process of a library. This process increases the reading materials of the library for the satisfaction of the reader approach. Collection development policy acts as a guide for selecting library materials. It helps to maintain library cooperation and communication between library staff. This process increases the reading materials of the library for the satisfaction of the reader approach. Collection development policies are written statements of goals and evaluative parameters to guide decision-making when adding material to a library collection. A large number of e-resources collection has become a challenge to libraries as a lot of information is now available to the public without having to visit and use the traditional library. American Library Association states that the collection development policies document which defines the scope of a library’s existing collections, plan for the continuing development of resources, identify collection strength and outline the relationship between selection philosophy and institutions goals, general selection criteria, and intellectual freedom. In electronic environment collection development policy select tools and processes, set the principles for the management of electronic resources, allocating the budget for buying of e-resources. Due to information technology, most of the libraries are involved in the sharing of the e-resources in many ways. The Collection development policy must indeed be clear whether the collection is in print or electronic form and also it should full fill the user's demand. This article tried to explore the different collection development policies for e-resources. The information provided in this article is based on secondary data. The information available in this article is a general kind of information and it is applicable in all kinds of libraries.
- Published
- 2022
16. PENYELUNDUPAN SENJATA API OLEH JARINGAN FILIPINA KEWILAYAH PAPUA SEBAGAI KEJAHATAN TERORGANISASI TRANSNASIONAL DITINJAU DARI HUKUM INTERNASIONAL
- Abstract
Smuggling of firearms is part of transnational crime, which is a form of crime that poses a major threat to global security and prosperity involving various countries. The formulation of the research problem is 1. How is the regulation regarding transnational organized crime according to international law 2. How is the analysis of firearm smuggling cases by the Philippines network to Papua region with the United Nations Convention on Transnational Organized Crime (UNTOC). This study uses a normative juridical method which is studied using the law, primary, secondary data, and available legal materials. Data collection was carried out using library research and data analysis was carried out using qualitative analysis methods. The conclusion from the above problem is that as an effort to overcome the problem of cross-border firearm smuggling as a form of Transnational Organized Crime, then the regulation is made in international law, namely the Protocol Against The Illicit Manufacturing Of And Trafficking In Firearms, Parts and Components and Ammunition (2001) which became an additional protocol to the United Nations Convention Against Transnational Organized Crime (2000), and the issue of arms smuggling is also regulated in the United Nations Action Program to Prevent, Combat, Eradicate Illicit Traffic in Light Arms and Light Weapons in All Its Aspects (2001) Furthermore, the analysis of firearm smuggling cases by the Philippines network to the Papua region in accordance with the United Nations Convention on Transnational Organized Crime (UNTOC). it is very clear that it regulates the smuggling of illegal weapons, starting from the scope, punishment, and prevention, it is regulated in it. It's just that there are still many countries that have not implemented the provisions of the United Nations Firearms Protocol, including Indonesia. Keyword : Smuggling, Firearms, Transnational Organized Crime
- Published
- 2022
17. El Préstamo Digital Controlado en bibliotecas
- Abstract
Controlled digital lending (CDL) is a model by which libraries digitize materials in their collection and make them available for lending. It is based on interpretations of U.S. copyright principles of fair use and copyright exhaustion. However, there is significant controversy among the actors involved (authors, writers and libraries) about the legality of this model.
- Published
- 2022
18. Opening Knowledge: Resources for Open Research and Teaching at Virginia Tech and Beyond
- Abstract
At the University Libraries we’ve always been committed to the principle of access—access to information across a wide spectrum of disciplines in service to the Virginia Tech community. Today this commitment to access remains stronger than ever, further emboldened by the advent of new technologies that make possible unprecedented distribution of knowledge via the Internet, free of charge to all scientists, scholars, teachers, students, and other curious minds throughout the world. We believe that openness is the future of higher education. Openness ensures greater dissemination, inclusiveness, and integrity for the advancement of knowledge and the education of the next generation. While not all knowledge can be open, we believe that the vast majority can and should be. This booklet introduces a few of the many open resources you can find in and through the Library. The first section, “For Scholars,” highlights the wealth of open scholarship in the Library’s collections as well as tools we make available to researchers for writing and publishing open scholarship. The second section, “For Instructors and Students,” focuses on tools and resources specifically aimed at making learning accessible, abundant, and customizable for all.
- Published
- 2022
19. Browzine User Guide
- Abstract
Browzine is an app, available for Apple, Android, and Desktops, that allows you to browse and access journals. Single interface access enables simple use regardless of device. All e-journals in the Monash Health Library collection are available through Browzine.
- Published
- 2022
20. Browzine
- Abstract
Browzine is an app, available for Apple, Android, and Desktops, that allows you to browse and access journals. Single interface access enables simple use regardless of device. All e-journals in the Monash Health Library collection are available through Browzine.
- Published
- 2022
21. PENYELUNDUPAN SENJATA API OLEH JARINGAN FILIPINA KEWILAYAH PAPUA SEBAGAI KEJAHATAN TERORGANISASI TRANSNASIONAL DITINJAU DARI HUKUM INTERNASIONAL
- Abstract
Smuggling of firearms is part of transnational crime, which is a form of crime that poses a major threat to global security and prosperity involving various countries. The formulation of the research problem is 1. How is the regulation regarding transnational organized crime according to international law 2. How is the analysis of firearm smuggling cases by the Philippines network to Papua region with the United Nations Convention on Transnational Organized Crime (UNTOC). This study uses a normative juridical method which is studied using the law, primary, secondary data, and available legal materials. Data collection was carried out using library research and data analysis was carried out using qualitative analysis methods. The conclusion from the above problem is that as an effort to overcome the problem of cross-border firearm smuggling as a form of Transnational Organized Crime, then the regulation is made in international law, namely the Protocol Against The Illicit Manufacturing Of And Trafficking In Firearms, Parts and Components and Ammunition (2001) which became an additional protocol to the United Nations Convention Against Transnational Organized Crime (2000), and the issue of arms smuggling is also regulated in the United Nations Action Program to Prevent, Combat, Eradicate Illicit Traffic in Light Arms and Light Weapons in All Its Aspects (2001) Furthermore, the analysis of firearm smuggling cases by the Philippines network to the Papua region in accordance with the United Nations Convention on Transnational Organized Crime (UNTOC). it is very clear that it regulates the smuggling of illegal weapons, starting from the scope, punishment, and prevention, it is regulated in it. It's just that there are still many countries that have not implemented the provisions of the United Nations Firearms Protocol, including Indonesia. Keyword : Smuggling, Firearms, Transnational Organized Crime
- Published
- 2022
22. PENYELUNDUPAN SENJATA API OLEH JARINGAN FILIPINA KEWILAYAH PAPUA SEBAGAI KEJAHATAN TERORGANISASI TRANSNASIONAL DITINJAU DARI HUKUM INTERNASIONAL
- Abstract
Smuggling of firearms is part of transnational crime, which is a form of crime that poses a major threat to global security and prosperity involving various countries. The formulation of the research problem is 1. How is the regulation regarding transnational organized crime according to international law 2. How is the analysis of firearm smuggling cases by the Philippines network to Papua region with the United Nations Convention on Transnational Organized Crime (UNTOC). This study uses a normative juridical method which is studied using the law, primary, secondary data, and available legal materials. Data collection was carried out using library research and data analysis was carried out using qualitative analysis methods. The conclusion from the above problem is that as an effort to overcome the problem of cross-border firearm smuggling as a form of Transnational Organized Crime, then the regulation is made in international law, namely the Protocol Against The Illicit Manufacturing Of And Trafficking In Firearms, Parts and Components and Ammunition (2001) which became an additional protocol to the United Nations Convention Against Transnational Organized Crime (2000), and the issue of arms smuggling is also regulated in the United Nations Action Program to Prevent, Combat, Eradicate Illicit Traffic in Light Arms and Light Weapons in All Its Aspects (2001) Furthermore, the analysis of firearm smuggling cases by the Philippines network to the Papua region in accordance with the United Nations Convention on Transnational Organized Crime (UNTOC). it is very clear that it regulates the smuggling of illegal weapons, starting from the scope, punishment, and prevention, it is regulated in it. It's just that there are still many countries that have not implemented the provisions of the United Nations Firearms Protocol, including Indonesia. Keyword : Smuggling, Firearms, Transnational Organized Crime
- Published
- 2022
23. PENYELUNDUPAN SENJATA API OLEH JARINGAN FILIPINA KEWILAYAH PAPUA SEBAGAI KEJAHATAN TERORGANISASI TRANSNASIONAL DITINJAU DARI HUKUM INTERNASIONAL
- Abstract
Smuggling of firearms is part of transnational crime, which is a form of crime that poses a major threat to global security and prosperity involving various countries. The formulation of the research problem is 1. How is the regulation regarding transnational organized crime according to international law 2. How is the analysis of firearm smuggling cases by the Philippines network to Papua region with the United Nations Convention on Transnational Organized Crime (UNTOC). This study uses a normative juridical method which is studied using the law, primary, secondary data, and available legal materials. Data collection was carried out using library research and data analysis was carried out using qualitative analysis methods. The conclusion from the above problem is that as an effort to overcome the problem of cross-border firearm smuggling as a form of Transnational Organized Crime, then the regulation is made in international law, namely the Protocol Against The Illicit Manufacturing Of And Trafficking In Firearms, Parts and Components and Ammunition (2001) which became an additional protocol to the United Nations Convention Against Transnational Organized Crime (2000), and the issue of arms smuggling is also regulated in the United Nations Action Program to Prevent, Combat, Eradicate Illicit Traffic in Light Arms and Light Weapons in All Its Aspects (2001) Furthermore, the analysis of firearm smuggling cases by the Philippines network to the Papua region in accordance with the United Nations Convention on Transnational Organized Crime (UNTOC). it is very clear that it regulates the smuggling of illegal weapons, starting from the scope, punishment, and prevention, it is regulated in it. It's just that there are still many countries that have not implemented the provisions of the United Nations Firearms Protocol, including Indonesia. Keyword : Smuggling, Firearms, Transnational Organized Crime
- Published
- 2022
24. PENYELUNDUPAN SENJATA API OLEH JARINGAN FILIPINA KEWILAYAH PAPUA SEBAGAI KEJAHATAN TERORGANISASI TRANSNASIONAL DITINJAU DARI HUKUM INTERNASIONAL
- Abstract
Smuggling of firearms is part of transnational crime, which is a form of crime that poses a major threat to global security and prosperity involving various countries. The formulation of the research problem is 1. How is the regulation regarding transnational organized crime according to international law 2. How is the analysis of firearm smuggling cases by the Philippines network to Papua region with the United Nations Convention on Transnational Organized Crime (UNTOC). This study uses a normative juridical method which is studied using the law, primary, secondary data, and available legal materials. Data collection was carried out using library research and data analysis was carried out using qualitative analysis methods. The conclusion from the above problem is that as an effort to overcome the problem of cross-border firearm smuggling as a form of Transnational Organized Crime, then the regulation is made in international law, namely the Protocol Against The Illicit Manufacturing Of And Trafficking In Firearms, Parts and Components and Ammunition (2001) which became an additional protocol to the United Nations Convention Against Transnational Organized Crime (2000), and the issue of arms smuggling is also regulated in the United Nations Action Program to Prevent, Combat, Eradicate Illicit Traffic in Light Arms and Light Weapons in All Its Aspects (2001) Furthermore, the analysis of firearm smuggling cases by the Philippines network to the Papua region in accordance with the United Nations Convention on Transnational Organized Crime (UNTOC). it is very clear that it regulates the smuggling of illegal weapons, starting from the scope, punishment, and prevention, it is regulated in it. It's just that there are still many countries that have not implemented the provisions of the United Nations Firearms Protocol, including Indonesia. Keyword : Smuggling, Firearms, Transnational Organized Crime
- Published
- 2022
25. Uncovering the Handwritten Text in the Margins: End-to-end Handwritten Text Detection and Recognition
- Author
-
Cheng, Liang, Frankemölle, Jonas, Axelsson, Adam, and Vats, Ekta
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
The pressing need for digitization of historical documents has led to a strong interest in designing computerised image processing methods for automatic handwritten text recognition. However, not much attention has been paid on studying the handwritten text written in the margins, i.e. marginalia, that also forms an important source of information. Nevertheless, training an accurate and robust recognition system for marginalia calls for data-efficient approaches due to the unavailability of sufficient amounts of annotated multi-writer texts. Therefore, this work presents an end-to-end framework for automatic detection and recognition of handwritten marginalia, and leverages data augmentation and transfer learning to overcome training data scarcity. The detection phase involves investigation of R-CNN and Faster R-CNN networks. The recognition phase includes an attention-based sequence-to-sequence model, with ResNet feature extraction, bidirectional LSTM-based sequence modeling, and attention-based prediction of marginalia. The effectiveness of the proposed framework has been empirically evaluated on the data from early book collections found in the Uppsala University Library in Sweden. Source code and pre-trained models are available at Github.
- Published
- 2023
26. Wealth and Property Taxation in the United States Sacha Dray, Camille Landais, and Stefanie Stantcheva.
- Author
-
Dray, Sacha, Landais, Camille, and Stantcheva, Stefanie
- Published
- 2023
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.