Significance of Web 2.0 Technology and its Application in Academic Libraries
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 5
Abstract
The objective of this paper is to provide information of web 2.0 technology in context of academic libraries. Web 2.0 technologies have seen the sudden increase of social networking sites or tools, which provide a medium to connect with commonplace people. There are some social software applications are recent time are the most up-to-date properties of the internet users. In libraries the key ones include Social networking sites, wikis, IM, RSS, Blogs, Book marking etc. web 2.0 or Library 2.0 has changed the usual way of thinking regarding the occupation wherever academic library merely fit into place in creating the content as well as services in favor of user shifted to the area of user where librarian determination facilitate user to create them on behalf of themselves. The changes in web technologies have enabled libraries to produce novel interactive services such as virtual reference services, personalized interfaces and audio-visual media with the intention of be able to be downloaded by the user (group of people) irrespective of their substantial locations. In consequence these up-and-coming web based i.e. web 2.0 features are opportunity innovative avenues and giving libraries the facility to propose the enhanced customer services to the user communities.
Authors and Affiliations
Rashmi S. Tarade , Nilu Singh
Intensity and Texture Gradient Based Boundary Detection Algorithm for Medical Image[i][/i]
In today’s technological world images plays a very important role. Images are very helpful in several fields like non-destructive testing. Medical diagnostics, surveillance and military etc. in image analysis and compute...
A Puzzle Based Authentication Scheme for Cloud Computing
This article presents puzzle based authentication scheme in which cloud user registers and solves the puzzle, puzzle solving time and sequence of image block is stored and validated by local server and the cloud user get...
An Efficient Speaker Diarization using Privacy Preserving Audio Features Based of Speech/Non Speech Detection
Privacy-sensitive audio features for speaker diarization in multiparty conversations: i.e., a set of audio features having low linguistic information for speaker diarization in a single and multiple distant microphone sc...
Query Based Expert Search Based on Relevance Class and Web Page Quality Ranking
Expert search is mostly used in the areas of academic groups, organizations. The general expert search problem which is observed is searching experts on the web where lot of web pages and experts names are considered. It...
Detecting and Localizing the Attackers in Multiple Networks
Spoofing attack which easily attack the network and reduce the performance of the network. In this Paper, Spoofing attacks are detected, Finding the number of attackers that masquerade the node identity, Localizing all t...