,
peuterey online shop 1.1 typical research projects for the United States and the European Union access to digital resources the library has started a number of specific statistical research projects, for example, research by the American Library Museum Association, the E-Metric funded projects, many U.S. institutions (including ARL, JISC, NISO, etc.) funded COUNIER projects, the EU Telematics for Libraries Programme support EQUINOX projects, these projects mostly for research to develop electronic information services and resources described statistical indicators and performance measures and methods. 1.2 relevant standards in the relevant standards in the face of new information environment and library form, some organizations began to try the new standards for performance evaluation of electronic resources into the existing standards / guidance framework. NISO approved in 2004,
moncler doudoune, for example, the library and information services,
peuterey outlet, information providers and use of measures and statistical data dictionary (NISO Z39.7-2004 Information Services and Use: Metrics & statistics for libraries and infomation providers - Data Dictionary), The standard in the traditional library based on the work, a special added network services, network resources, network operations, new measurement methods,
Canada Goose jakke,
moncler wien, this data dictionary will be gradually incorporated into the American Library statistics, a statistical work of reference to the American Library basis, ICOLC1998 to develop the 'Internet Index,
Canada Goose trillium, abstracts and full-text resource usage statistics measure Guidelines set of networked information resource use of performance measurement guide. 2001 revision defined the network information using the statistics of the basic requirements and provide the privacy,
piumini moncler 2011, confidentiality, access, transfer and reporting forms of guidance. ISO ISO / CD 11620 is also traditional services on the basis of statistical indicators, combined with ICOLC and COUNTER study, the number of resources for the library Guan measure its definition, methods of description. 1.3 digital library resources, access to domestic research and application of statistics country with public libraries, university libraries, scientific assessment of the library system, library for the library community has begun to gradually pay attention to digital library collections,
moncler outlet, digital library information services assessment. Reference 2 proposed a concept of post-evaluation of digital resources, but access to digital library resources such as post-evaluation of statistical methods and indicators have yet to enter comments. Some libraries have developed their own jsp or asp based on the library website to access statistical software, some of the digital library system, such as Tongfang TPI, Beijing Falls Extension of TRS, Zhejiang Tianyu the CGRS so also provides the corresponding statistics function, but not yet a commercial software for all types of digital resources the library provides access to a package of statistical programs.
相关的主题文章:
2 Library digital resources to access statistical methods
Library access to digital resources, statistical studies
1 Library digital resources to access statistics of the status quo
2.1 WEB log mode web server at work, always the result of the WWW to access records in some log (log) files, through the analysis of server logs You can get the following information (1) through the access time statistics,
moncler jacka,
Canada Goose suomi, the server can be accessed at certain times of the situation; (2) of the visitors IP statistics, mainly those from which you can determine the user access the Web server; (3) request for access statistics and analysis of errors, you can find the page in question to be corrected; (4) seeking clearance for visitors to the URL of statistics, the reader can determine the contents of those pages are most interested in, the contents of which pages are not interested. A variety of web server log file format and content of roughly the same. According to the W3C international standard [2], the general Web logs are included such as the user's IP address,
peuterey, request time, the method (GET / POST, etc.), the requested page or file URL,
peuterey giubbotti, send / receive bytes, protocol version and other information . Table 1 lists several different types of Web logs. Large amount of information these log files, user log file is difficult to obtain directly from the visual results. Analysis of log files, can make use of some commercial or open source software. The more good open source log analysis software: AWStats,
moncler outlet, webalizer, etc. Information provided from the log file statistics and analysis,
Canada Goose outlet, you can have a figure for the entire site, precise knowledge,
moncler jakke, so the site design and content improvements and adjustments to make the library Web site more good service for the reader. 2.2 resource providers use the database after the evaluation indicators are mainly used to update, renew the use of the database, usually in the library to purchase resources commercial digital resources, should be required to provide by the publishers or database usage reports, and then accordingly all kinds of analysis. Current publisher / database to provide statistical reports related to commonly used statistical indicators: ① retrieval times (searfh / query): user in one database made to retrieve the number of style. ② logins (session / sign on): the number of times a user opens a database. ③ Download abstracts / full text (abstract / fulltext page / image): a database user in a download to a local client in the number of abstracts or full text articles. 2.3 through the network proxy proxy proxy server (Proxy Server) is a server software, its main functions are: to set user authentication and accounting function, according to user accounts, unregistered users have no right to access the Internet through a proxy server network, can the user access time, access to sites, information flow statistics. Proxy server software is now mature, powerful function, the choice of server software are many. The main server software company WinGate WinGate Pro, Microsoft's Microsoft Proxy, Netscape's Netscape Proxy, Sybergen Netwo rks's SyGate, these agents not only for the software within the PC-LAN provides brokerage services, but also that the Novell-based network users, even users of agency services UNLX. Currently the vast majority of Intemet applications can be achieved through a proxy. Most proxy server software products are registered outside the internal network users to access network logging, some products can directly log into the database. According to log files or database, you can count the internal network and the network traffic of each user's access time, even by network type (such as: HTTP, SMTP, FTP, etc.) are statistical. 2.4 using a scripting language developed by its own web server logs the user can get access to information on the website of the library, but this approach needs to understand the format of the log, then or with the appropriate tools to accomplish a certain development. There is also a site visit to get the situation is to use asp or other web scripting language isp, using their built-in server,
outlet peuterey, session, request objects such as access to relevant information, access to the data statistics. For example: using Jsp Jsp's we can use the request object to get the built-parameter method request.get Parameter (Header (Time () returns the time the Session was created, and session.get Last Accessed Time () Returns the current Session object sent by the client last time, the difference between the retention time. Mainly divided into the following development steps: (1) to determine the statistical information that will be; (2) databases; (3) real-time access to information records, records per click information, including page information, user information,
Canada Goose norge, access to IP, access time; (4) the classification of real-time information storage; (5) display option. System with Windows forms can also be prepared on their own display table. Using this method is relatively simple,
peuterey jacke,
moncler 2011, but availability of statistical indicators is limited. Addition to the several statistical methods, there are router-based traffic statistics, traffic statistics based on the firewall,
moncler nederland, the broadcast nature of Ethernet-based traffic statistics. However, these methods provide a simple traffic statistics, the library can not fully meet the goal of digital resources to access statistics.
相关的主题文章:
moncler outletIn English translation - with the hi Canada Goose danmarkMetacognitive strategies in te Moncler piuminiTask-based teaching spoken English moncler stockholmHumanism do have feelings of excellence foreign la Moncler piuminiDevelop and improve their English l