• Title/Summary/Keyword: information collection

Search Result 4,052, Processing Time 0.034 seconds

A Study on Development of a National Collection Management Guideline for the School Library (국가 수준의 학교도서관 장서관리지침서 개발에 대한 연구)

  • Lee, Seung-Gil;Song, Gi-Ho
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.51 no.3
    • /
    • pp.23-44
    • /
    • 2017
  • The purpose of this study is to develop detailed items and elements to be included in a national guideline for school library collection which can be used as a basis and standard for establishing collection management policies in individual school libraries. For this purpose, materials related to the collection management of school library were analyzed with the international and national level. As a result, the international materials emphasizes accessibility and resource sharing of digital materials besides quantitative standards of the library collection and deal with the process for the objection collection. In this study, items to be included in the national guidelines are divided into general principles of collection management and collection management guidelines, and elements of the each item are suggested. And proposed systematic bases for efficient application of the national guidelines to school libraries.

Simplified Tag Collection Algorithm for Improving Performance of Active RFID System (능동형 RFID 시스템의 성능 개선을 위한 간소화된 태그 수집 알고리즘)

  • Lim, Intaek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.731-736
    • /
    • 2017
  • In this paper, we propose a simplified tag collection algorithm to improve the performances of ISO/IEC 18000-7, which is a standard for an active RFID system. The proposed algorithm modifies the collection command that enables to start a tag collection round. The modified collection command includes the results of the listen period response for the previous collection round. Tags that receive the collection command check the collision status for their responses. If there is no collision, tags transmit their additional data and go into the sleep mode without the point-to-point read command and sleep command. A collection round for the standard consists of a collection command and response, a read command and response, and sleep command. On the other hand, in the proposed algorithm, a collection round consists of a collection command and response. The simulation results showed that the proposed algorithm can improve the identification delay about 16% compared with the standard when the number of tags are 300.

Weighted Adaptive Opportunistic Scheduling Framework for Smartphone Sensor Data Collection in IoT

  • M, Thejaswini;Choi, Bong Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.5805-5825
    • /
    • 2019
  • Smartphones are important platforms because of their sophisticated computation, communication, and sensing capabilities, which enable a variety of applications in the Internet of Things (IoT) systems. Moreover, advancements in hardware have enabled sensors on smartphones such as environmental and chemical sensors that make sensor data collection readily accessible for a wide range of applications. However, dynamic, opportunistic, and heterogeneous mobility patterns of smartphone users that vary throughout the day, which greatly affects the efficacy of sensor data collection. Therefore, it is necessary to consider phone users mobility patterns to design data collection schedules that can reduce the loss of sensor data. In this paper, we propose a mobility-based weighted adaptive opportunistic scheduling framework that can adaptively adjust to the dynamic, opportunistic, and heterogeneous mobility patterns of smartphone users and provide prioritized scheduling based on various application scenarios, such as velocity, region of interest, and sensor type. The performance of the proposed framework is compared with other scheduling frameworks in various heterogeneous smartphone user mobility scenarios. Simulation results show that the proposed scheduling improves the transmission rate by 8 percent and can also improve the collection of higher-priority sensor data compared with other scheduling approaches.

Smart Tourism Information System and IoT Data Collection Devices for Location-based Tourism and Tourist Safety Services

  • Ko, Tae-Seung;Kim, Byeong-Joo;Jwa, Jeong-Woo
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.310-316
    • /
    • 2022
  • The smart tourism service provides services such as travel planning and tour guides to tourists using key technologies of the 4th industrial revolution, such as the Internet of Things, communication infrastructure, big data, artificial intelligence, AR/VR, and drones. We are developing smart tourism services such as recommended travel products, my travel itinerary, tourism information, and chatbots for tourists through the smart tourism app. In this paper, we develop a smart tourism service system that provides real-time location-based tourism information and weather information to tourists. The smart tourism service system consists of a smart tourism app, a smart tourism information system, and an IoT data collection device. The smart tourism information system receives weather information from the IoT data collection device installed in the tourist destination. The location-based smart tourism service is provided as a smart tourism app in the smart tourism information system according to the Beacon's UUID in the IoT data collection device. The smart tourism information system stores the Beacon's UUIDs received from tourists and provides a safe hiking service for tourists.

Development of a Small Waste Appliance Collection System (소형 폐가전 수거 시스템 개발)

  • Cha, Hyun Chul
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.12
    • /
    • pp.1653-1662
    • /
    • 2021
  • In this paper, we propose a small waste appliance collection system that can be used for efficient waste appliance collection, and implement an unmanned automatic small waste appliance collector system. First, we collected cases related to the collection of waste home appliances, compared and analyzed methods, and arranged the characteristics. We analyzed at the requirements for the collection and management system of waste appliances by dividing it into the aspect of the discharger and the recycling business company. The collection system consists of a client-server structure, which is a collector system and a collection management server. The unmanned automatic collector system is divided into a control unit and a machine/mechanical unit. We identified the functions that the collector system must perform and the hardware required to perform these functions. Based on this, the collector system was implemented as an embedded system. The hardware and software used in the implementation are described and the implementation results are described. The collection system developed in this paper will contribute to the development of urban mining industry by enabling the efficient collection of waste appliances.

Developing a Framework for the Implementation of Evidence Collection System: Focusing on the Evaluation of Information Security Management in South Korea

  • Choi, Myeonggil;Kang, Sungmin;Park, Eunju
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.5
    • /
    • pp.13-25
    • /
    • 2019
  • Recently, as evaluation of information security (IS) management become more diverse and complicated, the contents and procedure of the evidence to prepare for actual assessment are rapidly increasing. As a result, the actual assessment is a burden for both evaluation agencies and institutions receiving assessments. However, most of them reflect the evaluation system used by foreign government agencies, standard organizations, and commercial companies. It is necessary to consider the evaluation system suitable for the domestic environment instead of reflecting the overseas evaluation system as it is. The purpose of this study is as follows. First, we will present the problems of the existing information security assessment system and the improvement direction of the information security assessment system through analysis of existing information security assessment system. Second, it analyzes the technical guidance for information security testing and assessment and the evaluation of information security management in the Special Publication 800-115 'Technical Guide to Information Security Testing and Assessment' of the National Institute of Standards and Technology (NIST). Third, we will build a framework to implement the evidence collection system and present a system implementation method for the '6. Information System Security' of 'information security management actual condition evaluation index'. The implications of the framework development through this study are as follows. It can be expected that the security status of the enterprises will be improved by constructing the evidence collection system that can collect the collected evidence from the existing situation assessment. In addition, it is possible to systematically assess the actual status of information security through the establishment of the evidence collection system and to improve the efficiency of the evaluation. Therefore, the management system for evaluating the actual situation can reduce the work burden and improve the efficiency of evaluation.

A Study on Research Trends Analysis of Medical Information Management (의학정보관리 연구경향 분석 연구)

  • Kim, Hee-Jung
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.2
    • /
    • pp.117-127
    • /
    • 2010
  • In this study, the author examined medical information management research trends in abroad and Korea from the perspectives of library and information science. LISA was used to collect research data in abroad from 2007 to 2010 (a total of 225 research articles). Korean studies were investigated using DBPIA to compare research trends. Content analysis results based on subject category show that research in abroad increased consistently and electronic resources and collection-related subjects were frequently studied. In Korea, the electronic resources and collection-related research proportion was also high, and much research was done in the areas of bibliometrics. However, medical information management researches did not increase in Korea between 2000 and 2010.

Enhancing Consumer Awareness and Privacy Protection in the Era of Over-the-Top(OTT) Services: Focused on Behavioral Information Collection and Personalized Content (OTT(Over The Top) 서비스 시대의 소비자 인식 및 개인정보 보호 강화: 행태정보 수집과 개인화 맞춤형 서비스를 중심으로)

  • Seung-Yeon Lee;Ji-Hyun Jeon;Jun-Hyoung Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.505-513
    • /
    • 2024
  • This study investigates how consumers perceive the collection of behavioral information through 'cookies' on OTT platforms and the impact it has on personalized services. Through SPSS analysis on 120 consumers, which was conducted to examine four hypotheses, correlations were found between awareness of OTT companies' behavioral information collection and online tracking recognition, awareness and willingness to provide cookies, and the extent of confirming behavioral information collection terms during registration and online tracking recognition. The study concludes that consumer knowledge about behavioral information significantly influences the importance and intention to use personalized services, highlighting the need for regulatory measures by both companies and government entities.

Garbage Collection Technique for Balanced Wear-out and Durability Enhancement with Solid State Drive on Storage Systems

  • Kim, Sungho;Kwak, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.4
    • /
    • pp.25-32
    • /
    • 2017
  • Recently, the use of NAND flash memory is being increased as a secondary device to displace conventional magnetic disk. NAND flash memory, as one among non-volatile memories, has many advantages such as low power, high reliability, low access latency, and so on. However, NAND flash memory has disadvantages such as erase-before-write, unbalanced operation speed, and limited P/E cycles, unlike conventional magnetic disk. To solve these problems, NAND flash memory mainly adopted FTL (Flash Translation Layer). In particular, garbage collection technique in FTL tried to improve the system lifetime. However, previous garbage collection techniques have a sensitive property of the system lifetime according to write pattern. To solve this problem, we propose BSGC (Balanced Selection-based Garbage Collection) technique. BSGC efficiently selects a victim block using all intervals from the past information to the current information. In this work, SFL (Search First linked List), as the proposed block allocation policy, prolongs the system lifetime additionally. In our experiments, SFL and BSGC prolonged the system lifetime about 12.85% on average and reduced page migrations about 22.12% on average. Moreover, SFL and BSGC reduced the average response time of 16.88% on average.

A Light-weighted Data Collection Method for DNS Simulation on the Cyber Range

  • Li, Shuang;Du, Shasha;Huang, Wenfeng;Liang, Siyu;Deng, Jinxi;Wang, Le;Huang, Huiwu;Liao, Xinhai;Su, Shen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3501-3518
    • /
    • 2020
  • The method of DNS data collection is one of the most important parts of DNS simulation. DNS data contains a lot of information. When it comes to analyzing the DNS security issues by simulation on the cyber range with customized features, we only need some of them, such as IP address, domain name information, etc. Therefore, the data we need are supposed to be light-weighted and easy to manipulate. Many researchers have designed different schemes to obtain their datasets, such as LDplayer and Thales system. However, existing solutions consume excessive computational resources, which are not necessary for DNS security simulation. In this paper, we propose a light-weighted active data collection method to prepare the datasets for DNS simulation on cyber range. We evaluate the performance of the method and prove that it can collect DNS data in a short time and store the collected data at a lower storage cost. In addition, we give two examples to illustrate how our method can be used in a variety of applications.