• Title/Summary/Keyword: location security

Search Result 607, Processing Time 0.036 seconds

Job Satisfaction among Library and Information Science Professionals in India: A Case Study

  • Pandita, Ramesh
    • Journal of Information Science Theory and Practice
    • /
    • v.5 no.1
    • /
    • pp.47-64
    • /
    • 2017
  • Purpose: This study aims to assess the level of job satisfaction among the practicing Library and Information Science (LIS) professionals in India. Some of the key variables studied include salary, work environment, professional position, working hours, location, employee participation in administrative matters, recognition, and advancement. Scope: The study is limited to LIS professionals in India; however, the results of the study show some degree of commonality among LIS professionals across the world. Methodology/Approach: The study has been purely undertaken by analyzing the primary data collected from practicing library and information professionals across India by circulating an online questionnaire, using Google services and by posting the link on various social groups and other social networking sites such as Groups, Facebook, LinkedIn, discussion forums, and e-mails. Findings: Responses were generated across 20 states and union territories of the country, representing 88.15% territory of India. Of the total responses generated, 72.88% are males and 27.12% females. From the data analysis it emerged that every third library professional in India enters in to LIS profession by chance and not by choice, as 35.59% respondents expressed that they landed in the LIS profession by chance and 60.45% by choice. More than 77% respondents have expressed their willingness to change their present employer, if given better opportunity. More than 80% professionals either fully or partly agree that most of the LIS professionals across India are dissatisfied with their employers. All these and many more areas have been explored, which reflect the aspects of job satisfaction and dissatisfaction among LIS professionals in India.

DE-Based Adaptive Reversible Data Hiding Scheme (DE 기반의 적응적인 가역정보은닉기법)

  • Choi, Jang-Hee;Yoon, Eun-Jun;Yoo, Kee-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.103-114
    • /
    • 2012
  • The many DE based data hiding schemes and the many data hiding schemes based on Histogram shifting are researched in spatial domain. The data hiding scheme based on Histogram shifting have an advantage of low distortion of the stego image. But the capacity is low than other schemes. On the other hands, the DE based data hiding schemes have an advantage of high capacity. But the quality of the stego image is low. In this paper, new data hiding scheme which has the similar capacity but the increased quality of the stego image is proposed. The prediction error is divided into blocks to embed the secret data in this scheme. The prediction errors in the block are scanned before the secret data is embedded. If one prediction error is low than the threshold at least, the block is changed to embed the secret data. Otherwise the secret data is not embedded. The distortion of the stego image is minimized by this method. But the block that the secret data embedded is marked in location map. So the additional information to extract the secret data and recover the cover image is needed.

Landscape Design for the Buchon Special School (부천특수학교 조경설계)

  • 김신원;이시영
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.30 no.3
    • /
    • pp.57-63
    • /
    • 2002
  • This landscape design was proposed for the Buchon Special School Competition, held by the Kyonggi Province Office of Education. The authors collaborated on this design and won first prize in November of 2001. In the design proposal, on the basis of the knowledge of; mentally retarded children the children's activities, nature and health, and the healing gardens, the special school outdoor spaces were designed to meet the particular needs of the users. The school outdoor spaces are design for various types of users-children, adolescents, parents, siblings, staff, volunteers and visitors. The following are some of the basis concerns in the design of the school outdoor spaces : garden site planning, garden location, security, microclimate, entering and exiting, accessibility, usability, user group territories, supervision, attracting trained volunteers, a range of high-quality social settings, accommodation of different student types, accommodation of needs for both challenge and rest, child nature interaction, diversity of natural settings, hands-on activity, integrating the arts, and maintenance. The following are some of the major features in the design of school outdoor spaces : pleasant and inviting entry areas, sports grounds with different levels of challenge, gardens with plants having strong fragrances and/or tactile qualities, resting places with many types and forms of seating and weather-mitigating features, play grounds for all student types, roof gardens for users to experience nature in man-made environments, and walkways and winding paths with various trees, shrubs and flowers. In the special school outdoor spaces, people would perceive a unique sense of place through the various types of spaces and features described above. An example of the true meaning of a playing and resting place and a restorative and therapeutic environment is provided in the school outdoor spaces.

Automatic Door System Performance Improvement Study by the disturbance compensation (외란보상을 통한 자동문 시스템 성능 개선연구)

  • Park, Won-Hyeon;Kim, Min;Jeong, Jae-Hoon;Lee, Dong Heon;Choi, Myoung Hoon;Lim, Jae Jun;Byun, Gi-Sik;Kim, Gwan-Hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.734-736
    • /
    • 2016
  • Doors are in various buildings, such as large retail stores, hospitals, restaurants, government offices and is used as a door to provide convenience for customers, the convenience of security to control doors and exterior access Castle, etc. In the case of housing door facilities It has been used widely. However, the conventional automatic door controller Although the primary use of the PID control, the contact size and weight depending on the location to cause an instability in the system controller or the like, and disturbance of parameter variation and uncertain dynamics because of the wide variations. In this paper, we design a robust controller to compensate for uncertainties and to compensate for the disturbance.

  • PDF

Design of Real-time Disaster Safety management Solution in a Smart Environment (스마트 환경에서의 실시간 재난 안전 관리 솔루션 설계)

  • Seo, Ssang-Hee;Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.31-36
    • /
    • 2020
  • In recent years, increasing the variety of disasters and accidents that accompany large-scale damage. Disasters are accidents with uncertainty and have a direct impact on people's lives, safety and property protection. Therefore, it is necessary to establish and operate safety management systems such as prevention, response, and recovery for various disasters. Therefore, in this paper, a real-time disaster safety management solution in a smart environment was designed to systematically respond to disaster accidents. To this end, 1: 1 or 1: N situation propagation was performed to the situation room, related organizations, and experts through smart devices. Through this, the solution was configured to respond quickly and appropriately through multi-party information sharing and communication. In other words, we designed a solution that applied functions such as real-time and multi-party HD video transmission, mobile-type report management, voice / text situation propagation, location information sharing, recording and history management, and security.

IoT model to improve parent-child interaction -Focus on smart watch for kids- (부모-자녀 상호작용을 증진하는 IoT 모델 -유아용 스마트워치를 중심으로-)

  • Yee, Young-Hwan
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.209-218
    • /
    • 2017
  • To propose a contents model for children's smart watch, this study interview 15mothers who have a child using smart watches. Most mothers purchase smart watches for children to warrant their security and manage their schedules, and they use them for sending a call or text to their children, tracking or managing children's location and schedule. Mothers were satisfied with a smart watch's function of communication and safety management, but dissatisfied learning-oriented contents and worrried about bad influenced on children development. Through in-depth interviews, this study propose a persona model for children's smart watch for enhancing parent-child interaction and physical cognitive language socioemotional convergence play contents.

Approximate 3D Localization Mechanism in Wireless Sensor Network (무선 센서 네트워크 환경에서 3차원 근사 위치추적 기법)

  • Shim, Jaeseok;Lim, Yujin;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.9
    • /
    • pp.614-619
    • /
    • 2014
  • In WSN (Wireless Sensor Networks) based surveillance system, it needs to know the occurrence of events or objects and their locations, because the data have no meaning without location information. Using traditional 2D localization mechanisms provide good accuracy where altitude is fixed. But the mapping the position estimated by 2D localization to the real world can cause an error. Even though 3D localization mechanisms provide better accuracy than 2D localization, they need four reference nodes at least and high processing overhead. In our surveillance system, it is needed to estimate the height of the detected object in order to determine if the object is human. In this paper, we propose a height estimation mechanism which does not require many reference nodes and high complexity. Finally, we verify the performance of our proposed mechanism through various experiments.

WebCam : A Web-based Remote Recordable Surveillance System using Index Search Algorithm (웹캠 : 새로운 인데스검색 알고리듬을 이용한 웹기반 원격 녹화 보안 시스템)

  • Lee, Myeong-Ok;Lee, Eun-Mi
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.9-16
    • /
    • 2002
  • As existing analog video surveillance systems could save and retrieve data only in a limited space within short distance, it had many constraints in developing into various application systems. However, on the back of development of the Internet and computer technologies, digital video surveillance systems can be controlled from a remote location by web browser without space limits. Moreover, data compression and management technologies with Index Search algorithm make it possible to efficiently handling, storing, and retrieving a large amount of data and further motion detection algorithm enhances a recording speed and efficiency for a practical application, that is, a practical remote recordable video surveillance system using our efficient algorithms as mentioned, called WebCam. The WebCam server system can intelligently record and save video images digitized through efficient database management, monitor and control cameras in a remote place through user authentication, and search logs.

A Spatial Transformation Scheme Supporting Data Privacy and Query Integrity for Outsourced Databases (아웃소싱 데이터베이스에서 데이터 프라이버시 및 질의 무결성을 지원하는 공간 변환 기법)

  • Kim, Hyeong-Il;Song, Young-Ho;Chang, Jaewoo
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.652-663
    • /
    • 2015
  • Due to the popularity of location-based services, the amount of generated spatial data in daily life has been dramatically increasing. Therefore, spatial database outsourcing has become popular for data owners to reduce the spatial database management cost. The most important consideration in database outsourcing is meeting the privacy requirements and guarantying the integrity of the query result. However, most of existing database transformation techniques do not support both of the data privacy and integrity of the query result. To solve this problem, we propose a spatial data transformation scheme that utilizes the shearing transformation with rotation shifting. In addition, we described the attack models to measure the data privacy of database transformation schemes. Finally, we demonstrated through the experimental evaluations that our scheme provides high level of data protection against different kinds of attack models, compared to the existing schemes, while guaranteeing the integrity of the query result sets.

Building GIS Application Model in Support of Tsunami Relief Effort (쓰나미 재난 대응을 위한 GIS 응용모델 구축에 관한 연구)

  • Liyanage, Asha Nilani;Lee, Heewon;Lee, Seok-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1489-1494
    • /
    • 2013
  • Tsunami happens rarely enough to allow a false sense of security, but when they do occur, there may be just minutes or hours for people to reach a safe location. Natural disasters like tsunami are inevitable and it is almost impossible to fully recoup damages caused by the disasters. However, it is possible to minimize the potential risk by developing early warning strategies. GIS modelling with its geoprocessing and analysis capability can play a crucial role in efficient mitigation and management of disaster. This study aims at developing integrated spatial information system processing model supporting tsunami evacuation action planning using geo-information technology such as GIS. The integration process classified into four phases. And in each phase, required input data and GIS processes are decided. The main effort in minimizing casualties in tsunami disaster is to evacuate people from the hazard area before tsunami strikes by means of either horizontal or vertical evacuation. The study provides essential spatial information for local decision making related with people's evacuation in tsunami-prone areas based on a modeling approach transferable to other coastal areas.