Foundations of Large-Scale Multimedia Information Management and Retrieval

Author(s):  
Edward Y. Chang
2013 ◽  
Vol 680 ◽  
pp. 534-539
Author(s):  
Wei Feng Ma

With the rapid expansion of the campus scale and the increasing of the geographically dispersed campus, how to adopt new theory, new method and new technology to realize the equipment optimized assignment and the information management is a new research challenge. It is the key to safeguard the national fund to use reasonably, and to speed up the development of education healthily. Through analyzing the domestic and foreign related research works, the paper proposed that it can take use of the spatial data expression and analysis with Geographic Information System (GIS) to realize the large-scale and inter-campuses equipment optimized assignment and information management. It discussed the mathematics model and the system architecture. Moreover, the paper described the key implementation technology in great detail such as spatial data mapping with MapInfo professional 9 and the development of WebGIS functions with MapXtreme. The results show that the solution is feasible and effective.


2019 ◽  
Vol 21 (4) ◽  
pp. 571-581
Author(s):  
Shobana Sivaraman ◽  
Punit Soni

Public health deals with promotion of health, prevention and treatment of communicable and non-communicable diseases by designing appropriate health interventions and services to deliver through the health systems. There is a need for robust database on the magnitude of disease burden, socio-demographic characteristics and associated risk factors for evidence-based effective planning and developing appropriate strategies, their implementation, monitoring and evaluation. Although India has vast information available through various large-scale surveys and research studies, it still lacks a reliable health information management system. The available data are seldom analysed to draw meaningful conclusions, to develop evidence for policies and strategies and to measure effectiveness of health programmes. The challenges faced in the survey research are multifaceted, from data collection in the field to its rapid transmission of data to central data servers. There is an increasing trend in using technology, especially computer-assisted personal interviews (CAPI) which is not only expensive but also requires extensive training and information management for transmission of data and its storage. This article examines the application of technology in survey research for efficient data management and to improve data quality. A software called Open Data Kit (ODK) was used for data collection and real-time monitoring of interviewers in field to improve the quality of data collection, achieve desired response rate (RR) and for better field operations’ management. The data collection and field reporting forms designed using ODK act as a significant tool to demonstrate how technology can be used to articulate research expectations at various levels with lower cost and higher efficiency. The research article examines all possible aspects of using technology in Health Survey Research. It aims to introduce further discussion of using technology for field data collection and monitoring.


Author(s):  
Changwon Son ◽  
Farzan Sasangohar ◽  
S Camille Peres ◽  
Sam Mannan

Disasters have revealed persistent challenges for incident management systems in preparing for, responding to, and recovering from disruptive events. Such challenges have been reflected in recent catastrophic events such as natural disasters, industrial accidents, and terrorist attacks. To address the challenges, a need for resilience of incident management systems has been increasingly recognized (Comfort, Boin, & Demchak, 2010). Resilience is defined as a system’s capacity to adjust its performance before, during and after a disturbance (Hollnagel, Woods, & Leveson, 2007). From the theory of Joint Cognitive System (JCS), resilient performance is rendered through an interplay among the JCS triad: human operators, technological artifacts, and demands from the world (Hollnagel & Woods, 2005; Woods & Hollnagel, 2006). Hence, this study aims to identify resilient performance of an incident management system (e.g., Incident Management Team (IMT)) by investigating interac-tions among the JCS triad. The research team conducted two naturalistic observations at a high-fidelity emergency exercise facility and collected audio and video recordings from participants. These recordings were then weaved together to facilitate the analysis of interactions. To represent the interactions among humans and technological tools that cope with demands from an incident, an Interactive Episode Analysis (IEA) was developed and applied to the collected data. The IEA was designed to capture three C’s of an interaction: Context, Content and Characteristics. Context refers to an initiator, a receiver of the interaction, and a technology used. Content indicates actions and communications that occur between human operators and technical tools. Characteristics refer to frequency and time duration of the interaction. To identify the IMT’s performance to cope with incident demands, an episode was constructed after an inject (a piece of simulated information input) was given to the IMT. Using the IEA, two episodes were extracted as preliminary results. Both similar and different patterns of information management were observed. First, both episodes suggest that the IMT follows a common information flow: collecting incident data (e.g., field report), documenting the data, and disseminating the data to other members of the IMT. In both episodes, participants tended to use similar technologies for a certain information management task. For example, a telephone was used for collection of incident data, a photocopying machine (i.e., printer and photocopier) for documentation, and a paper form for dissemination. On the other hand, dissimilar patterns were captured. As members of I/I Unit in the second episode struggled to find out a preferred method of communication (e.g., paper vs. email), the members interacted with instructors that were not seen in the first episode. As such, the second episode took almost twice the duration of the first episode. The findings from the current study, albeit preliminary, suggest non-linear and dynamic interactions among emergency operators, technical tools, and demands from an incident. As Woods (2006) noted, resilience of a system may not be visible until the system faces disruptive events. In such regards, the IEA would serve as a tool to represent the system’s resilient performance after a work demand. In addition, the IEA showed promise as a diagnostic tool that examines the interactions among the JCT triad. To gather more evidence to support findings in the preliminary analysis, future research will focus on extracting more episodes from the collected data and identifying emerging patterns of resilient performance of the IMT.


Author(s):  
Dale Bent

Information Management (IM) is an important activity in many organizations. However, it is relatively recently that the principles of IM have been sufficiently clear, and the technology of information processes sufficiently developed, to consider the rigorous organization-wide application of IM principles. Reported field experience is as yet scarce on the degree of acceptance of IM principles by management and the results of the implementation. A large-scale longitudinal international survey of senior managers in a wide variety of organizations is planned.


2014 ◽  
Vol 27 (13) ◽  
pp. 3295-3315 ◽  
Author(s):  
Marco Picone ◽  
Michele Amoretti ◽  
Marco Martalò ◽  
Francesco Zanichelli ◽  
Gianluigi Ferrari

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xiaofeng Wu ◽  
Fangyuan Ren ◽  
Yiming Li ◽  
Zhenwei Chen ◽  
Xiaoling Tao

With the rapid development of the Internet of Things (IoT) technology, it has been widely used in various fields. IoT device as an information collection unit can be built into an information management system with an information processing and storage unit composed of multiple servers. However, a large amount of sensitive data contained in IoT devices is transmitted in the system under the actual wireless network environment will cause a series of security issues and will become inefficient in the scenario where a large number of devices are concurrently accessed. If each device is individually authenticated, the authentication overhead is huge, and the network burden is excessive. Aiming at these problems, we propose a protocol that is efficient authentication for Internet of Things devices in information management systems. In the proposed scheme, aggregated certificateless signcryption is used to complete mutual authentication and encrypted transmission of data, and a cloud server is introduced to ensure service continuity and stability. This scheme is suitable for scenarios where large-scale IoT terminal devices are simultaneously connected to the information management system. It not only reduces the authentication overhead but also ensures the user privacy and data integrity. Through the experimental results and security analysis, it is indicated that the proposed scheme is suitable for information management systems.


Sign in / Sign up

Export Citation Format

Share Document