SECURITY ON DIGITAL LIBRARY
#1

Presented by
PARESH PANDE

[attachment=11558]
Abstract
In this article, we elaborate on the meaning of quality in digital libraries (DLs) by proposing a model that is deeply grounded in a formal framework for digital libraries: 5S (Streams, Structures, Spaces, Scenarios, and Societies).
For each major DL concept in the framework we formally define a number of dimensions of quality and propose a set of numerical indicators for those quality dimensions. In particular, we consider key concepts of a minimal DL: catalog, collection, digital object, metadata specification, repository, and services. Regarding quality dimensions, we consider: accessibility, accuracy, completeness, composability , conformance, consistency, effectiveness, efficiency, extensibility, pertinence , preservability , relevance, reliability, reusability, significance, similarity, and timeliness.
Regarding measurement, we consider characteristics like: response time (with regard to efficiency), cost of migration (with respect to preservability), and number of service failures (to assess reliability).
For some key DL concepts, the (quality dimension, numerical indicator) pairs are illustrated through their application to a number of ‘‘real-world’’ digital libraries. We also discuss connections between the proposed dimensions of DL quality and an expanded version of a workshop’s consensus view of the life cycle of information in digital libraries. Such connections can be used to determine when and where quality issues can be measured, assessed, and improved – as well as how possible quality problems can be prevented, detected, and eliminated
1. Introduction
What is a good digital library? As was pointed out in Fuhr, Hansen, Mabe, Micsik, and So¨lvberg (2001),the answer to this question depends on whom you ask. Many consider that what differentiates a good DL from a not so good one is the quality of its services and content. In previous work, we have sought to formally elaborate the notion of digital libraries using the 5S framework (Gonc¸alves, Fox, Watson, & Kipp, 2004).
Since one of the main goals of that work with 5S was to try to answer (at least partially) the question ‘‘What is a digital library?’’ our hypothesis in this article is that further development of the theory will allow us to define critical dimensions and indicators of DL quality. The ‘‘digital’’ nature of digital libraries allows automatic assessment and enforcement of those quality properties, thereby supporting prevention and elimination of quality problems, which may be more difficult in physical libraries.
5S gives a standard terminology to discuss these issues in a common framework. Moreover, the formal nature of our DL theory allows us to add precision as we define specific DL quality dimensions and corresponding numeric indicators. In this article, we will follow the standard terminology used in the social sciences (Babbie, 1990).We will use the term composite quality indicator1 (or in short quality indicator) to refer to the proposed quantities instead of the stronger term quality measure. Only after one has a number of indicators, and they are validated2 and tested for reliability,3 can they be composed into reliable ‘‘measures’’. Despite partial tests of validity (for example, through focus groups)4 the proposed quality indicators do not qualify as measures yet. Also, it should be stressed that the proposed quantities are only approximations of or give quantified indication of a quality dimension.
They should not be interpreted as a complete specification of a quality dimension, since
more factors/variables could be relevant than are specified here. We will, however, reserve the right to use theterm ‘‘measure’’ when talking about standard measures that have long been used by the CS/LIS communities.The distinction should be clear in context.
This article is organized as follows. Section 2 provides background and context necessary to understand the remainder of the article. Sections 3–6 present all the dimensions of quality, the proposed indicators, and their applications to key DL concepts. Section 7 deals with the connections between the proposed dimensions and Borgman et al.’s Information Life Cycle (Borgman, 1996). Section 8 shows the evaluation of the proposed quality model with a focus group. Section 9 covers related work and Section 10 concludes the article.
2. Library Fundamentals
Four Phases of Library RFID Management System
RFID Management System consist of
1. Library Security System Only.
2. Support Library Circulation
3. Patron Self Check-in/Check-out
4. Smart and Quick Inventory
1. Library Security System Only:
Phase Action:
Using RFID Tag replace EM Security Stripe
Phase Target:
1. Radio Frequency Detection
2. Replace the EM Anti-theft system to avoid the high volume EM field harm human body and without False Alarm.
Equipment & parts needed:
1. Anti-theft Detection Gate - Detect the RFID Tag on Book and Check EAS Status, System alarm when the EAS status is ON.
2. Security Processing Station - Turn On or Off the EAS Setting of the Chip
3. RFID Tags
2. Support Library Circulation:
Phase Action:
Using RFID tags replace the barcode in Circulation process. Reading book’s access number from RFID than from barcode to borrow and return the book.
Phase Target:
1. No line of sight needed
2. Allows to check-out and check-in several items simultaneously
3. Performing both identification and antitheft in one single operation
Equipment & parts needed:
1. Counter Station
2. New Integrated Library System functions - read from RFID and set the EAS status.
3. Patron Self Check-in/Check-out:
3. Patron Self Check-in/Check-out:
Phase Action:
Let patron do the check-out and check-in process of books.
Phase Target:
1. Benefit to Librarian:
* Speeds up book check-in / check-out
* Frees staff to better service patrons
* Better space planning
2. Benefit to Patrons:
* Easy to use: books can be read in any orientation
* Reduces queuing time
* Provides patron privacy
Equipment & parts needed:
1. Self Check Station - Perform patron self check-out and check-in process and turn off or
turn off the EAS status
2. Book-Drop - Indoor or Outdoor. After patron drop in the book into this station, book’s id is checked and turned on the EAS simultaneously
3. Remote Book-drop - Long distance away from library, Acquire better protection of the
Book-drop
4. Sorting station - Sorting the return books automotive or manual.
4. Smart and Quick Inventory:

Phase Action:
Search and Inventory by reading the RFID using portable reader and portable computer
Phase Target:
1. Quick inventory
2. Look up the misplace material
3. Search for certain material
Equipment & parts needed:
1. Portable RFID reader
2. Portable Computer - Notebook PC or PDA
3. Inventory & Searching software
RFID Transponder:
Lib Best Library RFID Management System - RFID Tag
An RFID tag is the most important page link in any RFID system. It has the ability to store information relating to the specific item to which they are attached, rewrite again without any requirement for contact or line of sight. Data within a tag may provide identification for an item, proof of ownership, original storage location, loan status and history.
RFID Tag consists of an integrated circuit and an antenna combined to form a transponder. RFID tags collect the energy to operate from a Radio Frequency (RF) field emitted by a reader device; therefore they do not need a battery. When energized by a radio signal from a fixed position reader or handheld scanner, the tag returns the stored information in order that the item to which it is attached can be easily located.
The chip also has a "multi-read" function, which means that several tags can be read at once.
RFID tags have been specifically designed to be affixed into library media, including books, CDs, DVDs and tapes.
RFID Transponder
It is thin, flexible and thus can be laminated between paper and plastic. With special method to attach to books, patron is totally unaware that the tag is there.
KEY BENEFITS:
* No line of sight needed
* Allows to check-out and check-in several items simultaneously
* Information directly attached to product
* Performing both identification and antitheft in one single operation
* Different shape and sizes available
* Able to tag almost anything
* Accelerate scanning and identifying



Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: digital library architecture, digital library of the caribbean, patron brands, patron define, patron citronge, digital library project in vb with report, desynn indicators,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,512 24-11-2018, 01:19 AM
Last Post:
  Digital Signature Full Seminar Report Download computer science crazy 20 44,106 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,211 07-08-2014, 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 14,925 30-03-2014, 04:40 AM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 9,928 12-08-2013, 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 11,853 27-07-2013, 01:06 PM
Last Post: computer topic
  sketch image match to digital image arma 1 1,507 30-06-2013, 12:24 PM
Last Post: Guest
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 9 13,626 24-06-2013, 11:44 AM
Last Post: Guest
Photo Digital Watermarking Full Seminar Report Download computer science crazy 83 53,888 06-02-2013, 12:33 PM
Last Post: Guest
  Security System using Biometrics ( Download Full Seminar Report ) computer science crazy 7 10,346 02-02-2013, 03:56 PM
Last Post: seminar details

Forum Jump: