PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer ...PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.展开更多
In this paper,the user interface of tractor cab real-time information management system was designed. Based on the principle of "user friendly",it reasonably arranged spatial position of information manageme...In this paper,the user interface of tractor cab real-time information management system was designed. Based on the principle of "user friendly",it reasonably arranged spatial position of information management system according to spatial distribution of tractor cab. Then,it analyzed operation habits and thinking ways of drivers,and formulated design principle meeting demands of drivers. Besides,it used LabView software to design user interface,including interface layout and interface design. User interface includes basic information interface,job information interface,camera monitoring interface,and fault diagnosis interface. Finally,it made evaluation of the user interface from color,indicator lamp,dial,and pointer. Results indicate that the designed user interface layout conforms to cognition mentality and operation habits and easy to get familiar and grasp; graphical interface is vivid and easy to stimulate pleasure of drivers in operation; interface color matching is coordinated; the layout of controls is hierarchical and logic,and operating mode is consistent with Windows system.展开更多
The Learning management system(LMS)is now being used for uploading educational content in both distance and blended setups.LMS platform has two types of users:the educators who upload the content,and the students who ...The Learning management system(LMS)is now being used for uploading educational content in both distance and blended setups.LMS platform has two types of users:the educators who upload the content,and the students who have to access the content.The students,usually rely on text notes or books and video tutorials while their exams are conducted with formal methods.Formal assessments and examination criteria are ineffective with restricted learning space which makes the student tend only to read the educational contents and videos instead of interactive mode.The aim is to design an interactive LMS and examination video-based interface to cater the issues of educators and students.It is designed according to Human-computer interaction(HCI)principles to make the interactive User interface(UI)through User experience(UX).The interactive lectures in the form of annotated videos increase user engagement and improve the self-study context of users involved in LMS.The interface design defines how the design will interact with users and how the interface exchanges information.The findings show that interactive videos for LMS allow the users to have a more personalized learning experience by engaging in the educational content.The result shows a highly personalized learning experience due to the interactive video and quiz within the video.展开更多
In this paper, we propose a practical and dynamic key management scheme based on the Rabin public key system and a set of matrices with canonical matrix multiplication to solve the access control problem in an arbitra...In this paper, we propose a practical and dynamic key management scheme based on the Rabin public key system and a set of matrices with canonical matrix multiplication to solve the access control problem in an arbitrary partially ordered user hierarchy. The advantage is in ensuring that the security class in the higher level can derive any of its successor’s secret keys directly and efficiently and show it is dynamic while a new security class is added into or a class is removed from the hierarchy. Even the ex-member problem can be solved efficiently. Moreover, any user can freely change its own key for some security reasons.展开更多
The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security surveillance.All such types of applications based on wireless mobile se...The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security surveillance.All such types of applications based on wireless mobile sensor network are generally using real time data,most of them are interested in real time communication directly from cluster head of cluster instead of a base station in cluster network.This would be possible if an external user allows to directly access real time data from the cluster head in cluster wireless mobile sensor network instead of accessing data from base station.But this leads to a serious security breach and degrades the performance of any security protocol available in this domain.Most existing schemes for authentication and cluster key management for external users,exchange a number of messages between cluster head and base station to allow external to access real time data from the base station instead of cluster head.This increase communication cost and delay in such real time access information.To handle this critical issue in cluster wireless mobile sensor network,we propose a lightweight authentication and key management scheme using a fuzzy extractor.In this scheme,any external user can access data directly from the cluster head of any cluster without the involvement of the base station.The proposed scheme only uses the one-way hash functions and bitwise XOR operations,apart from the fuzzy extractor method for the user biometric verification at the login phase.The presented scheme supports scalability for an increasing number of nodes using polynomials.The proposed scheme increases the life-time of the network by decreasing the key pool size.展开更多
In Vietnam as well as many countries which apply the irrigated agriculture over the world, the process of promoting thesocialization trend in irrigation for the basic irrigation organizations, of which the main factor...In Vietnam as well as many countries which apply the irrigated agriculture over the world, the process of promoting thesocialization trend in irrigation for the basic irrigation organizations, of which the main factor is water users, is very important. Thispaper aimed to optimize the decentralization of management and exploitation of irrigation works for water users, organizations inQuan Lo-Phung Hiep irrigation system of Mekong River Delta. The research has implemented a survey on 384 water users alongfour canals of level 2 of Quan Lo-Phung Hiep irrigation system under two sets of index: (1) water users' perception assessment of theirrigation works (14 indicators) and (2) assessment of the management efficiency in the irrigation works (six indicators). Theresearch proposes the decentralization process from building, After determining the correlation coefficients, the multi-objective linearregression equation will be shown on six single objective functions. With the aim at achieving the highest efficiency in themanagement and exploitation of the irrigation works, there should be a shift in terms of the water users' perception of the irrigationworks. These study results also demonstrate that about 65%-68% of the change in the indicators of the exploitation efficiency in theirrigation works is explained by some water users' perception indexes of irrigation works, including the quality of irrigation service andthe output efficiency in agricultural production. By using the algorithm for multi-objective optimization problem, the optimal results inperception are determined. The input data is generated for the matrix supporting the decision making, and the decentralization ofmanagement and exploitation of irrigation works meets the three criteria, i.e., effectiveness, sustainability and flexibility.展开更多
Nonpoint source(NPS)pollutants resulting from land degradation(LD)have been a key influential factor on the deterioration of water quality.Consequently,sustainable land use management(SLM)practices have been employed ...Nonpoint source(NPS)pollutants resulting from land degradation(LD)have been a key influential factor on the deterioration of water quality.Consequently,sustainable land use management(SLM)practices have been employed to reduce the impacts of LD globally.However,the adoption of SLM practices is often not effective to protect water resources despite its capability of improving water quality.Empirically,evidence shows that activities of land users directly influence SLM practices and NPS pollution of water resources in watersheds,but invariably this has not been clearly understood.Understanding how SLM practices adoption could prevent NPS pollution of water resources in watershed is a necessity.Therefore,the primary aim of the investigation is to comprehend the status of SLM practices with the legal framework supporting the adoption of such practices in the Ashi River watershed.A survey instrument involving structured questionnaire was implemented to collect data.A randomly based lottery method was applied to sample information from 150 land users in two control units’communities.Descriptive and inferential statistics was used to analyze the data.This research revealed that there is low adoption of SLM practices of the study site.The low adoption is due to weak capacity building and enforcement of regulations in the watershed.Occupation and age of the residents are the strongest predictors of SLM adoption rate.Residents connected with farming are more sensitive to the adoption status of SLM.It is our recommendation that policy makers should ensure capacity building,and enforcement of regulations can specifically compel farmers to adopt SLM technologies.This approach would complement other strategies to solve the NPS pollution issue of Ashi River.展开更多
Before Information Systems are developed, they must have undergone a process called Systems Development Life Cycle (SDLC) using appropriate methodology. The SDLC consists of phases varying from author to author. Howev...Before Information Systems are developed, they must have undergone a process called Systems Development Life Cycle (SDLC) using appropriate methodology. The SDLC consists of phases varying from author to author. However, an information systems project can only be successful with intense interaction amongst project manager, systems analyst, system designers and the end users. Viewed from the project manager’s perspective, the SDLC lacks the essence of project management activities. Similarly, end users involvement is not clearly specified. The main aim of this paper is to propose a framework for information systems management and development process which accommodates the views of the different participants. Furthermore, the paper sharpens the concept of conventional SDLC, on the basis of the proposed framework. In addition, tools and methods that are appropriate for the implementation of the framework are herein discussed.展开更多
Client software on mobile devices that can cause the remote control perform data mining tasks and show production results is significantly added the value for the nomadic users and organizations that need to perform d...Client software on mobile devices that can cause the remote control perform data mining tasks and show production results is significantly added the value for the nomadic users and organizations that need to perform data analysis stored in the repository, far away from the site, where users work, allowing them to generate knowledge regardless of their physical location. This paper presents new data analysis methods and new ways to detect people work location via mobile computing technology. The growing number of applications, content, and data can be accessed from a wide range of devices. It becomes necessary to introduce a centralized mobile device management. MDM is a KDE software package working with enterprise systems using mobile devices. The paper discussed the design system in detail.展开更多
Background The combination of an augmented reality(AR)headset and a smartphone can simultaneously provide a wider display and a precise touch input;it can redefine the way we use applications today.However,users are d...Background The combination of an augmented reality(AR)headset and a smartphone can simultaneously provide a wider display and a precise touch input;it can redefine the way we use applications today.However,users are deprived of such benefits owing to the independence of the two devices.There is a lack of intuitive and direct interactions between them.Methods In this study,we conduct a formative investigation to understand the window management requirements and interaction preferences of using an AR headset and a smartphone simultaneously and report the insights we gained.In addition,we introduce an example vocabulary of window management operations in the AR headset and smartphone interface.Results This allows users to manipulate windows in a virtual space and shift windows between devices efficiently and seamlessly.展开更多
Cost recovery and user satisfaction are among the core objectives of any public or quas-public good provision.Public toilet service provision has been the domain of local government until when liberalisation policies ...Cost recovery and user satisfaction are among the core objectives of any public or quas-public good provision.Public toilet service provision has been the domain of local government until when liberalisation policies struck the developing south.With stringent condition to reduce the fiscal burden,local government authorities have sought to offload some of its core functions including the management of public toilets to contracted firms.Based on regression and comparative quadrant analysis,this study evaluates cost recovery and user satisfaction in relation to public toilet condition based on a total of 729 user responses and 31 public toilet operators.The observations point to misguided decision to place public toilet management under contracted firms instead of placing then under Public Private Partnership(PPP).The decision to place public toilets management under private contract or individual contract is only secondary to PPP if the focus is to achieve both cost recovery and user satisfaction.However,if the focus was to achieve only cost recovery regardless of the need to protect users,then the decision would have been well founded but can be conspired inappropriate in as long as public toilets remain the domain of public good.展开更多
Concerning the demands in networked collaborative innovative design, a knowledge-based collaborative design model is introduced the model of knowledge integration along with its relevant supporting techniques ...Concerning the demands in networked collaborative innovative design, a knowledge-based collaborative design model is introduced the model of knowledge integration along with its relevant supporting techniques are presented. After illustrating the general knowledge search paradigm, a kind of dynamic user model is proposed to improve knowledge search efficiency. At last a short introduction of the system’s implementation is described.展开更多
With the rapid growth in the availability of digital health-related data,there is a great demand for the utilization of intelligent information systems within the healthcare sector.These systems can manage and manipul...With the rapid growth in the availability of digital health-related data,there is a great demand for the utilization of intelligent information systems within the healthcare sector.These systems can manage and manipulate this massive amount of health-related data and encourage different decision-making tasks.They can also provide various sustainable health services such as medical error reduction,diagnosis acceleration,and clinical services quality improvement.The intensive care unit(ICU)is one of the most important hospital units.However,there are limited rooms and resources in most hospitals.During times of seasonal diseases and pandemics,ICUs face high admission demand.In line with this increasing number of admissions,determining health risk levels has become an essential and imperative task.It creates a heightened demand for the implementation of an expert decision support system,enabling doctors to accurately and swiftly determine the risk level of patients.Therefore,this study proposes a fuzzy logic inference system built on domain-specific knowledge graphs,as a proof-of-concept,for tackling this healthcare-related issue.The system employs a combination of two sets of fuzzy input parameters to classify health risk levels of new admissions to hospitals.The proposed system implemented utilizes MATLAB Fuzzy Logic Toolbox via several experiments showing the validity of the proposed system.展开更多
Take a digital libraries' service system for example, Objects Served Relationship Management (OSRM) in complex systems is proposed firstly as a new concept, and its connotation is explained. The significances and ...Take a digital libraries' service system for example, Objects Served Relationship Management (OSRM) in complex systems is proposed firstly as a new concept, and its connotation is explained. The significances and constructions of OSRM are analyzed. Both the fundamental facts and the important natures that the things which are interested by Objects Served (OS) (e.g. publishers and readers) and the server (e.g. digital libraries are the servers of publishers and readers) will not be the same completely although there are a lot of common benefits between OS and servers, are indeed clarified. The valuable information, which should be used by OS and their server, is often hidden behind them. Thus, how to find, manage and control the relationship among OS and their servers is very necessary and important for the common benefits among all of them. (e.g. the three dimensions of OSRM in digital library system and its overall framework are proposed. The different strategies to different cases in the digital library's multidimensional framework are analyzed.)展开更多
基金Supported by the National Tenth Five-rear Planfor Scientific and Technological Development of China (413160501)the National Natural Science Foundation of China (50477038)
文摘PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.
基金Supported by Science and Technology Support Program of Jiangsu Province(Agriculture)(BE2012384)Special Fund for Conversion of Scientific and Technological Achievements in Jiangsu Province(BA2010055)
文摘In this paper,the user interface of tractor cab real-time information management system was designed. Based on the principle of "user friendly",it reasonably arranged spatial position of information management system according to spatial distribution of tractor cab. Then,it analyzed operation habits and thinking ways of drivers,and formulated design principle meeting demands of drivers. Besides,it used LabView software to design user interface,including interface layout and interface design. User interface includes basic information interface,job information interface,camera monitoring interface,and fault diagnosis interface. Finally,it made evaluation of the user interface from color,indicator lamp,dial,and pointer. Results indicate that the designed user interface layout conforms to cognition mentality and operation habits and easy to get familiar and grasp; graphical interface is vivid and easy to stimulate pleasure of drivers in operation; interface color matching is coordinated; the layout of controls is hierarchical and logic,and operating mode is consistent with Windows system.
文摘The Learning management system(LMS)is now being used for uploading educational content in both distance and blended setups.LMS platform has two types of users:the educators who upload the content,and the students who have to access the content.The students,usually rely on text notes or books and video tutorials while their exams are conducted with formal methods.Formal assessments and examination criteria are ineffective with restricted learning space which makes the student tend only to read the educational contents and videos instead of interactive mode.The aim is to design an interactive LMS and examination video-based interface to cater the issues of educators and students.It is designed according to Human-computer interaction(HCI)principles to make the interactive User interface(UI)through User experience(UX).The interactive lectures in the form of annotated videos increase user engagement and improve the self-study context of users involved in LMS.The interface design defines how the design will interact with users and how the interface exchanges information.The findings show that interactive videos for LMS allow the users to have a more personalized learning experience by engaging in the educational content.The result shows a highly personalized learning experience due to the interactive video and quiz within the video.
文摘In this paper, we propose a practical and dynamic key management scheme based on the Rabin public key system and a set of matrices with canonical matrix multiplication to solve the access control problem in an arbitrary partially ordered user hierarchy. The advantage is in ensuring that the security class in the higher level can derive any of its successor’s secret keys directly and efficiently and show it is dynamic while a new security class is added into or a class is removed from the hierarchy. Even the ex-member problem can be solved efficiently. Moreover, any user can freely change its own key for some security reasons.
基金This research was financially supported in part by the Ministry of Trade,Industry and Energy(MOTIE)and Korea Institute for Advancement of Technology(KIAT)through the International Cooperative R&D program.(Project No.P0016038)in part by the MSIT(Ministry of Science and ICT),Korea,under the ITRC(Information Technology Research Center)support program(IITP-2021-2016-0-00312)supervised by the IITP(Institute for Information&communications Technology Planning&Evaluation).
文摘The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security surveillance.All such types of applications based on wireless mobile sensor network are generally using real time data,most of them are interested in real time communication directly from cluster head of cluster instead of a base station in cluster network.This would be possible if an external user allows to directly access real time data from the cluster head in cluster wireless mobile sensor network instead of accessing data from base station.But this leads to a serious security breach and degrades the performance of any security protocol available in this domain.Most existing schemes for authentication and cluster key management for external users,exchange a number of messages between cluster head and base station to allow external to access real time data from the base station instead of cluster head.This increase communication cost and delay in such real time access information.To handle this critical issue in cluster wireless mobile sensor network,we propose a lightweight authentication and key management scheme using a fuzzy extractor.In this scheme,any external user can access data directly from the cluster head of any cluster without the involvement of the base station.The proposed scheme only uses the one-way hash functions and bitwise XOR operations,apart from the fuzzy extractor method for the user biometric verification at the login phase.The presented scheme supports scalability for an increasing number of nodes using polynomials.The proposed scheme increases the life-time of the network by decreasing the key pool size.
文摘In Vietnam as well as many countries which apply the irrigated agriculture over the world, the process of promoting thesocialization trend in irrigation for the basic irrigation organizations, of which the main factor is water users, is very important. Thispaper aimed to optimize the decentralization of management and exploitation of irrigation works for water users, organizations inQuan Lo-Phung Hiep irrigation system of Mekong River Delta. The research has implemented a survey on 384 water users alongfour canals of level 2 of Quan Lo-Phung Hiep irrigation system under two sets of index: (1) water users' perception assessment of theirrigation works (14 indicators) and (2) assessment of the management efficiency in the irrigation works (six indicators). Theresearch proposes the decentralization process from building, After determining the correlation coefficients, the multi-objective linearregression equation will be shown on six single objective functions. With the aim at achieving the highest efficiency in themanagement and exploitation of the irrigation works, there should be a shift in terms of the water users' perception of the irrigationworks. These study results also demonstrate that about 65%-68% of the change in the indicators of the exploitation efficiency in theirrigation works is explained by some water users' perception indexes of irrigation works, including the quality of irrigation service andthe output efficiency in agricultural production. By using the algorithm for multi-objective optimization problem, the optimal results inperception are determined. The input data is generated for the matrix supporting the decision making, and the decentralization ofmanagement and exploitation of irrigation works meets the three criteria, i.e., effectiveness, sustainability and flexibility.
基金the Heilongjiang Province Applied Technology Research and Development Program(Grant No.GA20C014).
文摘Nonpoint source(NPS)pollutants resulting from land degradation(LD)have been a key influential factor on the deterioration of water quality.Consequently,sustainable land use management(SLM)practices have been employed to reduce the impacts of LD globally.However,the adoption of SLM practices is often not effective to protect water resources despite its capability of improving water quality.Empirically,evidence shows that activities of land users directly influence SLM practices and NPS pollution of water resources in watersheds,but invariably this has not been clearly understood.Understanding how SLM practices adoption could prevent NPS pollution of water resources in watershed is a necessity.Therefore,the primary aim of the investigation is to comprehend the status of SLM practices with the legal framework supporting the adoption of such practices in the Ashi River watershed.A survey instrument involving structured questionnaire was implemented to collect data.A randomly based lottery method was applied to sample information from 150 land users in two control units’communities.Descriptive and inferential statistics was used to analyze the data.This research revealed that there is low adoption of SLM practices of the study site.The low adoption is due to weak capacity building and enforcement of regulations in the watershed.Occupation and age of the residents are the strongest predictors of SLM adoption rate.Residents connected with farming are more sensitive to the adoption status of SLM.It is our recommendation that policy makers should ensure capacity building,and enforcement of regulations can specifically compel farmers to adopt SLM technologies.This approach would complement other strategies to solve the NPS pollution issue of Ashi River.
文摘Before Information Systems are developed, they must have undergone a process called Systems Development Life Cycle (SDLC) using appropriate methodology. The SDLC consists of phases varying from author to author. However, an information systems project can only be successful with intense interaction amongst project manager, systems analyst, system designers and the end users. Viewed from the project manager’s perspective, the SDLC lacks the essence of project management activities. Similarly, end users involvement is not clearly specified. The main aim of this paper is to propose a framework for information systems management and development process which accommodates the views of the different participants. Furthermore, the paper sharpens the concept of conventional SDLC, on the basis of the proposed framework. In addition, tools and methods that are appropriate for the implementation of the framework are herein discussed.
文摘Client software on mobile devices that can cause the remote control perform data mining tasks and show production results is significantly added the value for the nomadic users and organizations that need to perform data analysis stored in the repository, far away from the site, where users work, allowing them to generate knowledge regardless of their physical location. This paper presents new data analysis methods and new ways to detect people work location via mobile computing technology. The growing number of applications, content, and data can be accessed from a wide range of devices. It becomes necessary to introduce a centralized mobile device management. MDM is a KDE software package working with enterprise systems using mobile devices. The paper discussed the design system in detail.
基金Supported by Key Basic Research Projects of the Foundation Strengthening Program (2020-JCJQ-ZD-014-12)
文摘Background The combination of an augmented reality(AR)headset and a smartphone can simultaneously provide a wider display and a precise touch input;it can redefine the way we use applications today.However,users are deprived of such benefits owing to the independence of the two devices.There is a lack of intuitive and direct interactions between them.Methods In this study,we conduct a formative investigation to understand the window management requirements and interaction preferences of using an AR headset and a smartphone simultaneously and report the insights we gained.In addition,we introduce an example vocabulary of window management operations in the AR headset and smartphone interface.Results This allows users to manipulate windows in a virtual space and shift windows between devices efficiently and seamlessly.
文摘Cost recovery and user satisfaction are among the core objectives of any public or quas-public good provision.Public toilet service provision has been the domain of local government until when liberalisation policies struck the developing south.With stringent condition to reduce the fiscal burden,local government authorities have sought to offload some of its core functions including the management of public toilets to contracted firms.Based on regression and comparative quadrant analysis,this study evaluates cost recovery and user satisfaction in relation to public toilet condition based on a total of 729 user responses and 31 public toilet operators.The observations point to misguided decision to place public toilet management under contracted firms instead of placing then under Public Private Partnership(PPP).The decision to place public toilets management under private contract or individual contract is only secondary to PPP if the focus is to achieve both cost recovery and user satisfaction.However,if the focus was to achieve only cost recovery regardless of the need to protect users,then the decision would have been well founded but can be conspired inappropriate in as long as public toilets remain the domain of public good.
基金SupportedbyNationalHi-Tech Research and Development Program of China (Grants No.2001AA412180)
文摘Concerning the demands in networked collaborative innovative design, a knowledge-based collaborative design model is introduced the model of knowledge integration along with its relevant supporting techniques are presented. After illustrating the general knowledge search paradigm, a kind of dynamic user model is proposed to improve knowledge search efficiency. At last a short introduction of the system’s implementation is described.
基金funded by the Deanship of Scientific Research at Umm Al-Qura University,Makkah,Kingdom of Saudi Arabia.Under Grant Code:22UQU4281755DSR05.
文摘With the rapid growth in the availability of digital health-related data,there is a great demand for the utilization of intelligent information systems within the healthcare sector.These systems can manage and manipulate this massive amount of health-related data and encourage different decision-making tasks.They can also provide various sustainable health services such as medical error reduction,diagnosis acceleration,and clinical services quality improvement.The intensive care unit(ICU)is one of the most important hospital units.However,there are limited rooms and resources in most hospitals.During times of seasonal diseases and pandemics,ICUs face high admission demand.In line with this increasing number of admissions,determining health risk levels has become an essential and imperative task.It creates a heightened demand for the implementation of an expert decision support system,enabling doctors to accurately and swiftly determine the risk level of patients.Therefore,this study proposes a fuzzy logic inference system built on domain-specific knowledge graphs,as a proof-of-concept,for tackling this healthcare-related issue.The system employs a combination of two sets of fuzzy input parameters to classify health risk levels of new admissions to hospitals.The proposed system implemented utilizes MATLAB Fuzzy Logic Toolbox via several experiments showing the validity of the proposed system.
文摘Take a digital libraries' service system for example, Objects Served Relationship Management (OSRM) in complex systems is proposed firstly as a new concept, and its connotation is explained. The significances and constructions of OSRM are analyzed. Both the fundamental facts and the important natures that the things which are interested by Objects Served (OS) (e.g. publishers and readers) and the server (e.g. digital libraries are the servers of publishers and readers) will not be the same completely although there are a lot of common benefits between OS and servers, are indeed clarified. The valuable information, which should be used by OS and their server, is often hidden behind them. Thus, how to find, manage and control the relationship among OS and their servers is very necessary and important for the common benefits among all of them. (e.g. the three dimensions of OSRM in digital library system and its overall framework are proposed. The different strategies to different cases in the digital library's multidimensional framework are analyzed.)