Search results for " sharing"
showing 10 items of 290 documents
Hadron therapy information sharing prototype
2013
The European PARTNER project developed a prototypical system for sharing hadron therapy data. This system allows doctors and patients to record and report treatment-related events during and after hadron therapy. It presents doctors and statisticians with an integrated view of adverse events across institutions, using open-source components for data federation, semantics, and analysis. There is a particular emphasis upon semantic consistency, achieved through intelligent, annotated form designs. The system as presented is ready for use in a clinical setting, and amenable to further customization. The essential contribution of the work reported here lies in the novel data integration and rep…
H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks
2009
In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collector’s retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop-by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption based scheme is not compromise resilient. To achieve all the desires, we propose a scheme - H2S by making use of both homomorphic secret sharing and homomorphic encryption. The security and efficiency of our scheme are justified by extensive analysis.
A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing
2009
Many data storage schemes have been proposed in the past for keeping dependable data storage, but they are not designed for Unattended Wireless Sensor Networks (UWSNs). When applying these schemes to UWSNs, most of them have limitations such as high storage requirement, transmission cost, and not resilient to a large number of node compromises. To address the problem of data storage, transmission cost, and resilience of node compromise in UWSNs, we propose a novel Homomorphic Encryption and Homomorphic Secret Sharing based scheme (HEHSS) to accomplish the goals of confidentiality, resilience to node compromises, reliability, and efficiency of storage and transmission. Our scheme exploits th…
Understanding the Impact of Opinion Leaders’ Characteristics on Online Group Knowledge-Sharing Engagement from In-Group and Out-Group Perspectives: E…
2019
Opinion leaders often play key roles in online knowledge-sharing communities, which has intrigued a lot of researchers and practitioners worldwide. However, it is not clear how various characteristics of opinion leaders may affect different online groups&rsquo
Removing the barriers to adoption of social OER environments
2015
Despite the opportunities and benefits of OER, research and practice has shown how the OER repositories have a hard time in reaching an active user-base. The opportunities of experience exchange and simple feedback mechanisms of social software have been realized for improving the situation and many are basing or transforming their OER offerings towards socially powered environments. Research on social software has shown how knowledge-sharing barriers in online environments are highly culture and context-specific and require proper investigation. It is crucial to study what challenges might arise in such environments and how to overcome them, ensuring a successful uptake. A large-scale (N =…
Social support for collaboration and group awareness in life science research teams
2019
Background Next-generation sequencing (NGS) technologies have revolutionarily reshaped the landscape of ’-omics’ research areas. They produce a plethora of information requiring specific knowledge in sample preparation, analysis and characterization. Additionally, expertise and competencies are required when using bioinformatics tools and methods for efficient analysis, interpretation, and visualization of data. These skills are rarely covered in a single laboratory. More often the samples are isolated and purified in a first laboratory, sequencing is performed by a private company or a specialized lab, while the produced data are analyzed by a third group of researchers. In this scenario, …
Optimizing the level of service quality of a bike-sharing system
2016
Public bike-sharing programs have been deployed in hundreds of cities worldwide, improving mobility in a socially equitable and environmentally sustainable way. However, the quality of the service is drastically affected by imbalances in the distribution of bicycles among stations. We address this problem in two stages. First, we estimate the unsatisfied demand (lack of free lockers or lack of bicycles) at each station for a given time period in the future and for each possible number of bicycles at the beginning of the period. In a second stage, we use these estimates to guide our redistribution algorithms. Computational results using real data from the bike-sharing system in Palma de Mall…
Research data sharing in Spain: Exploring determinants, practices, and perceptions
2020
This work provides an overview of a Spanish survey on research data, which was carried out within the framework of the project Datasea at the beginning of 2015. It is covered by the objectives of sustainable development (goal 9) to support the research. The purpose of the study was to identify the habits and current experiences of Spanish researchers in the health sciences in relation to the management and sharing of raw research data. Method: An electronic questionnaire composed of 40 questions divided into three blocks was designed. The three Section s contained questions on the following aspects: (A) personal information
On the Bullwhip Avoidance Phase: The Synchronised Supply Chain
2012
Abstract The aim of this paper is to analyse the operational response of a Synchronised Supply Chain (SSC). To do so, first a new mathematical model of a SSC is presented. An exhaustive Latin Square design of experiments is adopted in order to perform a boundary variation analysis of the main three parameters of the periodic review smoothing ( S , R ) order-up-to policy: i.e., lead time, demand smoothing forecasting factor, and proportional controller of the replenishment rule. The model is then evaluated under a variety of performance measures based on internal process benefits and customer benefits. The main results of the analysis are: (I) SSC responds to violent changes in demand by re…
Comparing Cybersecurity Information Exchange Models and Standards for the Common Secure Information Management Framework
2021
Cyber threats have increased in spite of formal economic integration in the world. Decision-makers and authorities need to respond to the growing challenge of cyberthreats by increasing cooperation. Information is one of the main facilities when the objective is to prevent hybrid threats at the EU level and between the western countries. The main purpose of the study is to find out separating and combining factors concerning existing cyber information sharing models and information management frameworks in western countries. The aim is also to find out crucial factors, which affect the utilization of a common Early Warning System for the ECHO stakeholders. The main findings are that unclear…