Search results for "Cryptography"
showing 10 items of 657 documents
Combining hashing and enciphering algorithms for epidemiological analysis of gathered data.
2008
Summary Objectives: Compiling individual records coming from different sources is necessary for multi-center studies. Legal aspects can be satisfied by implementing anonymization procedures. When using these procedures with a different key for each study it becomes almost impossible to link records from separate data collections. Methods: The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient’s identity. Results: The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme…
A modified observer-based prediction approach for industrial applications
2013
The prediction of key variables has great significance to monitor the running status of industrial systems. In this paper, a novel data-driven design of variable predictor is proposed. The basic idea is the realization of prediction observer, which is modified from the observer-based fault diagnose method. Different from the standard data-driven approaches, the proposed scheme is adopted for the dynamic systems due to the superior tracking ability of output observer. Additionally, by introducing an extra design freedom and the estimation of measured value, it can also be used for the case that the key variable is not on-line measurable. Finally, the proposed prediction scheme is applied to …
Multi-beam cooperative frequency reuse for coordinated multi-point transmission
2010
Coordinated multi-point (CoMP) joint transmission is considered in the 3rd generation partnership project (3GPP) long term evolution (LTE)-advanced as a key technique to mitigate inter-cell interference and improve the cell-edge performance. To effectively apply CoMP joint transmission, efficient frequency reuse schemes need to be designed to support resource management cooperation among coordinated cells. However, most of the existing frequency reuse schemes are not suitable for CoMP systems due to not considering multi-point joint transmission scenarios in their frequency reuse rules. In addition, the restrictions of frequency resources in those schemes result in a high blocking probabili…
Using knowledge of human-generated code to bias the search in program synthesis with grammatical evolution
2021
Recent studies show that program synthesis with GE produces code that has different structure compared to human-generated code, e.g., loops and conditions are hardly used. In this article, we extract knowledge from human-generated code to guide evolutionary search. We use a large code-corpus that was mined from the open software repository service GitHub and measure software metrics and properties describing the code-base. We use this knowledge to guide the search by incorporating a new selection scheme. Our new selection scheme favors programs that are structurally similar to the programs in the GitHub code-base. We find noticeable evidence that software metrics can help in guiding evoluti…
Secure and efficient data storage in unattended wireless sensor networks
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/NTMS.2009.5384753 Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic…
Elliptic Curve-Based Secure Multidimensional Aggregation for Smart Grid Communications
2017
In smart grid, data aggregation is considered as an essential paradigm in assessing information about current energy usage. To achieve the privacy-preserving goal, several homomorphic-based solutions have been proposed. However, these solutions either consider one-dimensional information or use costly pairing computation in order to ensure source authentication. In fact, smart grid data are likely to be multidimensional (e.g., time, purpose, and so on) for more accurate control. In addition, the aggregation node in smart grid needs to verify data that come from several smart meters in a residential area; hence, the verification must be cost-efficient. In this paper, we propose a scheme that…
Ready to Go? Schools’ Preparedness for Teaching and Learning Within a One-to-One Program
2020
Part 6: ICT and Education; International audience; During the years there has been an increasing number of one-to-one programs around the world. In such programs all students are equipped with portable devices, such as laptops, tablets, smartphones for learning purposes. Even if these initiatives are increasing, our knowledge of the impact of such digital transformation of education is still little studied. Based on data from a three years longitudinal study on a large-scale implementation of Chromebooks in a municipality, this paper highlights teachers’ experiences. Key findings suggest that this initiative has been successful when it comes to the administrative and technical implementatio…
Distributed Scrum when Turning into Maintenance : A Single Case Study
2015
Global software development using agile methods is commonplace in software industry nowadays. Scrum, as the agile development management framework, can be distributed in many ways, especially concerning how the key roles are presented in different sites. We describe here a single case study of a distributed Scrum, mainly for maintenance of the already constructed web portal. Using a qualitative method, both working well and challenging parts of the software work, as experienced by the project stakeholders, are revealed and discussed.
Estimating the non-market benefits of water quality improvement for a case study in Spain: A contingent valuation approach
2012
Abstract This article addresses an important topic related to the application of the European Water Framework Directive (WFD) in Spanish watersheds. Results on a contingent valuation study, aimed to assess the non-market benefits of water quality improvements in the Guadiana river basin (GRB), are shown. Special attention has been paid to the issue of zero willingness-to-pay (WTP) responses, while addressing the possible presence of self-selection caused by protest responses. The results (i) indicate that sample selection bias is not a problem in our application, (ii) allow us to identify some key determinants of voting behaviour, and (iii) through the use of different econometric models al…
A Geographical Self-Organizing Approach for Vehicular Networks
2012
Cooperative vehicular networks have always been considered as the perfect way to bring more comfort to the passengers and more safety to the human life. Thus, research community and governmental organizations are interested to study and deploy these networks. The vehicular networks principle is connecting vehicles to each other and to existing infrastructure. However, their industrialization faces some challenges: (i) high mobility, (ii) frequently partitioned network, (iii) geographically constrained topology, and (iv) scalability. Therefore, in contrast to traditional networks, vehicular network protocols focus on both achieving adequate QoS level and reducing overhead. Achieving these tw…