Search results for "DATA"
showing 10 items of 12992 documents
Watermarking for ontologies
2011
In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.
Selection of time windows in the horizontal-to-vertical noise spectral ratio by means of cluster analysis
2016
The selection of the elementary analysis windows in continuous noise recordings for optimal estimation of the mean horizontal‐to‐vertical spectral ratio (HVSR) curve is generally performed by visual inspection of HVSR curves considered as functions of time. Starting from full‐length records, HVSR curves are determined in consecutive time windows of appropriate lengths. Time windows with HVSR curves that are anomalous on the basis of a simple visual inspection are generally ignored in the computation of the average HVSR curve. It is often very difficult to optimize the selection of time windows to be used for the calculation of the HVSR curve representative of a site. The use of nonobjective…
On the reactivation of a large landslide induced by rainfall in highly fissured clays
2018
Abstract The paper discusses the field investigations, geotechnical characterization and time evolution of horizontal displacements in a wide landslide. The latter, triggered by an earthquake occurring in September 2002, is located in Sicily and involves a thick body of stiff and highly fissured clays belonging to a Varicoloured Clay formation. In order to characterise the reactivation of landslide mechanisms induced by rainfall, a three-year monitoring programme (2008–2011) was implemented to measure rain, pore water pressures, and deep and superficial displacements. The monitoring data made it possible to recognize three distinct landslides, which evolve at variable rates in different dir…
Data Sources Handling for Emergency Management: Supporting Information Availability and Accessibility for Emergency Responders
2017
Information is an essential component for better emergency response. Although a lot of information being available at various places during any kind of emergency, many emergency responders (ERs) use only a limited amount of the available information. The reason for this is that the available information heterogeneously distributed, in different formats, and ERs are unable to get access to the relevant information. Moreover, without having access to the needed information, many emergency responders are not able to obtain a sufficient understanding of the emergency situation. Consequently, a lot of time is being used to search for the needed information and poor decisions may be made. Therefo…
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage
2019
Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.
Automatic Integration of Spatial Data into the Semantic Web
2017
International audience
Self-validating bundles for flexible data access control
2016
Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…
Essais cliniques institutionnels : quel monitoring ?
2013
Resume Objectif Les promoteurs assument la responsabilite de la qualite des essais cliniques. Ces methodes d’assurance qualite doivent etre les plus efficaces possible, et avoir un cout maitrise. Nous voulions decrire les erreurs les plus frequentes, a partir de la litterature, leur impact sur les resultats, et proposer les strategies de monitoring les plus efficientes. Resultats Les defauts rencontres concernent la conception, les procedures, la gestion des donnees et l’analyse. L’impact sur les resultats est presque toujours une surestimation de l’effet traitement. Aucune methode de monitoring n’ayant ete demontree superieure, un monitoring econome, cible sur les risques d’erreurs, avec d…
Methodological Aspects of Infrared Thermography in Human Assessment
2016
Infrared thermography presents some important advantages in the determination of skin temperature, as it is a safe, non-invasive and non-contact technique with wide applications in the field of sports sciences. Like many others techniques, valid measurement in thermography requires following strict methodological steps from data acquisition to analyses and interpretation. In this chapter, we discuss the methodological aspects that must be taken into account when acquiring thermic images, along with some practical examples and recommendations based on the current literature.
2019
Objective The aim of this study was to investigate participation and effectiveness of a multiyear comprehensive workplace health promotion (WHP) program. Methods Participation and effectiveness data came from employer and vendor systems. Health data came from health risk assessments (HRA) and biometric screenings. Participation and effectiveness were analyzed using descriptive analyses, t tests, and Mann-Whitney U tests where appropriate. Overall impact was assessed using the PIPE Impact Metric. Results Eighty-six percent of employees completed the HRA and 80% the biometrical screenings. Annual participation rate was 24%, and total reach was 58%. The portion of successful participants was 2…