Search results for "Formations"

showing 10 items of 680 documents

An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment

2019

We propose an efficient anonymous, attribute-based credential scheme capable of provisioning multi-level credential delegations. It is integrated with a mechanism to revoke the anonymity of credentials for resolving access disputes and making users accountable for their actions. The proposed scheme has a lower end-user computational complexity in comparison to existing credential schemes with delegatability and has a comparable level of performance with the credential standards of U-Prove and Idemix. Furthermore, we demonstrate how the proposed scheme can be applied to a collaborative e-health environment to provide its users with the necessary anonymous access with delegation capabilities.

Scheme (programming language)Computational complexity theoryDelegationComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subject020206 networking & telecommunicationsProvisioning02 engineering and technologyComputer securitycomputer.software_genreCredentialComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYcomputermedia_commoncomputer.programming_languageAnonymityACM Transactions on Internet Technology
researchProduct

Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment

2018

Modern electronic healthcare (e-health) settings constitute collaborative environments requiring sophisticated fine-grained access control mechanisms to cater their access demands. Access delegatability is quite crucial to realize fine-grained, flexible access control schemes compatible with such environments. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities suitable for a multi-domain e-health environment. We have utilized the blockchain technology to manage attribute assignments, delegations as well as revocations. The scheme enables delegations in a controlled manner without jeopard…

Scheme (programming language)DelegationRevocationbusiness.industryComputer sciencemedia_common.quotation_subject010401 analytical chemistryControl (management)Overhead (engineering)020206 networking & telecommunicationsAccess control02 engineering and technologyAttribute-based access controlComputer securitycomputer.software_genre01 natural sciences0104 chemical sciences0202 electrical engineering electronic engineering information engineeringInformationSystems_MISCELLANEOUSbusinessKey managementcomputermedia_commoncomputer.programming_language2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
researchProduct

Extension and Tuning of Virtual Synchronous Machine to Avoid Oscillatory Instability in Isolated Power Networks

2020

The risk of oscillatory instability introduced by virtual synchronous machines (VSM) control in isolated power networks is investigated. The considered control is a common scheme widely studied in literature, in several configurations and for different case studies. The impact of the VSM control on the system stability is examined for the existing power network of a Mediterranean island. The VSM control is implemented within the power converters interfacing the energy storage systems (ESS) installed in the network. Simulations and analysis show the occurrence of oscillatory instability in the system, with the ESS-VSM and the synchronous machines of the network progressively swinging against…

Scheme (programming language)ancillary services energy storage systems isolated networks power system stability virtual synchronous machineComputer science020209 energyInformationSystems_INFORMATIONSTORAGEANDRETRIEVAL020208 electrical & electronic engineeringControl (management)02 engineering and technologyConvertersInstabilityEnergy storagePower (physics)Settore ING-IND/33 - Sistemi Elettrici Per L'EnergiaInterfacingControl theory0202 electrical engineering electronic engineering information engineeringSynchronous motorcomputercomputer.programming_language
researchProduct

Growth pattern of underlithified strata during thrust-related folding

2004

Abstract Asymmetric anticlines with overturned or steeply dipping forelimbs and gently dipping backlimbs are generally interpreted as thrust-related folds. Fold asymmetry occurs as a consequence of forelimb rotation. If deformation takes place in environments dominated by submarine sedimentation, the limbs coincide with the slope (depositional surface) and rotation reflects slope steepening. If folds are nucleated in poorly or unlithified deposits, growth geometry also depends on the properties of the media, such as cohesion and the angle of internal friction. For cohesionless deposits, the tilting of the slope influences the equilibrium of the soft sediments, resulting in gravity-driven fl…

Sedimentary depositional environmentBeddingCompactionAnticlineGeologyFold (geology)NeogenePetrologyLithificationGeomorphologyGeologySoft-sediment deformations Stratal pattern Fold growth Thrust tectonics Pliocene SicilyThrust tectonics
researchProduct

Multiple deformed layers in Weichselian lacustrine sediments at Baltmuiža, western Latvia

2019

SeismitesSoft sediment deformations:NATURAL SCIENCES::Earth sciences::Exogenous earth sciences::Quaternary geology [Research Subject Categories]Weichselian glaciation
researchProduct

Noli Me Tangere: Social Touch, Tactile Defensiveness, and Communication in Neurodevelopmental Disorders

2019

Tactile defensiveness is a common feature in neurodevelopmental disorders (NDDs). Since the first studies, tactile defensiveness has been described as the result of an abnormal response to sensory stimulation. Moreover, it has been studied how the tactile system is closely linked to socio-communicative development and how the interoceptive sensory system supports both a discriminating touch and an affective touch. Therefore, several neurophysiological studies have been conducted to investigate the neurobiological basis of the development and functioning of the tactile system for a better understanding of the tactile defensiveness behavior and the social touch of NDDs. Given the lack of rece…

Sensory stimulation therapySettore M-PSI/02 - Psicobiologia E Psicologia FisiologicaInformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.HCI)General Neuroscienceautism spectrum disorders05 social sciencesneurodevelopmental disorders (NDDs)Sensory systemautism spectrum disordertactile defensivene050105 experimental psychologySettore MED/39 - Neuropsichiatria Infantile03 medical and health sciences0302 clinical medicinesocial touchPerspectiveFocusing attention0501 psychology and cognitive sciencesSocial touchtactile defensivenesssensory reactivityPsychology030217 neurology & neurosurgeryCognitive psychology
researchProduct

A Geometric Algebra Based Distributional Model to Encode Sentences Semantics

2013

Word space models are used to encode the semantics of natural language elements by means of high dimensional vectors [23]. Latent Semantic Analysis (LSA) methodology [15] is well known and widely used for its generalization properties. Despite of its good performance in several applications, the model induced by LSA ignores dynamic changes in sentences meaning that depend on the order of the words, because it is based on a bag of words analysis. In this chapter we present a technique that exploits LSA-based semantic spaces and geometric algebra in order to obtain a sub-symbolic encoding of sentences taking into account the words sequence in the sentence. © 2014 Springer-Verlag Berlin Heidel…

SequenceSemantic spacesTheoretical computer scienceGeneralizationbusiness.industryLatent semantic analysisSentences encodingInformationSystems_INFORMATIONSTORAGEANDRETRIEVALSemanticscomputer.software_genreGeometric algebraBag-of-words modelArtificial intelligenceClifford algebrabusinesscomputerNatural languageSentenceNatural language processingMathematics
researchProduct

Providing timely quality care after-hours: Perceptions of a hospital model of care

2019

Abstract Background Nurses working night shift are key-players in the acute care team, however, their work environment has been characterised by suboptimal leadership, communication inadequacies, limited resources, and a lack of adequate support. Aim The aim of this study was to investigate nurses' perceptions of the Hospital at Night Team, a nursing model of care implemented to provide timely quality nursing care after-hours. Methods The study used a descriptive design. Five focus groups were conducted, with a total of 34 nurses from 14 wards across a 600+ bed tertiary referral teaching hospital in Melbourne, Australia, one year after the Hospital at Night Team implementation. Focus group …

Service (business)medicine.medical_specialty030504 nursingReferraleducationFocus groupInformationSystems_GENERAL03 medical and health sciencesPatient safety0302 clinical medicineWorkflowTeam nursingNursingAcute caremedicine030212 general & internal medicineThematic analysis0305 other medical sciencePsychologyGeneral NursingCollegian
researchProduct

ViziQuer: A Web-Based Tool for Visual Diagrammatic Queries Over RDF Data

2018

We demonstrate the open source ViziQuer tool for web-based creation and execution of visual diagrammatic queries over RDF/SPARQL data. The tool supports the data instance level and statistics queries, providing visual counterparts for most of SPARQL 1.1 select query constructs, including aggregation and subqueries. A query environment can be created over a user-supplied SPARQL endpoint with known data schema (a data schema exploration service is available, as well). There are pre-defined demonstration query environments for a mini-university data set, a fragment of synthetic similar to reality hospital data set, and a variant of Linked Movie Database RDF data set.

Service (systems architecture)Information retrievalbusiness.industryComputer scienceInformationSystems_INFORMATIONSTORAGEANDRETRIEVAL010401 analytical chemistry05 social sciencesDatabase schemaInformationSystems_DATABASEMANAGEMENTcomputer.file_format01 natural sciences0104 chemical sciencesData setDiagrammatic reasoningFragment (logic)SPARQLWeb application0501 psychology and cognitive sciencesRDFbusinesscomputer050107 human factors
researchProduct

Software-as-a-Service in the Telecommunication Industry: Problems and Opportunities

2010

This paper examines the telecommunication software market and the adoption of topical Software-as-a-Service (SaaS) model in this vertical market. The aim of this paper is to estimate which telecommunication software products are likely to be provided as a Service, and to examine the potential factors disallowing SaaS adoption. The set aim is pursued by studying both the supplying software vendors and the communication service providers (CSP) as customers. A set of thematic interviews, software industry statistics and information disclosed by the software vendors are used in the analysis. The results of the analysis reveal challenges in adopting SaaS for telecommunication software as well as…

Service (systems architecture)Social software engineeringProcess managementbusiness.industrySoftware deploymentInformationSystems_INFORMATIONSYSTEMSAPPLICATIONSSoftware as a serviceSoftware developmentVertical marketSoftware systemService providerbusinessTelecommunications
researchProduct