Search results for "Systems architecture"
showing 10 items of 227 documents
Understanding frailty:a qualitative study of European healthcare policy-makers' approaches to frailty screening and management
2018
ObjectiveTo elicit European healthcare policy-makers’ views, understanding and attitudes about the implementation of frailty screening and management strategies and responses to stakeholders’ views.DesignThematic analysis of semistructured qualitative interviews.SettingEuropean healthcare policy departments.ParticipantsSeven European healthcare policy-makers representing the European Union (n=2), UK (n=2), Italy (n=1), Spain (n=1) and Poland (n=1). Participants were sourced through professional networks and the European Commission Authentication Service website and were required to be in an active healthcare policy or decision-making role.ResultsSeven themes were identified. Our findings re…
An integrated identity verification system for mobile terminals
2005
PurposeTo report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and user‐friendliness.Design/methodology/approachThe reported research corresponds to the building process in the design science research paradigm. The requirements to an identity verification system are defined and used in the selection of architecture components. Furthermore, various issues affecting the suitability of component distribution between a terminal and a remote server are considered.FindingsIn order to meet the stated requirements, in the proposed architecture static and dynamic identity verification is combine…
Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – IS…
2019
Experimental realization of a Persistent Identifier Infrastructure stack for Named Data Networking
2015
The continuation of Persistent Identifier Infrastructures is crucial when next-generation Internet architectures based on Information-Centric Networking (ICN) arise. When moving to ICN, we must ensure the resolution of Persistent Identifiers (PID), such as the billions of Digital Object Identifiers (DOI) used today, to provide continued access to scientific literature and research data. It provides the base for the necessary transformations in the Handle System architecture and protocol for running a PID system on the Named Data Networking (NDN) architecture, which is a recent incarnation of ICN. Furthermore, it examines the PID-specific resolution access patterns, investigates the expected…
The Design of Secure and Efficient P2PSIP Communication Systems
2010
Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information among participating peers without help of the central servers. The concept of self-configuration, self-establishment greatly improves the robustness of the network system compared with the traditional Client/Server based systems. In this paper, we propose a system architecture for constructing efficient and secure P2PSIP communication systems. The proposed approach includes three-layer hierarchical overlay division, peer identifier assignment, cache based efficiency enhancement, proxy…
"Tea for two": the Archive of the Italian Latinity of the Middle Ages meets the CLARIN infrastructure
2020
This paper aims at showing how integrating the Archive of the Italian Latinity of the Middle Ages (ALIM) into the ILC4CLARIN repository can provide mutual benefits. Making ALIM available to a large community of scholars and researchers, on the one side, represents the first step to reduce the lack of resources for Medieval Latin in CLARIN and, on the other side, constitutes an unprecedented contribution to not only linguistic investigations, but also to the studies of the culture and science at the basis of the Western European society. The paper describes the adopted approach aiming to keep intact the structure of the archive and its metadata, which are both accurately mirrored into the IL…
File system scalability with highly decentralized metadata on independent storage devices
2016
This paper discusses using hard drives that integrate a key-value interface and network access in the actual drive hardware (Kinetic storage platform) to supply file system functionality in a large scale environment. Taking advantage of higher-level functionality to handle metadata on the drives themselves, a serverless system architecture is proposed. Skipping path component traversal during the lookup operation is the key technique discussed in this paper to avoid performance degradation with highly decentralized metadata. Scalability implications are reviewed based on a fuse file system implementation. Peer Reviewed
Mixed component metal-organic frameworks: Heterogeneity andcomplexity at the service of application performances
2022
The synthesis of mixed-component metal-organic frameworks (MOFs) –including multivariate MOFs (MTV-MOFs), multicomponent MOFs, mixed-metals MOFs and mixed-ligands and metals MOFs– is becoming a very active research field. This is mainly based on the unique possibilities these materials offer to incorporate multiple functionalities and in how this heterogenity and complexity is translated in unexpected properties, which are not just the sum of each component. This review critically encompasses the progress made in this field, covering the synthetic approaches, and specially focusing on the current reported applications –such as gas storage and separation, catalysis, luminescence, conductivit…
An Overview of 5G Slicing Operational Business Models for Internet of Vehicles, Maritime IoT Applications and Connectivity Solutions
2021
Identification of ecosystems and Business Models (BM) is an important starting point for new complex system development. The definition of actor (or stakeholder) roles and their interactions (at both business and technical levels), together with target scenarios and use cases, provide essential input information for further system requirement collection and architecture specification. The powerful and flexible Fifth Generation (5G) network slicing technology, which is capable of creating virtually isolated and logically parallel networks, enables a large range of complex services and vertical applications. Although various terminologies and models have been proposed in recent years for BMs …
Capturing citizens — Emerging needs: Using social networks in smart cities
2017
In order to reach its objectives, smart cities (or whatever kind of smart urban environment) should be underpinned by complex cyber physical systems (CPS) able to discover needs and services and "smartly" combine them. Services may be thought as services offered by software components, of whatever nature, for instance software, bot, robot, app and so on. Searching for the best service depends on the need of the citizen(s) and also on the type of (smart) environment the citizens are in. Analysis and design of CPSs are more challenging than the only physical or the only cyber system. We propose a design paradigm shift towards runtime for identifying requirements of cyber physical systems for …