Search results for "peer"
showing 10 items of 836 documents
Developing common protocols to measure tundra herbivory across spatial scales
2021
Understanding and predicting large-scale ecological responses to global environmental change requires comparative studies across geographic scales with coordinated efforts and standardized methodologies. We designed, applied and assessed standardized protocols to measure tundra herbivory at three spatial scales: plot, site (habitat), and study area (landscape). The plot and site-level protocols were tested in the field during summers 2014-2015 at eleven sites, nine of them comprising warming experimental plots included in the International Tundra Experiment (ITEX). The study area protocols were assessed during 2014-2018 at 24 study areas across the Arctic. Our protocols provide comparable a…
Peer-to-peer cooperative GNSS-based localization for stationary reference nodes in wireless sensor networks
2017
Most localization algorithms in wireless sensor networks rely on a few reference nodes with known locations to estimate the locations of unknown nodes. The locations of reference nodes can be either manually configured or, more practically, obtained by means of some satellite-based positioning system(s). However, satellite-based locations may be inaccurate and imprecise, which results in reduced location accuracy of localization algorithms. This paper proposes a peer-to-peer cooperative GNSS-based localization algorithm for stationary reference nodes to improve their relative location accuracy and precision. The algorithm applies simple statistical methods and GNSS-based information from mu…
Rings for Privacy: an Architecture for Large Scale Privacy-Preserving Data Mining
2021
This article proposes a new architecture for privacy-preserving data mining based on Multi Party Computation (MPC) and secure sums. While traditional MPC approaches rely on a small number of aggregation peers replacing a centralized trusted entity, the current study puts forth a distributed solution that involves all data sources in the aggregation process, with the help of a single server for storing intermediate results. A large-scale scenario is examined and the possibility that data become inaccessible during the aggregation process is considered, a possibility that traditional schemes often neglect. Here, it is explicitly examined, as it might be provoked by intermittent network connec…
2018
<b><i>Background:</i></b> A major and complex challenge when trying to support individuals with dementia is meeting the needs of those who experience changes in behaviour and mood. <b><i>Aim:</i></b> To explore how a sensor measuring electrodermal activity (EDA) impacts assistant nurses’ structured assessments of problematic behaviours amongst people with dementia and their choices of care interventions. <b><i>Methods:</i></b> Fourteen individuals with dementia wore a sensor that measured EDA. The information from the sensor was presented to assistant nurses during structured assessments of problematic behaviours. The e…
Security Management in Health Care Information Systems — A Literature Review
2017
Health care information systems play an important role for communication across the organizational borders of health care services. The electronic health record represents the main entity in the management, exchange and storage of medical information. Health care organizations must adopt strategies for security and privacy risks associated with access to health care information systems, but on the other hand, the information needs to be accessible and readable for authorized health care professionals carrying out patient treatment. This paper presents a literature review on security management in health care information systems. The aim was to analyze descriptions and definitions of informa…
Evaluation Framework for Analyzing the Applicability of Criteria Lists for the Selection of Requirements Management Tools Supporting Distributed Coll…
2016
Effective requirements management and enabling tools are critical for successfully developing and maintaining services and products. The identification and selection of an appropriate requirements management tool can be a costly, time-consuming, and error-prone undertaking especially in the context of software product line requirements management, requiring the tools to support both product and platform development activities that often involve geographically distributed, collaborating, and competing stakeholders. Criteria lists have been developed to facilitate the selection. This research (1) creates an evaluation framework to review the applicability of the lists for the selection of req…
The Challenge of Coexistence in Socially Vulnerable Schools
2017
Abstract Society in general and schools in particular continue to express their concerns with regard to the many challenges posed nowadays by living in a globalized world, where learning to coexist involves knowing oneself and those around us. Therefore, the professionals from the education sector and specially from the most vulnerable contexts demand the necessity to know strategies and initiatives which enable them to build a democratic school, where learning to coexist is the key to educate engaged citizens living in an increasingly intercultural, changing world. The study presented here has been conducted in two differentiated, but complementary, phases. During the first phase a documen…
Association between parental feeding practices and shared family meals. The Food4toddlers study
2020
Background Parental feeding practices and family meals are important determinants for infants' diet and health. Still, there is no previous research of the association between feeding practices and family meals in infants. Objective Explore potential associations between feeding practices and family meals among infants. Design We present cross-sectional results (baseline) from the Food4toddlers study. In total 298 parents of 1-year-olds, recruited from all over Norway, filled in a questionnaire regarding frequency of shared family meals (breakfast, lunch, dinner) and feeding practices using the validated instrument Comprehensive Feeding Practices Questionnaire. Logistic regression was used …
Adverse Social Experiences in Adolescent Rats Result in Enduring Effects on Social Competence, Pain Sensitivity and Endocannabinoid Signaling
2016
Abstract: Social affiliation is essential for many species and gains significant importance during adolescence. Disturbances in social affiliation, in particular social rejection experiences during adolescence, affect an individual's well-being and are involved in the emergence of psychiatric disorders. The underlying mechanisms are still unknown, partly because of a lack of valid animal models. By using a novel animal model for social peer rejection, which compromises adolescent rats in their ability to appropriately engage in playful activities, here we report on persistent impairments in social behavior and dysregulations in the endocannabinoid (eCB) system. From postnatal day (pd) 21 to…
Enabling openness of valuable information resources: Curbing data subtractability and exclusion
2019
In this paper we investigate how data openness can be made possible in communal settings. We adopt a utility perspective that foregrounds the use value of data, conceptualizing them as “goods.” On the basis of this conceptualization we explore 2 key goods' attributes: subtractability and exclusion. Our theoretical basis is built upon concepts from the theory of the commons, power theorizing, and notions related to data and information. Empirically, we investigate openness in the genetics domain through a longitudinal study of the evolving communal infrastructure for data related to 2 genes influencing women's susceptibility to breast and ovarian cancer (BRCA1 and BRCA2). We follow the conti…